Skip to content
Contact

Start with scope. Move to a decision.

Fastest route: send a scope draft. If you are unsure what to include, send a minimal version and we will tighten it into a defensible scope.

Email Cipher
Opens your mail client with a pre-filled scope template.

Fastest route: copy-paste scope template

This template is designed to prevent rework. It forces decision framing, constraints and identifiers.

Scope template
Copy-paste
Name:
Organisation:
Role:

Decision you are making (one line):

Subject(s) / counterparty(ies) (high level):

Geography / jurisdictions:
Deadline / timebox:

What would change the decision (red lines):

Known identifiers (entity IDs, licence numbers, names/aliases):

Constraints (budget, data access, sensitivity):

Preferred outputs (one line):

What happens next

A short triage flow that keeps the engagement proportionate and prevents narrative drift.

Triage
What happens when you email us
A short flow that reduces back-and-forth and sets a clean timebox.
01
0–1 day
Acknowledge + quick clarification
We confirm scope boundaries and identify any missing identifiers that could cause misidentification.
Output: Scoped question set
02
Fast start
Timebox + plan
We propose a proportionate plan: checks that change the decision first, with explicit limits and assumptions.
Output: Plan + artefact list
03
Defensible
Deliver decision pack
You receive findings, confidence tiers, residual risk controls, and a compact summary usable in governance packs.
Output: Decision-ready pack

What to include

Non-binary: minimum gets a response; preferred increases speed and reduces follow-up.

ItemMinimumPreferredWhy it matters
Decision statementOne lineDecision + threshold/red linesPrevents generic research and keeps checks decision-relevant.
IdentifiersName + jurisdictionRegistry IDs, licence numbers, aliasesReduces homonym and misidentification errors.
TimeboxDeadlineDeadline + review milestonesAllows prioritisation of checks that change the decision.
ConstraintsSensitivity notesBudget/time/data access constraintsPrevents wasted work and sets safe handling expectations.
Output preferenceNoneYour governance pack formatReduces reformatting and makes outputs immediately usable.