Part Six · 6 min read

When the Framework Is Applied

A behavior-based comparison: the school's own chart, placed next to the school's own documented reports.

By Joe & Sharon Byerly Published April 26, 2026 Reading time 6 min read Download chart (PDF) ↓

This is not presented as a definitive conclusion, nor as a replacement for a formal investigation.

It is a straightforward application of the framework that was shared with families — placing documented observations alongside the categories provided, and allowing readers to consider where alignment may exist.

Along with Christine's email to TSIS staff and families, a chart was shared that distinguishes between mentoring behaviors and grooming behaviors.

It presents clear categories of concern:

  • boundary violations
  • emotional dependency
  • exclusive access
  • personal disclosure
  • favoritism
  • gift-giving

It is meant to help identify patterns.

So a natural question follows:

What happens when that same framework is applied to the documented reports already collected by the school?

A Note on Scope

What follows is based on:

  • Documented reports collected during the school's own process
  • Multiple sources (students and adults)
  • Observations repeated across time

This is critical:

This is a behavior-based comparison, not an assertion of intent.

The chart itself evaluates behavior patterns — not motive.

Where the Alignment Becomes Clear

When the chart is placed next to the documented reports, multiple categories in the grooming column are reflected in the reported behavior.

1.Support That Becomes Dependency

ChartMeeting needs in a way that creates reliance.

Documented pattern
  • Repeated provision of rides, time, and access
  • Students' increased reliance on Cecily over peers or other adults
  • Cecily becoming a primary relational support figure

Why this mattersThis moves beyond support into relational centralization, where one adult becomes disproportionately important.

2.Physical Boundary Violations

ChartBoundary-crossing physical contact.

Documented pattern
  • Sitting on laps
  • Lying on each other
  • Extended physical closeness across settings
  • Repeated descriptions of physical interaction as unusual, uncomfortable, or inappropriate for a teacher-student dynamic

Why this mattersThis is one of the most consistently reported areas, across multiple observers.

3.Trust That Expands Access

ChartBuilding trust with families to increase access.

Documented pattern
  • Cecily functioning as a trusted mentor and a close relational figure within a family context
  • Participation in family life, travel, and regular out-of-school interaction

Why this mattersThis level of trust resulted in expanded, informal access beyond normal school boundaries.

4.Exclusive Access and One-on-One Dynamics

ChartIsolating the child physically or emotionally.

Documented pattern
  • Frequent one-on-one time outside structured environments
  • Ongoing communication outside school hours
  • Situations where access to Cecily appeared to be unevenly distributed, with a consistent pattern of interaction centered around a small subset of students

Why this mattersThe pattern reflects relational exclusivity, not just occasional interaction.

5.Relationship Extending Beyond Its Context

ChartInserting into a child's life beyond appropriate boundaries.

Documented pattern
  • Social outings
  • Personal projects
  • Ongoing digital communication
  • Interaction spanning multiple areas of life

Why this mattersThe relationship became multi-contextual, not limited to a teacher-student role.

6.Repeated Access Outside Structured Oversight

ChartConsistent time outside normal supervision.

Documented pattern
  • Driving one-on-one
  • Frequent in-person time outside school structures
  • Regular interaction beyond formal settings

Why this mattersThe concern here is frequency and pattern, not secrecy alone.

7.Blurring of Roles

ChartFailure to maintain appropriate adult-child boundaries.

Documented pattern
  • Relationship described as peer-like, friend-like, or familial
  • Cecily not consistently treating students as students first
  • Internal descriptions of codependency

Why this mattersThis reflects a shift in role from educator to peer/emotional figure.

8.Special Attention and Favoritism

ChartDisproportionate attention to specific students.

Documented pattern
  • Repeated preferential treatment
  • Unequal distribution of time and attention
  • Other students reporting confusion, discomfort, or exclusion

Why this mattersThis reinforces relational hierarchy, where certain students are treated as uniquely significant.

9.Relational Dependence

ChartMaintaining a relationship that reduces reliance on others.

Documented pattern
  • Students increasingly oriented around Cecily
  • Peer relationships affected
  • Cecily functioning as a central relational anchor

Why this mattersThis reflects dependency dynamics, even without making claims about intent.

10.Personal Disclosure

ChartSharing inappropriate personal information.

Documented pattern
  • Disclosure of personal struggles, conflict with other adults, and sexual topics or experiences
  • Students describing these disclosures as uncomfortable, unexpected, or inappropriate for the context

Why this mattersThis creates role reversal, where students receive adult-level personal content.

11.Emotional Enmeshment

ChartCreating emotional dependency or role confusion.

Documented pattern
  • Students drawn into emotionally heavy conversations
  • Reports of students absorbing emotional weight
  • Cecily relying on certain students for emotional support
  • Explicit reference to codependent dynamics

Why this mattersThis shifts emotional burden from adult to student.

12.Gift-Giving as Relational Reinforcement

ChartGiving gifts to build closeness.

Documented pattern
  • Repeated giving of personal items, food, clothing, and birthday gifts
  • Gifts directed toward specific students
  • Not evenly distributed across the student body

Why this mattersGift-giving here is part of a broader pattern of targeted relational investment.

13.Self-Identified Overlap

Why this mattersThis reflects awareness of behavioral overlap, independent of later reports.

What This Means

Using the school's own framework: the documented behavior aligns with multiple categories in the grooming column.

Not one category. Not one moment. But a pattern across:

  • physical boundaries
  • emotional boundaries
  • relational exclusivity
  • personal disclosure
  • gift-giving
  • role confusion
  • dependency

The Key Question

At this point, the question is not:

“Can each individual behavior be explained?”

Many of them can.

The question is:

“What pattern do these behaviors form when viewed together?”

Because the chart that was shared with families is specifically designed to answer that question.

Final Observation

The framework exists.

The behaviors are documented.

The alignment is visible.

What remains is whether those pieces are allowed to be considered as a pattern, or only in isolation.

Because that distinction ultimately determines what is recognized — and what is not.

Read alongside

Sharon's April 14 letter and the school's April 23 response are published in full. The previous post, When the Conversation Shifts, examines what happened in the conversation after that response.

Sharon's letter TSIS response