Records Access Permissions
This guide outlines the access classifications within the Department of Data Retention. Access levels are determined by clearance status, departmental alignment, and situational relevance. Unauthorized attempts to breach level-restricted content may result in revocation of all privileges. Please consult the directory below to determine the appropriate level of access required for each record classification.
Classification Levels
- Level 0 – Public Archive: Available for unrestricted access. Includes sanitized records and public indices.
- Level 1 – Departmental Index: Internal logs, redacted memos, and basic procedural filings.
- Level 2 – Intra-Branch Communications: Cross-department memos and summarized reports. Requires Staff ID verification.
- Level 3 – Interim Documentation: Working drafts, in-progress reports. Viewable by supervisors and above.
- Level 4 – Temporal Index Buffers: Raw, time-stamped data. Archived quarterly. Requires Encryption Key F-22.
- Level 5 – Secure Data Transfer Logs: Includes signed routing metadata and protocol witnesses.
- Level 6 – Compliance Audit Trails: Forensic copies and metadata footprints. Requires live network lockout.
- Level 7 – Restricted Anomalous Archive: Includes cross-dimensional artifacts, occult documentation, and metaphysical case files under the jurisdiction of Unit H-93. Clearance required from both Logical Oversight and Historical Integrity Boards.
- Level 8 – Executive Access: Requires encrypted biometric dual-key. Used for interagency consensus reconciliation.
- Level 9 – Silence Class: Access logged but not acknowledged. Documentation does not officially exist.
- Level 10 – Zero State: No known personnel currently hold this classification. Definition unavailable.
Request Protocol
To access restricted classifications, complete Form D-445-X and submit through the Compliance Forms portal. Response times vary based on clearance level and existing workload assessments.
All submissions are logged and reviewed by the Office of Conditional Review. Responses may be delivered via encrypted PDF, in-person courier, or verbally through authorized intermediaries.