The present invention allows a user (e.g., a policy implementer) to be identified and delegated responsibility for implementing a policy. This can occur, implicitly, semi-implicitly or explicitly. In a typical embodiment, a policy provided (e.g., by a policy owner) is automatically parsed to determine a minimum set of access rights needed to implement the policy. For example, the policy might indicate that an implementing user only needs simple read privileges. Alternatively, the policy might require read/write privileges. In any event, a list (e.g., an access control list) will be analyzed to identify a set (e.g., one or more) of users of a computerized resource subject to the policy that meets the minimum set of access rights. Once this set of users has been identified, a hierarchy can be optionally analyzed to determine who among the set of users is permitted to implement the policy.