+ Acolytes recently recruited by the Holy Ordos are often heard to complain that the protocols surrounding the distribution of information are slow and difficult to navigate at the best of times. There is some truth to this assertion. Nevertheless, over long centuries of painful experience the Inquisition has found that strictly controlling access to information, allowing only those with the proven experience and loyalty access to our deeper secrets, saves lives.
+ However, the Ordo Calixis is not utterly inflexible in this matter. It was noted some centuries ago that granting Acolytes access to otherwise classified data could, in extremis, save both their lives and those of the sector’s citizens. It was to this end that the Ix Protocols were devised.
+ As a result of these every Calixis Standard data-loom, cogitator and info-machine has certain secret additions to it that enable any Inquisition operative to use it as a secure access point to the local Inquisitorial archive of current data. Such a feature would normally be an unforgivable breach of security, but all such accesses are logged and coded with the bio-print of the accessing agent and their rosette.
+ Each request is handled by a servitor who assesses whether the reason provided is adequate for the data required. If so the information is deposited within the agent’s rosette, otherwise it is refused. In either case, the agent’s rosette is sealed, becoming unable to perform any of its regular functions until the agent has been cleared by an tribunal, called to see if the reason for use of the Protocols was adequate.
+ Misuse of the Ix Protocols or non-attendance of the tribunal are classed as Terminatus Primaris offences.