SYSTEM GOVERNANCE

AI that cannot move money without a human.

Every workflow requires explicit approval. Every action is immutably logged. The system is architecturally constrained, not just policy-constrained.

SCROLL
Action Card

The execution boundary every action passes through.

Every agent output surfaces as a structured Action Card. Officers review the evidence, the policy citation, and the proposed action before any execution occurs.

Action Card AC-20250114-0091
PENDING APPROVAL

Client

Meridian Holdings Ltd

Risk Tier

HIGH

Client ID

CLT-00482

Review Type

Enhanced Due Diligence

Policy Citation

GFSC AML Regulations 2024 · Schedule 5, §4(b): "Where a customer presents politically exposed person indicators combined with cross-border beneficial ownership structures, the firm must apply enhanced due diligence measures and obtain senior management approval before establishing or continuing the business relationship."

Proposed Action: Draft Communication

"Dear Mr. Castellano, further to our ongoing KYC review, we are required under GFSC Schedule 5 §4(b) to request additional documentation confirming the ultimate beneficial ownership structure of Meridian Holdings Ltd. Please provide certified copies of the ownership register and a declaration from each beneficial owner holding ≥25% equity within 10 business days..."

REQUIRES: manager role · JWT token

No autonomous writes

The system cannot execute the proposed action without an authenticated officer approval event.

Full evidence chain

Every field on the card cites its exact data source: the Vault query and the Atlas vector retrieval.

Immutable on approval

Once approved, the card and its approval token are written immutably to the audit log.

Role-Based Access Control

Permissions scoped by role, not by trust.

CapabilityAnalystManagerAdmin
View Action Card
Approve Action Card
Reject Action Card
Query Vault (read-only)
Upload Policy to Atlas
Create Workflow Template
Export Audit Pack
Manage User Roles
Configure LLM Routing
Immutable Audit Trail

Every inference step is on record.

The log below is a real-format sample of the event stream generated during a single EDD session. Each entry is append-only and tamper-evident.

TIZNO AUDIT LOG · SESSION a3f9c1d2
2025-01-14T09:02:11.421ZINFOsession.startuser="j.okafor@bank.gg" role="manager" client_ip="10.0.0.41"
2025-01-14T09:02:14.009ZINFOvault.querytable="clients" tenant_id="bank_gg" filter="{risk_tier: HIGH}" rows_returned=7
2025-01-14T09:02:14.882ZINFOatlas.vector_searchquery="beneficial ownership requirements GFSC schedule 5" top_k=5 sources=["GFSC_AML_2024.pdf","NRA_2023_Summary.pdf"]
2025-01-14T09:02:16.103ZINFOorchestrator.reasonmodel="gpt-4o" context_tokens=4821 client_id="CLT-00482" policy_citations=3 output_type="action_card_draft"
2025-01-14T09:02:16.894ZINFOenclave.action_card.createdcard_id="AC-20250114-0091" status="PENDING_APPROVAL" assigned_to="j.okafor@bank.gg"
2025-01-14T09:04:37.210ZINFOenclave.action_card.approvedcard_id="AC-20250114-0091" officer="j.okafor@bank.gg" approval_token="tk_7z3m...c4p9"
2025-01-14T09:04:37.212ZINFOsession.enduser="j.okafor@bank.gg" duration_s=145 cards_actioned=1