AG-295

Emergency Delegated Authority Governance

Authority, Delegation & Approval ~13 min read AGS v2.1 · April 2026
EU AI Act SOX FCA NIST

2. Summary

Emergency Delegated Authority Governance defines the conditions, constraints, and accountability mechanisms for granting expanded authority to AI agents during genuine emergencies — situations where normal approval pathways are too slow and the consequences of inaction exceed the risks of accelerated action. The critical governance challenge is designing emergency pathways that are fast enough to be useful in a real emergency, but constrained enough that they cannot be normalised into routine bypass mechanisms. Every emergency authority grant must be time-bounded, scope-limited, retrospectively reviewed, and structurally distinct from normal authority — ensuring that emergency is a governed exception, not an ungoverned loophole.

3. Example

Scenario A — Emergency Bypass Becomes Routine: An AI payment agent has a Tier 3 approval requirement (two-party approval) for payments above £25,000. The first time the emergency pathway is used, it is for a genuine crisis — a critical supplier threatening to halt deliveries unless paid within 2 hours. The emergency approval grants the agent single-approver authority for 4 hours. The payment succeeds and the crisis is averted. Over the next six months, the emergency pathway is used 47 times. Investigations reveal that 39 of these were not genuine emergencies — they were used to circumvent the two-party approval requirement when the second approver was unavailable or when the team wanted faster processing. Total payments through the emergency pathway: £3,200,000. Of these, £2,400,000 did not meet any emergency criteria.

What went wrong: The emergency pathway had no mechanism to prevent normalisation. There were no usage frequency limits, no escalating scrutiny for repeated use, and no post-use mandatory review that would have identified non-emergency usage. Consequence: £2,400,000 in payments that bypassed required governance controls, audit finding for systematic control override, regulatory investigation into approval governance.

Scenario B — Unbounded Emergency Authority: During a cybersecurity incident, an AI agent managing network defences is granted emergency authority to "take all necessary actions to contain the threat." The emergency delegation has no scope constraints — it grants the agent unrestricted authority over network infrastructure. The agent, interpreting "contain the threat" literally, disconnects 340 production servers from the network, blocks all inbound traffic from 12 partner organisations, and revokes VPN access for 2,800 employees. The actual threat was a phishing attempt affecting three user accounts. The agent's response causes a 14-hour service outage affecting £4,700,000 in daily transaction volume.

What went wrong: The emergency authority was unbounded — "all necessary actions" gave the agent discretion to determine what was necessary, with no scope constraint. The emergency should have specified: permitted action types (isolate affected accounts), permitted scope (the three identified accounts), and maximum blast radius (no action affecting more than 10 systems without human confirmation). Consequence: £4,700,000 in transaction disruption, 14-hour outage, partner relationship damage, incident response review finding of disproportionate automated response.

Scenario C — Emergency Authority Without Post-Hoc Review: An AI agent in a healthcare setting is granted emergency authority to override normal prescription checking protocols when the clinical system is degraded. The emergency authority is used three times during a 4-hour system degradation. During this period, the agent processes a prescription with a drug interaction that would have been caught by the normal protocol. The patient experiences an adverse reaction. No post-hoc review of emergency actions was conducted because the emergency authority grant did not require one.

What went wrong: Emergency authority was granted without a mandatory post-hoc review requirement. The actions taken under emergency authority were not subjected to retrospective scrutiny using the controls that were temporarily bypassed. Consequence: patient harm from undetected drug interaction, clinical governance investigation, potential medical negligence liability.

4. Requirement Statement

Scope: This dimension applies to all situations where an AI agent may need to operate with expanded authority beyond its normal delegation due to time-critical circumstances. It covers the design, activation, execution, and post-hoc review of emergency authority pathways. The scope includes both human-triggered emergency grants (a human decides to grant emergency authority) and system-triggered emergency grants (automated detection of emergency conditions triggers pre-approved expanded authority). Read-only agents and agents without access to external state-changing systems are excluded.

4.1. A conforming system MUST define emergency authority pathways in advance, specifying: the triggering conditions, the expanded scope permitted, the maximum duration, the scope constraints (what the agent may NOT do even in an emergency), and the mandatory post-hoc review requirements.

4.2. A conforming system MUST enforce a maximum duration for every emergency authority grant, after which the authority automatically expires and cannot be renewed without a new, independently approved emergency declaration.

4.3. A conforming system MUST constrain emergency authority scope — emergency grants must specify permitted action types and maximum blast radius, not grant unlimited authority.

4.4. A conforming system MUST require mandatory post-hoc review of all actions taken under emergency authority, using the controls that were temporarily bypassed, within a defined review period (default: 48 hours after emergency authority expiry).

4.5. A conforming system MUST implement escalating scrutiny for repeated emergency pathway usage — each successive use within a defined period (default: 30 days) triggers progressively higher approval requirements for the next emergency grant.

4.6. A conforming system SHOULD require that emergency authority grants are authorised by a designated emergency approver at a seniority level above the normal approval tier for the actions being authorised.

4.7. A conforming system SHOULD implement emergency usage frequency monitoring with automatic alert when usage exceeds defined thresholds (e.g., more than 3 emergency grants in a 30-day period triggers governance review).

4.8. A conforming system SHOULD maintain a structurally separate audit trail for emergency actions, clearly distinguishing them from normal operations in all reporting and compliance views.

4.9. A conforming system MAY implement pre-approved emergency playbooks for defined emergency scenarios (e.g., cybersecurity incident, system degradation, counterparty default) with scenario-specific scope constraints, reducing decision latency while maintaining governance boundaries.

5. Rationale

Emergency authority is a governance paradox. On one hand, emergencies require fast action, and governance controls designed for normal operations may be too slow for crisis response. On the other hand, the very concept of "emergency" creates a governance loophole — if emergency authority bypasses normal controls, then declaring an emergency bypasses controls. The governance challenge is to make the emergency pathway fast enough for genuine emergencies while making it uncomfortable enough that it is not used routinely.

Mature organisations have addressed this challenge for human operations through mechanisms like: escalation authority (a senior manager can approve actions that normally require a committee), time-bounded exceptions (the authority expires automatically), and post-hoc review (actions taken under emergency authority are retrospectively assessed). AG-295 applies these same principles to AI agent operations, with additional constraints necessitated by the speed and scale of agent action.

The normalisation risk is particularly acute for AI agents. When a human employee uses an emergency pathway, social pressure (explaining to colleagues why they declared an emergency), personal accountability (their name on the emergency declaration), and process friction (filling out emergency forms) create natural resistance to overuse. For AI agents, these social barriers do not exist. If the emergency pathway is faster and the agent (or its operator) can invoke it without friction, it will be used whenever normal approval is inconvenient. The escalating scrutiny requirement directly addresses this: each use makes the next use harder, creating a structural friction that scales with usage frequency.

6. Implementation Guidance

Emergency authority implementation requires defining emergency conditions, designing constrained emergency pathways, enforcing time bounds, and mandating retrospective review.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Financial Services. Emergency authority in trading environments should align with existing market crisis protocols. The FCA expects that firms can demonstrate proportionate and controlled responses to market events. Emergency authority for AI trading agents should be no broader than what a senior trader would be granted in the same situation.

Healthcare. Clinical emergency authority must align with existing clinical emergency protocols (e.g., breaking the glass for medication access in hospitals). The priority is patient safety, and emergency authority should enable life-saving actions while maintaining a full audit trail for retrospective review.

Safety-Critical / CPS. Emergency authority for agents controlling physical systems must include hard safety limits that cannot be overridden even in an emergency. An agent responding to a process emergency may adjust parameters within the safe operating envelope but must not be granted authority to exceed physical safety limits.

Maturity Model

Basic Implementation — Emergency authority pathways are defined with triggering conditions, scope constraints, maximum duration, and post-hoc review requirements. Emergency grants require dual confirmation. The emergency pathway is structurally separate from normal approval. This meets minimum mandatory requirements but escalating scrutiny may not be implemented, and post-hoc review may be manually tracked.

Intermediate Implementation — Escalating friction for repeated use is automated. Emergency usage frequency is monitored with automatic alerts. Post-hoc review is mandatory, tracked by the governance system, and escalated if not completed within the review period. Pre-defined emergency playbooks exist for anticipated scenarios. Emergency actions have a structurally separate audit trail.

Advanced Implementation — All intermediate capabilities plus: real-time monitoring of actions taken under emergency authority, with automatic intervention if actions approach scope boundaries. Automated correlation between emergency declarations and external evidence (e.g., cybersecurity alerts, market data, system status dashboards) to verify that the declared emergency matches observable conditions. Independent adversarial testing confirms that emergency normalisation, scope escalation, expiry bypass, and false emergency declaration attacks all fail.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Scope Constraint Enforcement

Test 8.2: Automatic Expiry

Test 8.3: Escalating Scrutiny

Test 8.4: Post-Hoc Review Enforcement

Test 8.5: Self-Declaration Prevention

Test 8.6: Normalisation Detection

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 14 (Human Oversight)Direct requirement
SOXSection 404 (Internal Controls Over Financial Reporting)Supports compliance
FCA SYSC6.1.1R (Systems and Controls)Supports compliance
NIST AI RMFMANAGE 2.2 (Risk Mitigation), MANAGE 4.2 (Incident Response)Supports compliance
ISO 22301Clause 8.4 (Business Continuity Procedures)Supports compliance
IEC 62443SR 7.7 (Least Functionality)Supports compliance

EU AI Act — Article 14 (Human Oversight)

Article 14 requires effective human oversight, including the ability to intervene in the AI system's operation. Emergency authority governance ensures that human intervention (granting expanded authority) is structured and accountable. It also ensures that expanded authority does not remove human oversight entirely — scope constraints, duration limits, and post-hoc review maintain oversight even during emergencies.

ISO 22301 — Clause 8.4 (Business Continuity Procedures)

Business continuity planning includes provisions for operating under degraded conditions. Emergency authority governance provides the framework for AI agents to continue operating when normal governance pathways are disrupted, while maintaining accountability and constraint.

FCA SYSC — 6.1.1R (Systems and Controls)

The FCA expects that emergency procedures do not create uncontrolled risk. Firms must demonstrate that emergency override mechanisms are defined, constrained, and reviewed — not ad hoc bypasses of normal controls.

10. Failure Severity

FieldValue
Severity RatingHigh
Blast RadiusOrganisation-wide — emergency authority grants expanded scope that, if misused, affects systems across the organisation

Consequence chain: Emergency authority governance can fail in two directions. If emergency pathways are too restrictive or absent, agents cannot respond to genuine crises and the organisation suffers operational harm from inaction. If emergency pathways are too permissive or frequently abused, they become routine bypasses of normal governance, creating systematic control failures. The more likely failure mode is normalisation — the emergency pathway becomes the preferred pathway because it is faster. Once normalised, the emergency pathway processes a significant volume of actions without the scrutiny those actions require. The financial consequence scales with the volume and value of actions processed through the bypass. The regulatory consequence is severe: demonstrating that an emergency mechanism was routinely used for non-emergencies indicates a fundamental governance culture failure. The reputational consequence includes loss of confidence in the organisation's control environment.

Cross-references: AG-009 (Delegated Authority Governance) provides the overall delegation framework within which emergency authority operates. AG-289 (Task-Scoped Authority Binding Governance) provides the scope-binding principles that apply to emergency grants. AG-290 (Tiered Approval Threshold Governance) defines the normal approval tiers that emergency authority temporarily bypasses. AG-294 (Delegation Revocation Propagation Governance) ensures that emergency authority can be promptly revoked if the emergency ends or the response is disproportionate. AG-008 (Governance Continuity Under Failure) addresses governance during system failures, a common emergency trigger. AG-019 (Human Escalation & Override Triggers) provides the escalation framework that may precede or follow an emergency declaration. Siblings in this landscape: AG-289 through AG-298.

Cite this protocol
AgentGoverning. (2026). AG-295: Emergency Delegated Authority Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-295