Access & Protocol Verification.
When a residence or operating environment authorises access for an assurance engagement, it is handled as a controlled protocol. Entry occurs only for scheduled assurance reviews — never casually, never unexpectedly.
- Access is controlled, deliberate, and documented.
- Arrival and exit are recorded against a written protocol tailored to the environment.
- Where vendor presence is relevant to the review, timing is confirmed within defined windows.
- Observations are reported discreetly, with measured escalation only when appropriate.
Windsor Butler does not assume operational control. Protocol exists to preserve discretion, continuity, and verifiable clarity.