Who
Eligibility and Authorization — Specification v2.0.3
Purpose
This page defines the categories of actors authorized to interact with the system, the basis for their authorization, and the constraints governing role assignment. System access is not available to the general public. Every actor must be individually authorized within the context of a provisioned institutional engagement.
Authorized Actor Categories
The available actor categories and their authority boundaries are determined by the engagement posture. Not all categories are present in every posture. The following describes the principal role categories across the system:
- Engagement Operators. The authority-bearing actors within an engagement — court-appointed officers, regulatory administrators, institutional fiduciaries, or their designated agents. Engagement operators hold primary authority and mutation rights for operations within their assigned posture. The specific title and authority basis vary by engagement type and jurisdiction.
- Counsel. Authorized representatives participating in an engagement in a defined advisory or attestation capacity. Counsel actors are further distinguished by their authorization scope — some may submit materials only, while others hold read-only access with attestation rights. Counsel roles do not carry authority-bearing status.
- Auditors. Institutional or regulatory auditors granted verification access to engagement records. Auditor roles are read-only and are scoped to the specific engagement for which access has been granted.
- Platform Operators. System administrators responsible for engagement provisioning, configuration, and platform-level operations. Platform operators act on behalf of the system operator entity and hold administrative authority that is distinct from engagement-level operational authority.
Eligibility Criteria
System access is contingent upon verified legal standing and specific institutional engagement. Eligibility is determined by the platform operator at provisioning time based on the following criteria:
- The actor must hold a recognized institutional role with respect to the engagement subject matter — regulatory authorization, court appointment, contractual delegation, or institutional fiduciary designation.
- The actor's authorization must be verifiable through external documentation — executed engagement agreements, regulatory filings, court orders, letters of appointment, or equivalent institutional instruments.
- The actor must be individually provisioned with a specific role within a specific engagement. Group access, implied access, and self-registration are not supported.
Role Scoping
Roles are engagement-scoped. An actor's role in one engagement carries no authority, access, or implication in any other engagement. Role assignment is performed by the platform operator and is immutable for the duration of the engagement — roles cannot be escalated, transferred, or inherited.
The system enforces strict separation between role categories. Authority-bearing roles (those with operational mutation authority) are segregated from advisory, read-only, and attestation roles. No role may simultaneously hold mutation authority and independent oversight authority within the same engagement.
Authority Derivation
The system does not create, grant, or expand authority. All authority exercised within the system is derived from external legal instruments — court orders, regulatory mandates, contractual delegations, or statutory appointments. The system enforces the boundaries of externally granted authority; it does not substitute for that authority or extend it beyond its documented scope.
Notice
Unauthorized access attempts are logged. The system does not disclose the existence or non-existence of engagements, roles, or data to unauthorized actors. Access denial does not confirm or deny any underlying state.
Specification Version 2.0.3 — Effective Date: February 2026