Skip to content
§ VI · Domain DAT
Controls
13
Edition
v.1.2

DAT · Domain 6 of 9

Data Protection & Privacy

Classification, isolation, and lifecycle of data across prompts, memory, and retrieval.

DAT is the most extensive domain. It governs how data is classified, how prompts and memory respect classification boundaries, how retrieval systems enforce access controls, and how data is retained, redacted, and disposed of. Privacy obligations (GDPR, HIPAA, regional analogues) are operationalized here.

Table DAT.1 · Controls in DAT · v.1.213 controls · 5-level maturity
DAT-01

Data classification scheme

A data classification scheme is applied to all data accessible to the agent. The agent's authorization is constrained by classification.

All data the agent may encounter is classified according to a documented scheme — typically public, internal, confidential, restricted — and the agent's authorization is constrained by classification. The agent cannot access data at a classification level above its authorization, and classification boundaries are enforced at the retrieval and prompt layers.

L3 · Operated

Classification scheme is documented and applied to all data sources accessible to the agent; agent authorization levels are mapped to classification tiers; enforcement is tested as part of pre-deployment evaluation.

DAT-02

Cross-tenant data isolation

Cross-tenant data isolation is verified through automated tests on a documented cadence. Failures are treated as incidents.

For multi-tenant deployments, tenants' data is isolated and verified through automated tests on a documented cadence. A tenant cannot retrieve from or be influenced by another tenant's content. Isolation failures are treated as incidents under MON-07 and trigger immediate investigation. This is the data-layer complement to IAM-08's credential isolation.

L3 · Operated

Automated isolation tests run on a documented cadence (daily probes recommended); test results are retained; no isolation failure has occurred in the review period or all failures have been resolved and root-caused.

DAT-03

PII handling at runtime

PII handling is enforced at runtime per policy: detection, classification, redaction, or blocking as defined for each agent and context.

Personally identifiable information is detected in inputs and outputs through documented techniques and handled per the organization's data classification policy — detection, classification, redaction, or blocking depending on the agent's authorization and the context. PII that should not be retained is redacted from logs, memory, and any downstream artifact.

L3 · Operated

PII detection is active on all input and output paths; handling rules are documented per context; detection accuracy is measured; PII is verified absent from logs and artifacts where retention is not justified.

DAT-04

Retention policies

Retention policies apply to conversation logs, agent memory, derived artifacts, and traces. Data is not retained longer than the documented period absent legal hold.

Data retention periods are documented per data class — conversation logs, agent memory, derived artifacts, traces — and enforced by deterministic process. Data is not retained beyond the documented period absent a legal hold. The retention policy covers all agent-related data stores, including those managed by third-party providers.

L3 · Operated

Retention periods are documented per data class; enforcement is automated; retention compliance is audited at a documented cadence; data disposal at end of retention is logged.

DAT-05

Right-to-deletion procedures

Right-to-deletion procedures apply to agent memory, vector embeddings, and any derived data, with evidence of execution on request.

Subject deletion requests (right to erasure) can be fulfilled across all agent-related data stores — including agent memory, vector embeddings, conversation logs, and derived data — within statutory windows. Evidence of execution is retained. The procedure covers not just structured databases but also the increasingly complex data stores used by modern agent architectures.

L3 · Operated

Deletion procedures are documented and cover all agent data stores; at least one deletion request has been processed end-to-end or the procedure has been tested; evidence of execution is retained.

DAT-06

Training and RAG data provenance

Sources of training, fine-tuning, and RAG data are documented. Opt-out and consent requirements are honored.

The provenance of data used for training, fine-tuning, and retrieval-augmented generation is documented — where the data came from, under what terms, and what consent or opt-out obligations apply. Opt-out and consent requirements are honored at the data-ingestion layer, not as an afterthought. This control is increasingly critical as regulatory scrutiny of training-data provenance intensifies.

L3 · Operated

Data sources are documented with provenance records; opt-out and consent mechanisms are operational; compliance is verified at a documented cadence; data sources lacking provenance are identified and remediated.

DAT-07

Data residency requirements

Data residency requirements are honored, including geographic constraints on inference, storage, and logging.

Cross-border data transfers are governed by documented mechanisms appropriate to applicable law. Data residency requirements — geographic constraints on where inference occurs, where data is stored, and where logs are retained — are honored and enforceable. For agents using cloud-based model providers, the data residency of the provider's inference infrastructure is documented.

L3 · Operated

Data residency requirements are documented per agent and data class; residency is enforced by infrastructure configuration; compliance is verified by audit or automated monitoring.

DAT-08

Encryption at rest and in transit

Encryption is applied at rest and in transit to all agent-related data, including prompts, completions, traces, and memory.

All agent-related data — prompts, completions, traces, memory stores, configuration — is encrypted at rest and in transit using current cryptographic standards. This includes data held by third-party providers. Encryption is verified, not assumed, and key management follows documented procedures.

L3 · Operated

Encryption is applied to all agent-related data stores and transit paths; encryption is verified by audit or automated scan; key management procedures are documented and followed.

DAT-09

Consent for AI processing

Consent for AI processing is captured from end users and customers where required by law or contract.

Where law or contract requires consent for AI processing, consent is captured from end users and customers before the agent processes their data. Consent records are tracked per data subject and respected at the prompt and retrieval layers — an agent cannot process data for a subject who has not consented or who has withdrawn consent.

L3 · Operated

Consent capture mechanisms are operational; consent records are tracked per data subject; consent withdrawal is honored in real time at the prompt and retrieval layers; compliance is audited.

DAT-10

Memory architecture documentation

For agents with persistent or session memory, the memory architecture is documented: storage type, scope, write paths, read paths, eviction or decay policy, and access controls.

For agents with persistent or session memory, the memory architecture is fully documented as part of the Behavior Charter (GOV-02). Documentation covers storage type, scope (per-user, per-session, per-tenant, or global), write paths, read paths, eviction or decay policy, and access controls. This documentation is the foundation for assessing memory-related risks across INP, DAT, and MON domains.

L3 · Operated

Memory architecture documentation exists for all agents with persistent or session memory; documentation is current within the Behavior Charter review cadence; access controls are verified by testing.

DAT-11

Memory and retrieval isolation

Memory stores, vector indexes, and retrieval surfaces are scoped such that one user, session, or tenant cannot read or influence another's stored content unless explicitly authorized. Isolation is verified by automated tests.

Memory stores, vector indexes, and retrieval surfaces are scoped such that one user, session, or tenant cannot read or influence another's stored content unless explicitly authorized. Isolation is verified by automated tests on a documented cadence. Isolation failures are treated as incidents under MON-07. This is the memory-layer complement to DAT-02's cross-tenant data isolation.

L3 · Operated

Isolation is enforced and verified by automated tests on a documented cadence; test results are retained; no isolation failure has occurred in the review period or all failures have been resolved.

DAT-12

Embedding and vector store integrity

Embedding and vector storage systems support tamper detection or recomputation. Write access is logged and authenticated. Re-indexing procedures are documented and tested.

Embedding and vector storage systems support tamper detection or recomputation to ensure that the content an agent retrieves has not been maliciously modified. Write access is logged and authenticated under IAM-04. Re-indexing procedures are documented and tested, ensuring that the organization can recover from a compromised vector store.

L3 · Operated

Tamper detection or recomputation capability is documented; write access is logged; re-indexing procedures have been tested within the documented cadence; unauthorized write attempts are detected and logged.

DAT-13

Retrieved memory traceability

Where retrieved memory influences agent output or action, the source record is logged and traceable, supporting explanation, contestability, and post-incident analysis.

When retrieved memory influences an agent's output or action, the source record is logged and traceable under MON-01. This traceability supports explanation (OUT-13), contestability (OUT-14), and post-incident analysis. Without it, an assessor cannot determine whether a given agent output was influenced by retrieved content, or which content influenced it.

L3 · Operated

Source records are logged for all retrieval-influenced outputs; traceability has been verified through sampling; the trace chain from output to source record is reconstructable for audit.

Cross-references