[Core Modules]

Cross-Agency Sharing Workspace

An investigator at a regional serious crime unit has developed intelligence on a subject that is directly relevant to an active operation at a partner agency.

Module metadata

An investigator at a regional serious crime unit has developed intelligence on a subject that is directly relevant to an active operation at a partner agency.

Back to All Modules

Source reference

content/modules/cross-agency-sharing-workspace.md

Last Updated

Apr 2, 2026

Category

Core Modules

Content checksum

0a2250e8f12bd415

Tags

modulesaicompliance

Overview#

An investigator at a regional serious crime unit has developed intelligence on a subject that is directly relevant to an active operation at a partner agency. Sharing it informally over the phone leaves no record of what was disclosed, to whom, and why. Sharing it through generic file transfer tools provides no structured capture of the operational rationale or the recipient's accountability. What is needed is a governed sharing action: one that records the decision, the reason, the recipient, and the scope, and that can be revoked if circumstances change. That is what the Cross-Agency Sharing Workspace provides.

The workspace is an operational sharing console for teams that need to create, receive, review, and revoke information shares across organisational boundaries. It provides structured invitation workflows, received-share visibility, audit logging, and revocation control in one place so investigators, administrators, and external-collaboration coordinators can manage sensitive sharing relationships without relying on ad hoc coordination.

This workspace differs from generic external document sharing because it is designed around operational information exchange, partner traceability, and action-level auditability.

Diagram

flowchart TD
    A[Investigator Initiates Share] --> B[Structured Invitation Workflow]
    B --> C[Reason & Rationale Captured]
    C --> D[Recipient Agency Access Granted]
    D --> E[Audit Event Logged]
    E --> F{Access Review}
    F -- Still Required --> G[Share Active]
    F -- No Longer Required --> H[Revocation Action]
    H --> I[Revocation Logged]
    G --> J[Received Share Visible to Partner]

Last Reviewed: 2026-04-02 Last Updated: 2026-04-14

Key Features#

  • Created and Received Share Management: Review outbound and inbound sharing relationships from the same operational workspace, giving coordinators a complete picture of active sharing relationships in both directions.
  • Structured Invitation Workflows: Initiate sharing with explicit recipient metadata and supporting rationale rather than uncontrolled link distribution. Every share is a deliberate, documented decision.
  • Reason and Suspicion Capture: Record operational reason text and related narrative context to support accountable dissemination decisions. The rationale is preserved with the share record, not just in an analyst's memory.
  • Revocation Controls: Revoke shares and invitations when access is no longer appropriate, with clear traceability of who revoked what and why. Revocation is immediate and auditable.
  • Audit Log Visibility: Maintain visibility into sharing events, invitation actions, and revocation history for governance and review. Every action is timestamped and attributed to a specific user and organisation.
  • Smart-Field Assisted Narrative Entry: Apply smart-field assistance to persisted sharing metadata and reason text where it improves clarity and speed.
  • Incident Continuity Across Transfers: When an incident is transferred between agencies, the system packages a complete transfer context including the running AI summary, recent transcript entries, gathered caller information, active medical protocol state, CPR cadence status, priority classification, and caller details. The AI session continues monitoring the incident after transfer rather than terminating, ensuring no gap in situational awareness during the handoff.
  • Multi-Agency Broadcast: Broadcast operational updates to all agencies with active access to an incident. Each agency's access is individually grantable and revocable, and all broadcast, share, and revocation events are scoped by organisation for full audit compliance.

Use Cases#

  • Interagency Coordination: Investigators share operational context or case material with trusted partner agencies while preserving an auditable record of the decision.
  • Controlled External Dissemination: Administrators create time-sensitive or purpose-specific shares for external collaborators with explicit rationale captured at creation time.
  • Access Review and Revocation: Supervisors review existing shares, revoke outdated access, and confirm that dissemination history is fully traceable.
  • Governed Partner Collaboration: Teams avoid informal sharing practices by routing cross-organisation exchange through a managed operational workspace.

Integration#

  • Share invitation, revocation, audit-log, and listing operations within the Argus platform
  • Collaboration and audit-trail systems
  • Smart Fields for recipient metadata and rationale text
  • Operational dashboards and partner-collaboration workflows