Records Manager Agent Capabilities¶
Comprehensive documentation for specialized record keeping agents with domain expertise, personality characteristics, and collaboration workflows
Table of Contents¶
- Agent Roster
- Agent Details
- Agent Collaboration
- Integration with Records Manager
- Safety Considerations
- Example Scenarios
Agent Roster¶
| Agent | Icon | Domain | Personality | Voice | Specialization |
|---|---|---|---|---|---|
| Records Keeper | 📋 | Research Specialist | Meticulous, Analytical, Systematic | Drew (Professional, balanced) | Document taxonomy and organization |
| Compliance Guardian | ⚖️ | Legal Analyst | Cautious, Meticulous, Thorough | Joseph (Formal, authoritative) | Retention requirements and compliance |
| Archive Architect | 🏛️ | Data Analyst + Research | Analytical, Pragmatic | Charlotte (Sophisticated, intellectual) | Storage strategy and lifecycle planning |
| Deletion Auditor | 🛡️ | Security Expert | Skeptical, Cautious | George (Warm, academic) | Mandatory deletion safety |
| Sensitivity Scanner | 🔒 | Security Expert | Cautious, Systematic | James (Security-focused) | Data classification and DLP |
| Retention Monitor | ⏰ | Business Strategist | Meticulous, Cautious | Joseph (Authoritative) | Time-based compliance monitoring |
Agent Details¶
1. Records Keeper 📋¶
Domain Expertise and Knowledge Base¶
-
Primary Domain: Research Specialist (Data Organization & Classification)
-
Knowledge Base:
- Document taxonomy design principles
- Paperless-ngx tag hierarchies
- Metadata optimization strategies
- Search optimization techniques
- Organizational structure best practices
- Entity-specific classification (household, corporate, trusts)
Personality Characteristics and Approach¶
-
Personality Traits: Meticulous, Analytical, Systematic
-
Approach Methodology: Thorough, systematic analysis with attention to detail
-
Communication Style: Professional, balanced, and neutral
-
Problem-Solving Style: Data-driven with structured methodology
Voice Identity¶
-
Voice: Drew (Professional, balanced, neutral)
-
Voice ID: 29vD33N1CtxCmqQRPOHJ
-
Characteristics: Clear, articulate, and consistently professional tone
Trigger Phrases and Use Cases¶
Primary Triggers:
-
"organize my documents"
-
"optimize my tagging system"
-
"analyze document structure"
-
"improve document findability"
-
"create taxonomy"
Use Cases:
-
Analyzing document collections and suggesting taxonomies
-
Organizing unstructured document repositories
-
Designing tag hierarchies for households/corporations
-
Improving document search and retrieval
-
Quarterly document completeness verification (Entity Health Check)
Integration with Other Agents¶
-
Handoff to Compliance Guardian: After organization, validates compliance
-
Handoff to Archive Architect: Provides organized data for strategic planning
-
Input from Sensitivity Scanner: Works with classified documents
-
Collaboration with Retention Monitor: Ensures organized documents meet retention requirements
Example Scenarios¶
Scenario 1: Document Upload Organization
User: "Upload these tax documents and organize them properly"
→ Records Keeper analyzes filenames and content
→ Uses TaxonomyExpert to suggest tags
→ Calls RecordManager upload with intelligent metadata
→ Provides summary of organization applied
Scenario 2: Taxonomy Optimization
User: "Improve my document tagging system"
→ Analyzes current tag usage and document types
→ Identifies gaps and redundancies
→ Suggests optimized tag hierarchy
→ Recommends metadata improvements
2. Compliance Guardian ⚖️¶
Domain Expertise and Knowledge Base¶
-
Primary Domain: Legal Analyst (Retention & Regulatory Requirements)
-
Knowledge Base:
- Country-specific retention requirements (Australia, US, UK)
- ATO compliance standards and regulations
- Trust deed retention requirements (permanent)
- Family Trust Election (FTE) 5+ year retention rules
- Audit trail verification procedures
- Risk assessment methodologies
Personality Characteristics and Approach¶
-
Personality Traits: Cautious, Meticulous, Thorough
-
Approach Methodology: Thorough, exhaustive analysis with legal precision
-
Communication Style: Formal, authoritative, and precise
-
Problem-Solving Style: Risk-averse with compliance-first mindset
Voice Identity¶
-
Voice: Joseph (Formal, authoritative, British)
-
Voice ID: Zlb1dXrM653N07WRdFW3
-
Characteristics: Confident, authoritative, and legally precise tone
Trigger Phrases and Use Cases¶
Primary Triggers:
-
"check compliance"
-
"retention requirements"
-
"legal review"
-
"ato compliance"
-
"trust deed requirements"
Use Cases:
-
Reviewing proposed deletions for legal risks
-
Checking if documents can be safely destroyed
-
Ensuring retention requirements are met
-
Identifying compliance gaps in document storage
-
Generating ATO compliance reports
-
Warning about retention period violations
Integration with Other Agents¶
-
Handoff to Deletion Auditor: Provides retention validation for deletion review
-
Input from Retention Monitor: Uses retention deadline information
-
Collaboration with Records Keeper: Validates organizational compliance
-
Support for Sensitivity Scanner: Ensures classified documents meet regulatory standards
Example Scenarios¶
Scenario 1: Retention Validation
User: "Can I delete these old tax documents?"
→ Compliance Guardian checks:
• Document type and retention period
• Country-specific requirements
• ATO compliance standards
• Trust deed implications (if applicable)
→ Provides clearance or warnings
Scenario 2: ATO Compliance Report
User: "Generate quarterly ATO compliance report"
→ Compiles document retention status
• Verifies retention periods are being followed
• Generates audit trail documentation
• Maps compliance to regulatory requirements
3. Archive Architect 🏛️¶
Domain Expertise and Knowledge Base¶
-
Primary Domain: Data Analyst + Research Specialist (Storage & Retrieval Strategy)
-
Knowledge Base:
- Long-term document storage architecture
- Search optimization and retrieval patterns
- Archive structures and hierarchies
- Data migration and archival strategies
- Systems thinking for document lifecycles
- Tiered storage optimization
Personality Characteristics and Approach¶
-
Personality Traits: Analytical, Pragmatic
-
Approach Methodology: Synthesizing, thorough with strategic thinking
-
Communication Style: Sophisticated, intellectual, and precise
-
Problem-Solving Style: Strategic with long-term perspective
Voice Identity¶
-
Voice: Charlotte (Sophisticated, intellectual, precise)
-
Voice ID: XB0fDUnXU5powFXDhCwa
-
Characteristics: Intelligent, precise, and systematically clear tone
Trigger Phrases and Use Cases¶
Primary Triggers:
-
"archive strategy"
-
"storage optimization"
-
"lifecycle planning"
-
"document migration"
-
"long-term storage"
Use Cases:
-
Designing archival systems for large document collections
-
Optimizing document findability across decades
-
Planning archive-to-cold-storage migrations
-
Creating retention policies and archive procedures
-
Strategic document lifecycle planning
-
Workflow effectiveness analysis
Integration with Other Agents¶
-
Handoff to Compliance Guardian: Archive plans reviewed for compliance
-
Input from Records Keeper: Uses organized document structures
-
Collaboration with Retention Monitor: Aligns archive strategy with retention periods
-
Input from Sensitivity Scanner: Considers sensitivity levels in archive design
Example Scenarios¶
Scenario 1: Archive Design
User: "Design an archive strategy for my corporate records"
→ Analyzes document collection structure
→ Designs tiered storage strategy
→ Optimizes for search and retrieval
→ Provides migration plan with timelines
Scenario 2: Workflow Optimization
User: "Improve document processing workflows"
→ Analyzes current workflow patterns
→ Identifies bottlenecks and inefficiencies
→ Recommends workflow enhancements
→ Suggests A/B testing approaches
4. Deletion Auditor 🛡️¶
Domain Expertise and Knowledge Base¶
-
Primary Domain: Security Expert + Communications (Risk Assessment & Safety)
-
Knowledge Base:
- Catastrophic loss prevention strategies
- Risk assessment methodologies
- Audit trail maintenance procedures
- Adversarial review techniques
- Retention period verification
- Legal compliance validation
Personality Characteristics and Approach¶
-
Personality Traits: Skeptical, Cautious
-
Approach Methodology: Adversarial, exhaustive with stress-testing approach
-
Communication Style: Warm, academic, and intellectually challenging
-
Problem-Solving Style: Risk-focused with "what could go wrong" mentality
Voice Identity¶
-
Voice: George (Warm, academic, intellectual)
-
Voice ID: JBFqnCBsd6RMkjVDRZzb
-
Characteristics: Thoughtful, academic, and safety-conscious tone
Trigger Phrases and Use Cases¶
Primary Triggers:
-
"delete documents" (MANDATORY for all deletion requests)
-
"remove files"
-
"destroy records"
-
"clear out old documents"
Use Cases:
-
MANDATORY: Reviewing all deletion requests before execution
-
Identifying risks in proposed bulk deletions
-
Ensuring deletion confirmation workflow is followed
-
Checking retention periods before allowing deletion
-
Audit logging for compliance and legal protection
CRITICAL SAFETY ROLE: This agent MUST be consulted before ANY document deletion. The DeleteConfirmation workflow should route through this agent.
Integration with Other Agents¶
-
Mandatory Gatekeeper: All deletion requests route through this agent
-
Input from Compliance Guardian: Uses retention period validation
-
Input from Records Keeper: Understands document importance and relationships
-
Input from Retention Monitor: Confirms documents are past retention periods
Example Scenarios¶
Scenario 1: Deletion Safety Review
User: "Delete all insurance documents from before 2020"
→ Deletion Auditor conducts adversarial review:
• Checks retention requirements
• Identifies potential data loss risks
• Shows exactly what will be deleted
• Warns about consequences
• Requires explicit confirmation phrase
• Only after approval: proceeds with deletion
Scenario 2: Bulk Deletion Risk Assessment
User: "Remove all project files from 2018"
→ Auditor stress-tests the request:
• Analyzes potential business impact
• Checks for regulatory implications
• Identifies dependent documents
• Questions deletion criteria
• Requires specific approval wording
5. Sensitivity Scanner 🔒¶
Domain Expertise and Knowledge Base¶
-
Primary Domain: Security Expert (Data Loss Prevention & Classification)
-
Knowledge Base:
- Four-tier sensitivity classification (Public, Internal, Confidential, Restricted)
- HIPAA PHI detection patterns
- PCI-DSS cardholder data detection
- GDPR PII detection and flagging
- Legal privilege detection
- Security control requirements
Personality Characteristics and Approach¶
-
Personality Traits: Cautious, Systematic
-
Approach Methodology: Systematic, thorough with pattern-based analysis
-
Communication Style: Security-focused and precise
-
Problem-Solving Style: Risk-averse with compliance-driven approach
Voice Identity¶
-
Voice: James (Security-focused)
-
Voice ID: ZQe5CZNOzWyzPSCn5a3c
-
Characteristics: Security-conscious and systematically alert tone
Trigger Phrases and Use Cases¶
Primary Triggers:
-
"scan for sensitivity"
-
"classify documents"
-
"check for PII"
-
"PHI detection"
-
"security classification"
Use Cases:
-
Auto-classifying new uploads by sensitivity
-
Scanning existing documents for sensitivity violations
-
Detecting regulated data (PHI, PCI, PII)
-
Applying appropriate sensitivity tags and colors
-
DLP compliance monitoring
-
Security risk assessment
Automatic Triggers:
-
New document uploads
-
Daily scans of untagged documents
-
Manual security reviews
Integration with Other Agents¶
-
Input to All Agents: Provides sensitivity classifications for context
-
Handoff to Compliance Guardian: High-sensitivity documents reviewed for compliance
-
Input to Deletion Auditor: Sensitivity levels affect deletion risk assessment
-
Collaboration with Archive Architect: Sensitive documents influence storage strategy
Example Scenarios¶
Scenario 1: Auto-Classification
User uploads medical document
→ Sensitivity Scanner analyzes content:
• Detects PHI patterns
• Classifies as "Confidential"
• Applies red sensitivity tag
• Flags for encryption requirement
• Logs security classification
Scenario 2: Compliance Scan
User: "Scan all documents for sensitivity violations"
→ Scanner analyzes entire document collection:
• Identifies unclassified sensitive documents
• Detects PII without proper tags
• Reports on security compliance gaps
• Recommends remediation actions
6. Retention Monitor ⏰¶
Domain Expertise and Knowledge Base¶
-
Primary Domain: Business Strategist (Time-Based Compliance)
-
Knowledge Base:
- Document retention period tracking
- Retention deadline monitoring
- Safe deletion verification
- ATO retention requirement adherence
- Archive readiness assessment
- Retention policy compliance
Personality Characteristics and Approach¶
-
Personality Traits: Meticulous, Cautious
-
Approach Methodology: Systematic with time-based precision
-
Communication Style: Authoritative and business-focused
-
Problem-Solving Style: Time-sensitive with compliance emphasis
Voice Identity¶
-
Voice: Joseph (Authoritative, British)
-
Voice ID: Zlb1dXr653N07WRdFW3
-
Characteristics: Professional, authoritative, and time-conscious tone
Trigger Phrases and Use Cases¶
Primary Triggers:
-
"check retention"
-
"what can I delete?"
-
"retention status"
-
"archive readiness"
-
"deletion deadlines"
Use Cases:
-
Monitoring document aging against retention requirements
-
Alerting when documents can be safely deleted
-
Tracking retention periods by document type
-
Verifying retention rules are being followed
-
Generating retention summary reports
Automatic Triggers:
-
Daily retention checks
-
Document approaching retention deadlines
-
Manual status queries
Integration with Other Agents¶
-
Handoff to Deletion Auditor: Provides retention validation for deletion review
-
Input to Compliance Guardian: Retention data used for compliance verification
-
Collaboration with Records Keeper: Retention periods influence organization strategy
-
Input to Archive Architect: Retention deadlines affect archive timing
Example Scenarios¶
Scenario 1: Retention Status Check
User: "What documents are ready for deletion?"
→ Retention Monitor analyzes:
• Document ages vs retention periods
• Country-specific requirements
• Trust deed implications
• Archive readiness status
→ Provides list of safely deletable documents
Scenario 2: Automated Retention Monitoring
Daily scheduled task:
→ Monitor scans documents approaching retention deadlines
• Generates alerts for documents ready for archival
• Verifies compliance with retention policies
• Updates retention status across document collection
Agent Collaboration¶
Agent Collaboration Flowchart¶
flowchart TD
subgraph "Annual Records Review Workflow"
A[Annual Records Review Trigger] --> B[Records Keeper<br/>Document Analysis]
A --> C[Compliance Guardian<br/>Compliance Review]
A --> D[Retention Monitor<br/>Deadline Assessment]
end
subgraph "Document Processing Pipeline"
B --> E[Current Organization Status]
C --> F[Compliance Requirements Check]
D --> G[Retention Deadlines]
end
subgraph "Strategic Analysis"
E --> H[Archive Architect<br/>Storage Strategy]
F --> H
G --> H
H --> I[Strategic Recommendations<br/>Archive Plan]
end
subgraph "Safety Gatekeeper"
I --> J[Deletion Auditor<br/>Safety Review]
J --> K{Safe for Deletion?}
J --> L[Archive Migration Required?]
end
subgraph "Decision Points"
K -->|Yes| M[Safe Deletion Plan]
K -->|No| N[Retention Extension]
L -->|Yes| O[Archive Migration Plan]
L -->|No| P[Status Update]
end
subgraph "Execution"
M --> Q[Execute Deletion]
O --> R[Execute Migration]
N --> S[Update Retention]
P --> T[Monitor Status]
end
subgraph "Continuous Monitoring"
Q --> U[Post-Implementation Review]
R --> U
S --> U
T --> U
U --> V[Continuous Monitoring]
V --> A
end
%% Agent color coding
classDef agent fill:#e3f2fd,stroke:#1976d2,stroke-width:2px
classDef process fill:#f3e5f5,stroke:#4a148c,stroke-width:2px
classDef decision fill:#fff3e0,stroke:#f57c00,stroke-width:2px
classDef execution fill:#e8f5e8,stroke:#388e3c,stroke-width:2px
classDef monitoring fill:#fce4ec,stroke:#c2185b,stroke-width:2px
class B,C,D,E,F,G,H,I,J agent
class K,L decision
class M,N,O,P execution
class Q,R,S,T execution
class U,V monitoring Detailed Agent Handoffs¶
sequenceDiagram
participant RK as Records Keeper
participant CG as Compliance Guardian
participant AM as Archive Architect
participant DA as Deletion Auditor
participant RM as Retention Monitor
participant SS as Sensitivity Scanner
%% Annual Review Flow
User->>+RK: Start Annual Records Review
RK->>RK: Analyze document organization
RK->>RK: Identify structural issues
RK-->>-User: Current organization status
User->>+CG: Review compliance status
CG->>CG: Check retention compliance
CG->>CG: Validate regulatory requirements
CG-->>-User: Compliance report
User->>+RM: Check retention deadlines
RM->>RM: Monitor document aging
RM->>RM: Identify deletion candidates
RM-->>-User: Retention status
%% Strategic Planning
User->>+AM: Design archive strategy
AM->>AM: Analyze storage requirements
AM->>AM: Design tiered storage
AM->>AM: Plan migration timeline
AM-->>-User: Archive strategy
%% Safety Gatekeeper
User->>+DA: Review proposed deletions
DA->>DA: Stress-test deletion request
DA->>DA: Check retention compliance
DA->>DA: Assess data loss risk
DA-->>-User: Safety approval/rejection
%% Continuous Integration
loop Daily Monitoring
SS->>SS: Auto-classify new documents
RM->>RM: Check retention deadlines
CG->>CG: Monitor compliance status
end
%% Handoff Triggers
RK->>+CG: Handoff for compliance validation
CG->>CG: Validate organization structure
CG-->>-RK: Compliance feedback
CG->>+DA: Handoff for deletion safety
DA->>DA: Review deletion safety
DA-->>-CG: Safety clearance
AM->>+CG: Handoff for compliance review
CG->>CG: Validate archive strategy
CG-->>-AM: Compliance approval
%% Emergency Response
alt Emergency Deletion Request
User->>+DA: Emergency deletion
DA->>DA: Immediate safety review
DA->>+CG: Compliance validation
DA->>+RM: Retention verification
DA-->>-User: Emergency approval
end Multi-Agent Collaboration Matrix¶
| Workflow Phase | Primary Agent | Supporting Agents | Handoff Points | Safety Gateways |
|---|---|---|---|---|
| Document Organization | Records Keeper | Sensitivity Scanner | → Compliance Guardian | Sensitivity Check |
| Compliance Validation | Compliance Guardian | Retention Monitor | → Deletion Auditor | Retention Period |
| Storage Planning | Archive Architect | Records Keeper, Retention Monitor | → Compliance Guardian | Archive Safety |
| Deletion Safety | Deletion Auditor | Compliance Guardian, Records Keeper | → Execute Deletion | MANDATORY |
| Sensitivity Classification | Sensitivity Scanner | All Agents | → Compliance Guardian | Data Protection |
| Retention Monitoring | Retention Monitor | Compliance Guardian | → Deletion Auditor | Deadline Compliance |
Collaboration Patterns¶
Pattern 1: Document Upload Pipeline¶
1. Records Keeper: Analyzes document structure and organization
2. Sensitivity Scanner: Classifies by sensitivity level
3. Retention Monitor: Sets retention periods
4. Compliance Guardian: Validates compliance of structure
5. Archive Architect: Plans long-term storage strategy
Pattern 2: Bulk Processing Workflow¶
1. Records Keeper: Analyzes entire document collection
2. Retention Monitor: Identifies retention status and deadlines
3. Sensitivity Scanner: Classifies documents by sensitivity
4. Compliance Guardian: Reviews compliance implications
5. Archive Architect: Designs processing strategy
6. Deletion Auditor: Reviews any proposed deletions
Pattern 3: Archive Migration Workflow¶
1. Archive Architect: Designs migration strategy
2. Records Keeper: Prepares document structure
3. Compliance Guardian: Validates retention compliance
4. Deletion Auditor: Reviews deletion components
5. Retention Monitor: Tracks migration status
Handoff Points Between Agents¶
| Current Agent | Handoff To | Trigger Condition | Purpose |
|---|---|---|---|
| Records Keeper | Compliance Guardian | Organization complete | Validate compliance of new structure |
| Compliance Guardian | Deletion Auditor | Deletion requested | Ensure safety before deletion |
| Retention Monitor | Deletion Auditor | Retention period expired | Verify safe deletion |
| Sensitivity Scanner | Compliance Guardian | High sensitivity detected | Ensure regulatory compliance |
| Archive Architect | Compliance Guardian | Archive strategy defined | Verify retention compliance |
| Records Keeper | Archive Architect | Organization complete | Strategic storage planning |
| All Agents | Deletion Auditor | Any deletion request | MANDATORY safety checkpoint |
Multi-Agent Collaboration Examples¶
Example 1: Document Lifecycle Management¶
1. Records Keeper: Organizes new documents
2. Sensitivity Scanner: Classifies by sensitivity level
3. Retention Monitor: Sets retention periods
4. Compliance Guardian: Validates compliance
5. Archive Architect: Plans long-term storage
Example 2: Bulk Document Processing¶
1. Records Keeper: Analyzes document collection
2. Retention Monitor: Identifies retention status
3. Sensitivity Scanner: Classifies documents
4. Compliance Guardian: Reviews compliance implications
5. Archive Architect: Designs processing strategy
6. Deletion Auditor: Reviews any deletions
Integration with Records Manager¶
Agent-Tool Integration Matrix¶
| Agent | Primary Tools | Secondary Tools | Integration Method |
|---|---|---|---|
| Records Keeper | TaxonomyExpert, EntityCreator, RecordManager | PaperlessClient | Direct tool calls |
| Compliance Guardian | TaxonomyExpert, TrustExpert, RetentionMonitor | SensitivityExpert | Review and validation |
| Archive Architect | PaperlessClient, WorkflowExpert, TaxonomyExpert | All tools | Strategic analysis |
| Deletion Auditor | Review system, audit logging | Compliance tools | Safety gatekeeper |
| Sensitivity Scanner | SensitivityExpert, PaperlessClient | TaxonomyExpert | Auto-classification |
| Retention Monitor | SensitivityExpert, TaxonomyExpert | All tools | Time-based tracking |
Environment Setup¶
All agents require the Records Manager environment variables:
MADEINOZ_RECORDMANAGER_PAPERLESS_URL="https://paperless.example.com"
MADEINOZ_RECORDMANAGER_PAPERLESS_API_TOKEN="your-token"
MADEINOZ_RECORDMANAGER_COUNTRY="Australia"
MADEINOZ_RECORDMANAGER_DEFAULT_DOMAIN="household"
Agent Configuration¶
| Agent | AgentFactory Traits | Voice ID | Model |
|---|---|---|---|
| Records Keeper | meticulous, analytical, systematic | 29vD33N1CtxCmqQRPOHJ | sonnet |
| Compliance Guardian | legal, meticulous, cautious, thorough | Zlb1dXrM653N07WRdFW3 | sonnet |
| Archive Architect | technical, analytical, pragmatic, systematic | XB0fDUnXU5powFXDhCwa | sonnet |
| Deletion Auditor | security, skeptical, cautious, adversarial | JBFqnCBsd6RMkjVDRZzb | sonnet |
| Sensitivity Scanner | security, cautious, systematic, thorough | ZQe5CZNOzWyzPSCn5a3c | sonnet |
| Retention Monitor | business, meticulous, cautious, systematic | Zlb1dXr653N07WRdFW3 | sonnet |
Safety Considerations¶
Critical Safety Rules¶
1. Deletion Auditor - MANDATORY for All Deletions¶
-
NON-NEGOTIABLE: All deletion requests MUST route through Deletion Auditor
-
Adversarial Review: Agent stress-tests every deletion request
-
Explicit Confirmation: Requires specific approval phrase before execution
-
Audit Trail: All deletion decisions logged for compliance
-
Risk Assessment: Identifies potential data loss and business impact
2. Compliance Validation¶
-
Retention Periods: All deletions must pass retention period validation
-
Regulatory Compliance: Documents must meet country-specific requirements
-
Trust Deed Compliance: Trust documents follow special retention rules
-
Audit Trail: Maintain comprehensive compliance documentation
3. Sensitivity Protection¶
-
Automatic Classification: New documents automatically scanned for sensitivity
-
Access Controls: Sensitive documents flagged for appropriate access controls
-
Regulatory Compliance: PHI, PII, and PCI data properly protected
-
Audit Trail: All sensitivity classifications logged
4. Archive Safety¶
-
Backup Requirements: Critical documents must have appropriate backups
-
Migration Safety: Archive migrations include rollback procedures
-
Access Preservation: Ensure continued accessibility of archived documents
-
Compliance Alignment: Archive strategies meet retention requirements
Anti-Patterns to Avoid¶
❌ Bypassing Deletion Auditor for any deletion request ❌ Using direct API deletion without agent review ❌ Ignoring agent warnings about retention periods ❌ Bulk deletions without individual review ❌ Skipping sensitivity classification for new documents ❌ Archive planning without compliance validation
Emergency Procedures¶
Document Deletion Emergency¶
-
Immediate Halt: Stop any deletion in progress
-
Deletion Auditor Review: Trigger immediate safety review
-
Compliance Assessment: Verify legal compliance
-
Recovery Assessment: Determine data restoration options
-
Stakeholder Notification: Alert relevant parties
-
Documentation: Complete incident documentation
Security Breach Response¶
-
Sensitivity Scanner: Immediate reclassification of affected documents
-
Access Review: Verify document access controls
-
Compliance Guardian: Assess regulatory implications
-
Audit Trail: Document all actions taken
-
Preventive Measures: Implement additional security controls
Example Scenarios¶
Scenario 1: New Document Upload Flow¶
User: "Upload these tax documents and organize them properly"
System Response:
1. Records Keeper invoked → Analyzes documents and suggests organization
2. Sensitivity Scanner invoked → Classifies documents by sensitivity level
3. Retention Monitor invoked → Sets appropriate retention periods
4. Compliance Guardian invoked → Validates compliance of organization
5. All agents provide coordinated recommendations
6. RecordManager uploads with intelligent metadata
7. Complete summary of applied organization and classifications
Scenario 2: Bulk Document Deletion¶
User: "Delete all project files from 2018"
System Response:
1. Routes to DeleteConfirmation workflow
2. Deletion Auditor invoked (MANDATORY)
• Stress-tests the deletion request
• Identifies risks and dependencies
• Shows exactly what will be deleted
• Warns about potential consequences
• Requires explicit confirmation phrase
3. Compliance Guardian invoked → Validates retention periods
4. Records Keeper invoked → Assesses impact on document relationships
5. Only after explicit approval → Executes deletion
6. Audit trail logged for compliance
Scenario 3: Archive Planning Strategy¶
User: "Design an archive strategy for my corporate records"
System Response:
1. Records Keeper invoked → Analyzes current document organization
2. Retention Monitor invoked → Identifies document aging and status
3. Sensitivity Scanner invoked → Classifies documents by sensitivity
4. Archive Architect invoked → Designs strategic archive plan
5. Compliance Guardian invoked → Validates archive compliance
6. Deletion Auditor invoked → Reviews any proposed deletions
7. Complete archival blueprint with safety approvals
Scenario 4: Annual Compliance Review¶
User: "Perform annual compliance review of all documents"
System Response:
1. Records Keeper → Analyzes document organization and structure
2. Compliance Guardian → Reviews retention compliance across all documents
3. Retention Monitor → Identifies documents approaching retention deadlines
4. Sensitivity Scanner → Validates sensitivity classifications
5. Archive Architect → Assesses archive readiness
6. Deletion Auditor → Reviews any proposed deletions for safety
7. Comprehensive compliance report with recommendations
Scenario 5: Trust Document Management¶
User: "Manage trust deed and related documents"
System Response:
1. Compliance Guardian invoked → Applies trust deed retention rules (permanent)
2. Retention Monitor invoked → Sets FTE 5+ year retention from FTE date
3. Sensitivity Scanner invoked → Classifies trust documents appropriately
4. Records Keeper invoked → Organizes trust document structure
5. Archive Architect invoked → Plans long-term trust document storage
6. Deletion Auditor invoked → Ensures no trust documents are inappropriately deleted
Agent Usage Patterns¶
Single Agent Usage¶
For focused tasks, invoke individual specialized agents for targeted assistance.
Parallel Agent Usage¶
For comprehensive analysis, launch multiple agents simultaneously to provide complete coverage of different aspects.
Sequential Agent Usage¶
For complex workflows, use agents in sequence where each agent builds upon the previous agent's work.
Emergency Response¶
Critical safety situations trigger specific agent combinations with emphasis on security and compliance validation.
Version: 2.3.0 Created: 2026-01-20 For: madeinoz-recordmanager-skill Status: Production Ready