Prepare structured escalation packages for engineering, product, security, or leadership with reproduction steps, business impact, and full context. Activate when a support issue needs to go beyond the support team, when writing an escalation document, when evaluating whether a problem warrants escalation, or when tracking follow-through after handing off an issue.
A documented fix or known workaround addresses the problem
The root cause is a configuration or setup error you can correct
The customer needs coaching or training, not a product change
The limitation is documented and an alternative path exists
Historical tickets with the same profile were resolved at the support tier
Escalate When:
Technical barrier: A confirmed defect needs a code-level fix, infrastructure-level investigation is required, or data has been lost or corrupted
Diagnostic ceiling: The issue exceeds support tooling or access, involves a custom deployment, or demands database-level inspection
Widespread harm: Multiple customers are reporting the same problem, production is down, data integrity is compromised, or a security threat exists
Business stakes: A high-value account is at risk, an SLA has been breached or is about to be, or the customer is requesting leadership involvement
Related Skills
Stalled progress: The issue has sat open past SLA, the customer has waited an unreasonable duration, or standard troubleshooting is not advancing
Recurring pattern: Three or more independent reports of the same symptom, a previously-patched issue has resurfaced, or severity is trending upward over time
Escalation Destinations
Support L1 to Support L2
Sender: Frontline support agent
Receiver: Senior support / technical specialists
Trigger: Deeper investigation, specialized product expertise, or advanced debugging is needed
Package contents: Issue summary, troubleshooting already performed, customer context
Sender: Senior support
Receiver: Product management
Trigger: Capability gap causing pain, design-level decision needed, workflow mismatch, competing priorities across customers
Package contents: Customer use case narrative, business impact, request frequency, competitive context if available
Any Tier to Security
Sender: Any support agent
Receiver: Security team
Trigger: Possible data exposure, unauthorized access report, vulnerability disclosure, compliance risk
Package contents: Observations, affected parties/systems, containment measures already taken, urgency rating
Rule: Security escalations skip tier progression entirely -- route immediately regardless of your level.
Any Tier to Leadership
Sender: Typically L2 or a support manager
Receiver: Support leadership or executive staff
Trigger: High-ARR customer signaling churn, SLA breach on a strategic account, cross-functional decision required, policy exception needed, legal or reputational risk
Package contents: Complete business context, revenue exposure, actions taken to date, the specific decision or intervention needed, hard deadline
Escalation Document Structure
Assemble every escalation using this framework:
ESCALATION: [Concise one-line summary]
Severity: [Critical / High / Medium]
Routed to: [Engineering / Product / Security / Leadership]
BUSINESS IMPACT
- Affected customers: [Count and names where relevant]
- Operational effect: [What is broken for them]
- Revenue exposure: [Dollar figure if applicable]
- SLA position: [Compliant / At risk / Breached]
PROBLEM NARRATIVE
[3-5 sentences covering: what is happening, when it began,
how it presents, and how wide the blast radius is]
REPRODUCTION PROCEDURE (for defects)
1. [Step]
2. [Step]
3. [Step]
Expected outcome: [X]
Observed outcome: [Y]
Environment: [Browser, OS, plan tier, feature flags, etc.]
ACTIONS ALREADY TAKEN
1. [What was tried] -> [Outcome]
2. [What was tried] -> [Outcome]
3. [What was tried] -> [Outcome]
CUSTOMER COMMUNICATION STATUS
- Most recent update: [Date and summary]
- Customer expectation: [What they believe will happen and by when]
- Further escalation risk: [Likelihood customer escalates beyond you]
REQUEST
- [Precise ask: investigate / ship a fix / make a decision / approve an exception]
- Hard deadline: [Date/time]
ATTACHMENTS AND REFERENCES
- [Ticket URLs]
- [Internal discussion threads]
- [Log files, screenshots, recordings]
Quantifying Business Impact
Vague escalations get deprioritized. Anchor every escalation with measurable impact across these dimensions:
Dimension
Key Questions
Breadth
How many customers or end users are affected? Is the number growing?
Depth
Are they fully blocked or merely inconvenienced?
Duration
How long has this persisted? When does it become critical?
Revenue
What ARR is exposed? Are pipeline deals at risk?
Reputation
Could this reach social media or press? Is a reference account involved?
Contractual
Are SLA terms being violated? Do contractual penalties apply?
Quick Severity Definitions
Critical: Service down, data at risk, active security incident, or multiple high-value accounts impacted. Demands immediate action.