LogoLogo
  • Introduction
    • What Is an Agent Application?
    • Core Concepts
    • Getting Started
  • GLIK Cloud
    • Getting Started
      • GLIK Cloud vs. GLIK Studio
    • Prompt Orchestration Interface
    • What Is a Workflow?
    • Workflow Editor
    • App Types (Overview)
    • Workspaces & Permissions
    • Enterprise Readiness & Compatibility
    • Security & Data Handling
  • Enterprise SaaS
    • Expense Policy Decision Engine
    • Compliance & Audit Automation
    • Compliance Advisor Copilot
  • App Types
    • Overview
    • Chatbot
    • Agent
    • Advanced Chat
    • Workflow
  • Templates
    • Overview
    • Policy Automation
      • Overview
        • Expense Policy Validator β€” Summary Sheet
        • Enterprise Policy Intelligence
      • Expense Policy Decision Engine
        • Expense Policy Decision Engine (Starter)
          • Practice Exercises
        • Expense Policy Decision Engine (Threshold Memory)
          • Practice Exercises
          • Threshold Agent Response Tuning Exercises
        • Expense Policy Decision Engine (Policy API Integration)
          • Practice Exercises
        • Expense Policy Decision Engine (Escalation & Conflict Resolution)
        • Expense Policy Decision Engine (Audit & Logging)
    • Compliance and Audit Automation
      • KYC/AML Review Copilot
        • Learning Track
      • Compliance Copilot – MiCA Reporting
        • Workflow Phases
        • Block-by-Block Guide
    • Compliance Advisors
      • Global Control Copilot – Cross-Jurisdiction Policy Interpreter
        • Input Combinations & Workflow Outcomes
        • Reference Input Payloads
        • Policy Retrieval via Input Routing
        • Input Logic & Routing Behavior
        • Predefined Policy Thresholds
    • Knowledge Systems
      • Overview
      • Compliance SOP Agent
    • Process Automation
    • Task Resolution Agents
      • Why Agentify Task Resolution
    • Work Coordination Agents
      • Escrow Agent Orchestration
    • Embedded Operational Copilots
    • Expense & ERP Agents
      • ERP Vendor AI Copilots and Agents
      • Custody Approval Workflow for Token Issuance
    • Inventory & Logistics Agents
    • Sales & Forecasting Agents
    • Plugin-Based Agent Platforms
  • Marketplace
    • Overview
    • Publishing Templates
  • System Architecture
    • Overview
    • Blocks & Nodes
      • Utilities
        • Start Block
        • End Node
        • HTTP Request
        • List Operator
      • Classifier Nodes
        • Question Classifier
      • Logic Blocks
        • IF/ELSE Branch
        • Iteration
        • Loop
      • Transform Blocks
        • Variable Assigner
        • Variable Aggregator
        • Parameter Extractor
        • Data Enrichment
        • Prompt Template
        • Code
      • Input & Extraction
        • Doc Extractor
        • Knowledge Retrieval
        • LLM Block
          • LLM Reasoning
          • Fallback to LLM Reasoning
        • Tool Node
        • Agent
        • Answer
    • GLIK Knowledge
      • Creating & Managing Knowledge
      • GLIK Knowledge Retrieval
      • Writing to Knowledge
      • Scoped Memory & Access Control
      • Injection & Variable Binding
      • Performance & Limits
    • Execution Model
      • Workflow Architecture
      • Flow Engine
      • Node Lifecycle
      • Protocol Compatibility & Schema Interoperability
      • Input Binding & Value Resolution
    • Memory & Variable Scope
      • Conversation Variables
      • Memory Layers (User, App, Org)
      • Memory Slot Injection
      • Memory Retention Policy
    • Decision Routing
      • Conditional Logic Engine
      • LLM Fallthrough Patterns
      • Policy Enforcement & Escalation Paths
    • Enterprise Orchestration
      • Policy-Driven Automation
      • Enterprise Modularity
      • Auditability & Governance
      • Explainability & Decision Transparency
    • Agentifying Legacy Systems
      • Why Legacy Systems Resist Change
      • Best Practices for Agentifying ERP Workflows
      • GLIK’s Wrap-Around Model
      • Agent Surfaces (PDF, OCR, API, UI)
      • No-API Memory-Based Control
      • Compliance & Risk Considerations
    • System Observability
      • Execution Logs
      • Save Points & Snapshots
      • Variable Debugging
      • Session Trace Viewer
  • Developers
    • Overview
    • GLIK Open Core
      • Deployment & Installation
      • CLI Reference
      • Security & Compliance
      • Customization Guide
      • Versioning & Updates
  • GLIK Roadmap
  • Deprecation
    • Orchestration Interface
      • Node Orchestration
        • Node
          • Start
          • End
          • Direct Reply
          • LLM
          • Question Classifier
          • Knowledge Retrieval
          • Code Execution
          • Doc Extractor
          • HTTP Request
          • Conditional Branch IF/ELSE
          • Iteration
          • List Operator
          • Parameter Extraction
          • Template
          • Tools
          • Variable Aggregator
          • Variable Assigner
      • Variables
      • Application Toolkits
      • File Upload
    • Chatbot Features
    • Dataset
      • Dataset Creation
      • Text Preprocessing and Cleaning
        • Advanced Configuration
      • Retrieval Test/Citation
    • Studio
  • Brand Kit & Identity
    • Logos & Visual Assets
    • Typography & Colors
    • Messaging Pillars
    • Product Screenshots
    • Diagrams & Icons
    • Company Boilerplate
    • Downloads (.zip)
  • Legal
    • Terms of Service
    • Privacy Policy
    • Cookie Policy
    • Trademark Notice
    • Acceptable Use Policy
    • Open Core License
Powered by GitBook

Platform

  • Open GLIK Cloud
  • Getting Started
  • Templates

Documentation

  • Core Concepts
  • GLIK Open Core
  • Security & Data Handling
  • Workspaces & Permissions

Company

  • RIvalz AI
  • Contact Support
  • Status Page

Β© 2023–2025 Rivalz Technologies Ltd.

On this page
  • 1. Input Sources (Where Values Come From)
  • 2. user_region: Determines Policy Source
  • 3. submission_type: Determines Logic Branches
  • 4. user_role: Affects Prompt Tone & Escalation Rules
  • 5. Combined Example
  • 6. Required Blocks to Support This
  • 7. Code Block Example: Variable Payload
  • 8. Example LLM Prompt Template (Dynamic Inputs)
  • 9. Escalation Logic Conditions (Examples)
  • 10. Auto-Approval Logic Conditions (Examples)
  • 11. Block-Level Wiring Map (Execution Flow Summary)

Was this helpful?

  1. Templates
  2. Compliance Advisors
  3. Global Control Copilot – Cross-Jurisdiction Policy Interpreter

Input Logic & Routing Behavior

This page documents how input variables like user_region, submission_type, and user_role shape the internal logic and execution flow of the Global Control Copilot template.

This page explains how dynamic input variables like user_region, submission_type, and user_role influence policy selection, compliance logic, and escalation behavior within the Global Control Copilot template.

These inputs are extracted via orchestration blocks (e.g., Parameter Extractor) and are used to route submissions through jurisdiction-specific logic paths.


1. Input Sources (Where Values Come From)

Variable
Source Block
Description

sys.files

User Upload

Contains raw disclosure content (risk, governance, jurisdiction).

user_region

Parameter Extractor

Set by upstream chat metadata, dropdown, or auto-detected.

submission_type

Parameter Extractor

Declared by user form or inferred from workflow setup.

user_role

Parameter Extractor

May be prefilled from session or input during form submission.

risk_exposure, checklist_status

Doc Extractor or LLM

Parsed from sys.files, then normalized via enrichment.


2. user_region: Determines Policy Source

Value
Effect

EU

Loads MiCA policy. Enforces thresholds like €1M exposure, 5-day deadline, etc.

US

Loads SOX-based policy logic. Checks for signoffs and SEC-relevant fields.

APAC

Loads fallback or local templates. Often less rigid in checklist validation.

Global

Uses internal generic fallback policy. Used for simulation or pre-alignment testing.


3. submission_type: Determines Logic Branches

Value
Validations Triggered

Disclosure

Requires risk, liquidity, governance sections.

Attestation

Requires signatures, audit metadata, compliance officer role.

Exception Report

Auto-escalates unless a valid policy override is present.

Incident

Evaluates breach detail, event log, and downstream impact.


4. user_role: Affects Prompt Tone & Escalation Rules

Value
Behavior Adjustments

Finance Manager

Triggers capital/risk validation logic.

Legal Counsel

Expects attestation chain, stricter audit validation.

Product Ops

Focus on procedural policy routing; may tolerate soft violations.

External Submitter

Triggers early flagging, stricter trust boundaries.


5. Combined Example

If the submission is from:

  • user_region = EU

  • submission_type = Disclosure

  • user_role = Finance Manager

Then:

  • MiCA logic is loaded (via Knowledge Retrieval)

  • Risk exposure and liquidity sections are required

  • Checklist omission triggers escalation

  • Summary tone addresses internal financial policy compliance


6. Required Blocks to Support This

To enable this dynamic behavior, the template must include:

  • Parameter Extractor β†’ to set user_region, submission_type, user_role

  • Knowledge Retrieval β†’ to fetch the correct policy content

  • Variable Assigner β†’ to inject threshold values (e.g., exposure limits)

  • Doc Extractor or LLM β†’ to parse the uploaded file and pull out key sections

  • IF/ELSE β†’ to branch based on compliance

  • Agent and LLM β†’ to escalate or summarize

  • Save Point β†’ to log and export session metadata


7. Code Block Example: Variable Payload

The following is a sample of how these input variables might appear inside the orchestration memory or test payload. This structure is useful for debugging, test configuration, or SDK integration when simulating different jurisdictional conditions.

# Example Input Variable Payload
user_region: EU
submission_type: Disclosure
user_role: Finance Manager

# Derived values from parsed file (via LLM or Doc Extractor)
risk_exposure: 4200000
checklist_status: Complete
submission_date: 2025-05-24
policy_reference: MiCA
issuer_name: TokenBridge Capital Ltd.

This structure allows downstream logic blocks to reason based on both user-declared context (user_region, submission_type, user_role) and parsed content from uploaded files (risk_exposure, issuer_name, etc.).

For testing or debugging, these fields can be passed directly into a Variable Assigner block or used as fixed test cases during QA.


8. Example LLM Prompt Template (Dynamic Inputs)

This is a sample prompt used inside the LLM reasoning block to evaluate whether the uploaded compliance submission meets applicable policy requirements. It demonstrates how the system references both declared context variables and parsed data.

You are a compliance reasoning agent reviewing a policy disclosure report.

Jurisdiction: {{user_region}}  
Submission Type: {{submission_type}}  
User Role: {{user_role}}  
Policy Framework: {{policy_reference}}  

Evaluate the submission based on the following extracted details:

- Issuer: {{issuer_name}}  
- Reported Risk Exposure: €{{risk_exposure}}  
- Capital Buffer Checklist: {{checklist_status}}  
- Submission Date: {{submission_date}}

Determine whether the submission:
1. Meets the policy thresholds based on the loaded policy ({{policy_reference}})
2. Contains all required sections for the submission type ({{submission_type}})
3. Requires escalation based on missing, incomplete, or delayed information

If the submission is compliant, generate a brief summary of why.  
If not, identify the violations and recommend next steps.

This pattern ensures consistent reasoning across jurisdictions and allows developers to structure prompt logic around contextual input variables without hardcoding static policy rules.


9. Escalation Logic Conditions (Examples)

The Global Control Copilot uses conditional logic blocks (like IF/ELSE) to evaluate whether a submission meets policy thresholds or requires escalation to a human reviewer. These conditions are derived from both user-declared inputs and parsed values.

Here are example escalation triggers based on variable conditions:


πŸ” Conditional Logic Triggers

Condition
Explanation
Escalation Action

risk_exposure > 1000000 and user_region == "EU"

MiCA limit exceeded

Escalate to compliance analyst

checklist_status != "Complete" and submission_type == "Disclosure"

Required section missing

Trigger user guidance + escalate

submission_date > deadline_by_policy

Late submission

Flag and route to manual review

user_role == "External Submitter" and attestation_missing == true

Trust boundary exceeded

Auto-escalation with warning

submission_type == "Exception Report" and override_reason == null

No justification provided

Block auto-approval and escalate


🧠 Memory Variables Involved

  • risk_exposure (float)

  • checklist_status (enum: Complete, Incomplete, Missing)

  • submission_date (date)

  • user_region, user_role, submission_type (string)

  • attestation_missing (boolean)

  • override_reason (string/null)


✨ Escalation Outputs

When triggered, these conditions typically route the workflow to:

  • An Agent block (e.g., assigned to a compliance reviewer)

  • An LLM block to generate a detailed explanation for the user

  • A Save Point block for logging the flagged session


10. Auto-Approval Logic Conditions (Examples)

While escalation rules define when to stop and escalate, auto-approval rules help define a β€œclean pass” scenario β€” where no manual review is needed.

Condition
Explanation
Auto-Approval Action

risk_exposure <= 1000000 and user_region == "EU"

MiCA threshold respected

Allow approval summary generation

checklist_status == "Complete" and submission_type == "Disclosure"

Disclosure fully filled

Proceed to HTTP API export

attestation_verified == true and submission_type == "Attestation"

External review confirmed

Mark submission valid without escalation

override_reason != null and submission_type == "Exception Report"

Justified exception present

Log with reasoning and approve

submission_date <= policy_deadline

On-time report

Skip delay flag, proceed to approval

These conditions trigger an LLM β†’ HTTP Request β†’ Save Point path.


11. Block-Level Wiring Map (Execution Flow Summary)

Below is a high-level description of how these logic conditions are implemented using GLIK Studio blocks:

πŸ” Decision Flow in Orchestration

  1. File Upload (sys.files)

    • Ingested at start node or through chat form

  2. Parameter Extractor Block

    • Sets: user_region, submission_type, user_role

  3. Doc Extractor / LLM Parser Block

    • Parses risk_exposure, checklist_status, attestation_verified, submission_date

  4. IF/ELSE Block β€” β€œIs Submission Compliant?”

    • Evaluates combined conditions:

      if:
        risk_exposure <= threshold_by_region
        and checklist_status == "Complete"
        and submission_date <= policy_deadline
  5. IF path β†’ Auto-Approval Track

    • LLM Block: generate approval summary

    • HTTP Request: post to compliance API

    • Save Point: log session summary

  6. ELSE path β†’ Escalation Track

    • Agent Block: escalate for review

    • LLM Block: explain rejection or missing elements

    • Save Point: export violation metadata

PreviousPolicy Retrieval via Input RoutingNextPredefined Policy Thresholds

Last updated 2 days ago

Was this helpful?