Anti-Corruption Measures

To safeguard the integrity, fairness, and accuracy of the screensharing process, Red Lotus implements specific anti-corruption measures designed to prevent abuse and ensure unbiased outcomes:

  • Purpose: These measures are specifically aimed at preventing false punishments (bans issued without sufficient or valid evidence), bribery (exchanging favors or benefits for lenient checks or predetermined outcomes), evidence planting or tampering, and any other action that compromises the genuineness and accuracy of the screenshare and its findings.

  • No Bribery: Any form of bribery, whether solicited or offered, involving ScreenSharers, players, or other staff members, is strictly disallowed and constitutes a severe breach of ethics. Any benefits, gifts, or advantages received by ScreenSharers or the SS team from non-standard sources (e.g., player donations directed specifically at the SS team) must be managed with full transparency, typically requiring such benefits to be pooled and distributed equitably among the team, under the direct oversight and approval of designated Leaders, Managers, or Server Owners.

  • Evidence Scrutiny: If evidence collected during a screenshare is deemed insufficient, ambiguous, questionable, or raises concerns about its validity or context, the ScreenSharer's explanation or interpretation should not be automatically accepted at face value. Management or leadership must conduct further scrutiny, potentially involving secondary reviews or consultation with other experienced staff, before a final decision is made. Maintaining objectivity is key.

  • Right to Review Evidence: As stated under Security and Privacy, suspects should generally be allowed to review the specific evidence used to justify a ban against them, upon submitting a reasonable request. The determination of "reasonableness" is context-dependent and should be judged by management based on factors like the suspect's overall behavior (cooperative vs. obstructive/abusive), the clarity and specificity of their request, and the stated purpose (e.g., understanding the ban vs. attempting to find exploits in the detection method). The goal is to balance transparency with procedural security.


Last updated