Policy & Compliance Framework
Proportionate controls mapped to deviation risk
Use deviation classification to decide when to intervene. Corrective and low-risk flows stay fast. Cost-risk and policy-risk trigger proportionate controls. Friction is a tool, not a default.
Decision Modes
Four intervention levels — from passive logging to hard blocks.
Inform
NoneSuggestion + log only. Agent sees the copilot recommendation but retains full autonomy.
Justify
LowAgent must add a structured reason tag before proceeding. Creates an audit trail.
Approve
MediumSupervisor or policy desk review required before action can proceed.
Block
Hard stopAction prevented — critical boundaries that cannot be overridden at agent level.
Enforcement Mapping
Each deviation type maps to one or more decision modes based on risk profile.
Agent correcting a weak suggestion — low risk, preserve autonomy
Agent exercising judgment within guardrails — log only
Escalation proportional to compensation threshold exceeded
Severity-based — mandatory process or safety boundary
Caught retroactively — coaching and escalation checks
Hard Boundaries
Non-negotiable rules that always trigger a Block — no override path exists.
- Zero-tolerance safety and code-of-conduct violations
- Prohibited data disclosure or privacy-breach actions
- Compensation above critical thresholds without supervisor approval
Evidence Model per Decision
Every intervention captures a structured evidence packet for audit and learning.
Governance Cadence
Regular review cycles keep thresholds calibrated and policies current.
High-risk deviation review — threshold adjustment proposals, escalation pattern analysis
False-positive / false-negative calibration — rule accuracy review and tuning
Threshold and policy mapping updates with compliance sign-off
Data Privacy by Market
Six Southeast Asian markets, each with distinct privacy regulations governing support data.
| Market | Regulation | Key Requirements |
|---|---|---|
| 🇸🇬Singapore | PDPA | Consent, purpose limitation, breach notification within 3 days |
| 🇲🇾Malaysia | PDPA 2010 | Consent + notice, cross-border data transfer restrictions |
| 🇮🇩Indonesia | PDP Law | Explicit consent, DPO appointment, breach notification 72h |
| 🇵🇭Philippines | DPA 2012 | Consent, NPC registration, breach notification 72h |
| 🇹🇭Thailand | PDPA 2022 | Lawful basis, DPO appointment, cross-border safeguards |
| 🇻🇳Vietnam | PDPP | Consent, data localization, impact assessment required |
Data Classification
Every data type has a classification, retention window, and access boundary.
| Data Type | Classification | Retention | Access |
|---|---|---|---|
| Customer PII | Sensitive | 2 years | Agents — own cases only |
| Agent action logs | Operational | 2 years | Supervisors + QA |
| Supervisor dispositions | Operational | 2 years | Supervisors + QA |
| Risk scores | Operational | 2 years | System + QA |
| Chat transcripts | Sensitive | Per-market | Agents — own cases only |
| Learning data | Derived / Anonymized | Indefinite | ML pipeline |
Privacy-by-Design Requirements
Structural safeguards embedded in the system architecture.
Pseudonymization
PII replaced with reversible tokens in processing pipelines
Purpose limitation
Data used only for declared support and improvement purposes
Right of access / correction
Customers and agents can request data export or correction
Cross-border transfer
Data stays in-region unless adequate safeguards verified
Data breach response
Automated detection with escalation within regulatory windows
Retention enforcement
Automated purge jobs aligned with per-market retention rules