Active-time gate
The student course requires at least 26 minutes of active course time before final completion and certificate release. The reviewer preview shows the gate without making the reviewer wait.
Employer and reviewer preview site for a Texas commercial lodging human-trafficking training lane. It includes the actual course content, bilingual materials, standards crosswalk, final exam bank, timer, sample certificate, and preview pricing posture. Enrollment remains closed while Texas OAG review is pending.
Use the buttons at the top, then move down the page in order. Everything needed for review is grouped as summary, course content, and approval proof.
These links match the submission packet so OAG reviewers can quickly open the student flow, complete content, exam, certificate, and crosswalk.
First confirm that the application basics match the course: provider, title, length, delivery, language, status, and contact.
This is the full lesson text, learner outcomes, and knowledge checks. The live preview shows how the course will work for students without creating a real student record.
Explains who must train, how the annual requirement works, and why hotel staff play an important role in safe reporting.
Play the lesson aloud and follow the highlighted text. You can pause, replay, and adjust the speed.
Texas requires annual human trafficking training for employees directly employed by covered commercial lodging establishments with 10 or more rooms. New team members should complete the course no later than the 90th day after hire, and managers need an overlay that covers internal escalation and documentation expectations.
The course is written for daily hotel operations. A front desk employee, housekeeper, maintenance worker, security employee, food service employee, valet, supervisor, or manager should leave with the same practical rule: do not diagnose trafficking and do not try to prove a crime. Notice patterns, preserve safety, document what was actually observed, and move the concern through the property's reporting process. That keeps the training useful for staff with different roles and different levels of experience.
Hotel staff are often the first people to notice traffic patterns, control dynamics, guest distress, or contractor concerns that suggest exploitation. The training teaches awareness, documentation, and escalation; it does not ask staff to investigate or intervene on their own.
The planned online flow holds completion until the learner finishes each required module, passes the knowledge check, and reaches the completion checkpoint. That pacing control is part of the Texas compliance posture and should be visible to reviewers.
The student version is designed to require active course time before final completion. A learner cannot simply open the page, jump to the end, and print a certificate. Lesson order, visible progress, knowledge checks, the final assessment, and the active-time gate work together so the completion record reflects actual training rather than page access alone.
Distinguishes trafficking from smuggling, explains sex and labor trafficking, and shows why lodging sites may be misused.
Play the lesson aloud and follow the highlighted text. You can pause, replay, and adjust the speed.
The course defines trafficking in plain language. Human trafficking does not require crossing international or state borders. A person can be trafficked locally, by someone they know, and under pressure that is physical, emotional, financial, or immigration-related.
Reviewers are shown both major forms because commercial lodging staff may encounter either. The course uses lodging examples such as controlled room activity, exploited cleaning crews, pressured maintenance labor, or guests who appear unable to speak freely.
The course explains force, fraud, and coercion through hotel examples rather than legal jargon alone. Force can include violence, confinement, or physical intimidation. Fraud can include false promises about work, pay, debt, transportation, or housing. Coercion can include threats, document control, debt pressure, blackmail, isolation, immigration threats, or using a person's dependency against them. Staff are taught that the same control tactics can affect guests, workers, contractors, adults, and minors.
The course is informed by Ankur Fadia, MD's direct clinical care and consultation involving many suspected and confirmed human-trafficking victims across a 15-year physician career. The course never discloses names, case facts, dates, images, or identifying details; instead, it converts recurring clinical safety lessons into trauma-informed hotel guidance: protect privacy, avoid confrontation, listen for requests for help, consider medical danger, and connect the person with appropriate emergency or hotline resources.
Human trafficking can take place in hotels and other commercial lodging because traffickers may use rooms, parking areas, lobbies, side entrances, online booking, cash or prepaid reservations, short stays, and late-hour traffic to move, control, exploit, or isolate people while avoiding attention. Sex trafficking may involve controlled room activity, repeated visitors, or someone arranging and profiting from commercial sex. Labor trafficking may involve contractors, cleaning crews, maintenance workers, or other lodging workers who are threatened, underpaid, housed under control, or unable to leave. Hospitality staff are often among the few third parties who may notice patterns across check-in, housekeeping, maintenance, food service, security, and front-desk interactions.
The lesson explains that a possible victim may not use the word trafficking, may deny danger, or may appear attached to the person controlling them. For minors, commercial sexual exploitation is treated as trafficking even when force, fraud, or coercion is not separately proven. For adults, the course focuses on the control methods that can remove real choice. This section helps staff respond with care instead of expecting a victim to tell a perfect story during a stressful encounter.
Victims may appear fearful, guarded, angry, quiet, loyal to the controller, or unwilling to accept help the first time it is offered. The course explains that these reactions can be shaped by threats, debt, shame, dependency, injury, immigration pressure, or fear that authorities will not believe them. Staff are taught to keep language respectful, avoid blame, protect privacy, and use safe reporting channels instead of pushing the person to disclose more than they are ready to share.
Covers room traffic patterns, control dynamics, guest distress, cash behavior, staff observations, and unusual requests.
Play the lesson aloud and follow the highlighted text. You can pause, replay, and adjust the speed.
The module teaches staff to notice repeated short stays, frequent cash extensions, requests to avoid normal registration steps, third-party control of identification, and one person answering for another who appears fearful or unable to speak independently.
Housekeepers and maintenance staff often see high linen turnover, excessive room traffic, privacy barriers, unusual damage, or guests who avoid eye contact and seem closely monitored. The course teaches staff to report patterns without making personal accusations.
The lesson separates ordinary hotel behavior from patterns that should be escalated. A single request for towels, a cash payment, or a refusal of housekeeping is not enough by itself. Concern increases when several details appear together: a person appears submissive, fearful, tense, or paranoid; has physical injuries or branding such as a name tattoo; defers to another person when answering questions; works but lacks control over money or identification documents; is unsure about who they are with and what they are doing; works excessive hours and lives where they work; wears clothing that is inappropriate for weather conditions or the situation; has multiple phones or social media accounts; faces repeated visitors, isolation, scripted answers, fear of leaving, or makes a quiet request for help when the controlling person is not present.
The course also covers labor concerns such as workers transported together under control, withheld identification, signs of debt pressure, poor living conditions tied to the job, a person who works excessive hours and lives where they work, or a contractor group that appears unable to leave or speak freely.
The course calls out workers who may be less visible to guests but still part of lodging operations: cleaning crews, laundry workers, maintenance teams, landscaping, security, temporary labor, and staffing-agency workers. Indicators may include a leader who will not let workers speak, workers transported as a group with no control over documents or pay, unpaid or withheld wages, threats tied to housing or immigration status, or unsafe living conditions linked to the job. Managers are told to handle these concerns through documented vendor and safety protocols.
The learner practices combining observations from different departments. A front desk employee may notice one person controlling payment and identification. Housekeeping may notice repeated visitors, refusal of service, or a guest who appears distressed. Maintenance may notice damage, blocked sight lines, or a worker who seems monitored by a contractor lead. Security may notice repeated vehicle traffic. None of these facts proves trafficking by itself, but together they can justify careful escalation.
Teaches what staff should do, what they should avoid, when to escalate to management, and how to make a usable report.
Play the lesson aloud and follow the highlighted text. You can pause, replay, and adjust the speed.
If there is an immediate threat, violence, or medical emergency, the correct action is emergency response. The training is careful not to encourage confrontation, rescue attempts, or behavior that could increase danger to staff or possible victims.
The course gives staff a safer response script: stay calm, avoid drawing attention, use normal business reasons to step away if needed, notify the designated supervisor, and keep the possible victim's privacy protected. If help is requested, staff should avoid loud questions, judgmental language, promises of secrecy, or actions that alert the suspected controller. If the person is in immediate danger, has urgent medical needs, or a minor may be involved, emergency response takes priority.
Staff are taught to record objective details: dates, times, room numbers, descriptions, observed interactions, vehicle information if visible, and which employee role observed the concern. The course specifically avoids rumors, labels, or dramatic assumptions.
The learner sees the difference between a useful note and an unsafe accusation. A weak note says, 'The guest looked suspicious.' A stronger note says, 'At 10:35 p.m., one adult held another adult's identification, answered all registration questions, and the second adult appeared fearful and did not speak.' Objective notes help managers and law enforcement evaluate facts while reducing bias, gossip, and unnecessary exposure of private information.
If a possible victim quietly asks for help, staff are taught to keep the interaction calm, avoid alerting the suspected controller, involve management through the property's safety protocol, call 911 for immediate danger, and offer the National Human Trafficking Hotline when confidential victim assistance is appropriate. Staff should not promise secrecy, conduct their own rescue, post about the incident, or confront the suspected trafficker.
Frontline staff escalate to the supervisor or manager path defined by the property. Managers receive an overlay on when to contact law enforcement, when to preserve documentation, and how to keep follow-through professional and non-retaliatory.
The course makes the boundaries clear. Staff should not accuse a guest, detain a person, threaten a suspected trafficker, photograph victims for curiosity, post about the incident, share details with coworkers who do not need to know, or promise an outcome they cannot control. The safer role is to preserve immediate safety, record objective facts, escalate through the property procedure, and use emergency, law-enforcement, or hotline resources when the situation calls for them.
Points staff toward hotline and law-enforcement escalation resources while showing how observations should be documented accurately.
Play the lesson aloud and follow the highlighted text. You can pause, replay, and adjust the speed.
The module identifies the Texas channels reviewers expect to see: 911 for emergencies, iWatchTX for law-enforcement intelligence, local law enforcement when the property protocol calls for it, and the National Human Trafficking Hotline for victim assistance and confidential support.
The course explains how each resource is used. Call 911 for immediate danger, violence, urgent medical needs, or an emergency involving a minor. Use local law enforcement through the property's protocol when a report needs official response but is not unfolding as an active emergency. Use iWatchTX for suspicious activity information that may support law-enforcement intelligence. Use the National Human Trafficking Hotline for confidential victim assistance, safety planning, and referrals when that resource is appropriate.
The course explains that the training must address required trafficking signage and must use the required protection statement: employees may not be disciplined, retaliated against, or otherwise discriminated against for making a good faith report of a suspected act of human trafficking.
The training tells employees that signage is part of the property's compliance environment, but it does not replace training, reporting, or safe response. Staff should know where required signs are placed, keep them visible according to property procedure, and tell a manager if a sign is missing, damaged, blocked, or outdated. The point is not decoration; signs help victims and staff find resources quickly while the training teaches employees how to act on concerns safely.
The manager add-on section closes the course by showing how a property should preserve the report, document follow-up steps, avoid retaliation, retain paper or electronic certificate copies for each trained employee, and make records available to the Texas OAG or law enforcement when required.
The final screen reminds learners and hotel managers that the training is an annual requirement for covered employees. The completion record should show the learner name, employer or property, language version, completion date, course version, active-time gate, final assessment result, certificate identifier, and any manager path completed. Those records help the property demonstrate that training was completed and that certificate release was tied to the required course controls.
Confirm that the final exam, certificate gate, standards crosswalk, survivor consultation, accessibility posture, and supporting materials are ready for OAG review.
The student course requires at least 26 minutes of active course time before final completion and certificate release. The reviewer preview shows the gate without making the reviewer wait.
Learners must move through every module in order, view all required content, complete lesson knowledge checks, and reach the final completion checkpoint before a certificate becomes available.
The planned student exam delivers 10 scored questions from a 20-question bank with an 80 percent passing threshold and immediate remediation before a retake.
The certificate is withheld until the learner has completed the full course path, passed the final knowledge check, and affirmed completion of all coursework.
The review page now shows the full web-based course content, including every lesson section, expected learner outcomes, knowledge checks, answer explanations, final assessment preview, certificate fields, and standards crosswalk. It is not limited to a high-level module outline.
Course design is informed by Ankur Fadia, MD's direct clinical care and consultation involving many suspected and confirmed human-trafficking victims across a 15-year physician career. Patient names, identifying details, and case facts are not disclosed because of HIPAA and medical privacy obligations.
The training uses survivor-informed themes such as fear, control, dependency, medical vulnerability, shame, safety planning, and non-confrontational response without graphic imagery, blame, stereotypes, or confidential information.
The reviewer and course pages use text-first content, headings, readable tables, descriptive links, and high-contrast controls to support WCAG 2.1 AA review. Complete English and Spanish PDFs are included in the packet for offline review.
The Texas application asks for a survivor consultant name and email. The resubmission packet identifies Ragan Tawney, rtawney347@gmail.com, as the survivor consultant and includes her signed attestation scan plus written email confirmation approving the use of her name and email for the OAG application.
The student course delivers 10 scored questions from this 20-question bank. Answers are shown here so the OAG can review alignment.
Course content across modules 2 through 4, the standards crosswalk, and final exam questions 2 through 6.
Course content across modules 4 and 5, the reporting contacts section, the reviewer page, and final exam questions 7 through 9.
Reviewer page, standards crosswalk, certificate sample, FAQ, and final exam questions 10, 19, and 20.
Use for immediate danger, medical emergency, or when a victim needs urgent safety intervention.
Use when staff have suspicious-activity information related to trafficking for Texas law enforcement.
Use when a victim requests help, safety planning, shelter, referral, or confidential support.
The course instructs staff to follow the property reporting chain while avoiding confrontation with traffickers or suspected controllers.