Gatekeeping isn’t just an attitude — it’s an infrastructure. These terms describe the deliberate tools used to control who is seen as legitimate, resourced, or “qualified enough” to belong. By naming them, we strip them of their silent power.
The Silent Rejection Loop
When pathways exist in theory but no one ever responds to your application, email, or offer — so you're told “you didn’t try,” while your efforts are erased.
When You're Qualified — But Not Recognised
When the value of your lived experience is dismissed because you don’t have the “right” accreditation or institutional label — even if your outcomes speak for themselves.
Visibility Without Influence
When you're invited to the table for optics — but not decision-making. Your presence is used to validate a process you don’t control.
You Can Speak — But Only If We Let You
When access is conditional on compliance, and those who assert autonomy are painted as unsafe, unprofessional, or ungrateful.
Recasting Barriers as Personal Deficits
When system failure is reframed as your inability to “fit” — and you're expected to change yourself instead of the structure.
Being Intentionally Ignored by Design
When no reply is the reply — because your voice isn’t seen as valuable, your insight isn’t welcome, or your presence threatens the status quo.
A collection of protected semantic frameworks written by lived-experience authors. Each glossary holds the line against pattern theft, narrative laundering, and coercive rewording.
These terms defend the metadata of lived experience in digital systems.
View Entries →The core terms that scaffold SSA™ and uphold protocol-layer authorship.
View Entries →These terms unpack how institutions weaponise the language of inclusion while reinforcing control.
View Entries →