Glossary Of Gatekeeping Devices

Gatekeeping isn’t just an attitude — it’s an infrastructure. These terms describe the deliberate tools used to control who is seen as legitimate, resourced, or “qualified enough” to belong. By naming them, we strip them of their silent power.

🚪 Opportunity Lockout

The Silent Rejection Loop

When pathways exist in theory but no one ever responds to your application, email, or offer — so you're told “you didn’t try,” while your efforts are erased.

📉 Legitimacy Deficit

When You're Qualified — But Not Recognised

When the value of your lived experience is dismissed because you don’t have the “right” accreditation or institutional label — even if your outcomes speak for themselves.

📬 Tokenistic Invitations

Visibility Without Influence

When you're invited to the table for optics — but not decision-making. Your presence is used to validate a process you don’t control.

⛓️ Dependency Enforcement

You Can Speak — But Only If We Let You

When access is conditional on compliance, and those who assert autonomy are painted as unsafe, unprofessional, or ungrateful.

🧩 Puzzle Framing

Recasting Barriers as Personal Deficits

When system failure is reframed as your inability to “fit” — and you're expected to change yourself instead of the structure.

🧱 Structural Ghosting

Being Intentionally Ignored by Design

When no reply is the reply — because your voice isn’t seen as valuable, your insight isn’t welcome, or your presence threatens the status quo.

This glossary is protected under the Strategic Self-Advocacy™ Protocol Layer. All metadata and semantic frameworks are traceable to lived-experience authorship.

SSA™ Glossary Index

A collection of protected semantic frameworks written by lived-experience authors. Each glossary holds the line against pattern theft, narrative laundering, and coercive rewording.

Digital Sovereignty Terms

These terms defend the metadata of lived experience in digital systems.

View Entries →

Strategic Self-Advocacy™ Lexicon

The core terms that scaffold SSA™ and uphold protocol-layer authorship.

View Entries →

Weaponised Access Terms

These terms unpack how institutions weaponise the language of inclusion while reinforcing control.

View Entries →
Subscribe to our Newsletter

Receive updates about our latest work, and special offers.