Built to Protect What You Bring Into the Room.
Every decision rehearsal involves sensitive context — market intelligence, financial projections, strategic options that haven't been announced. MAIA's compliance architecture ensures that what you share stays protected, what MAIA outputs stays defensible, and your organization stays on the right side of the regulations that govern your industry.
compliance rule sets
patterns across all industries
rules with compliant rewrites
retained after detection
The Four-Layer Compliance Architecture
Most AI compliance strategies are a policy document and a terms-of-service clause. MAIA's compliance is running code — four independent layers, each operating at a different point in the pipeline, each enforceable without relying on the others.
The compliance layer is invisible in normal operation. Neither DIAA nor LAA surface to the Navigator unless a flag is triggered. When a flag fires, you receive a brief plain-language notice — no rule citations, no agent names, no technical compliance language. The system is a guardrail, not an interrogation.
Every flag event from both agents writes to the session compliance audit log: timestamp, industry, stage, flag category, action taken. content_logged is always false. The flagged content is never recorded. Only the event is.
16 Industries. Every one governed.
MAIA launched with 14 industry profiles. The compliance architecture adds two more — Nonprofit/NGO and a Generic/Cross-industry fallback mode — bringing total coverage to 16. Each industry has its own dedicated compliance rule set: detection patterns for DIAA, prohibited language rules for LAA, scope boundaries, governing bodies, and ZDR requirements.
The two new additions matter for different reasons. Nonprofit/NGO was added because nonprofit boards carry genuine fiduciary duties — documenting that major decisions were stress-tested is a governance asset, not a compliance burden, and MAIA's Visual Intelligence Package serves that purpose directly. Generic/Cross-industry is the compliance fallback mode: when MAIA cannot confirm a specific industry from the session context, it activates maximum-caution mode — all universal detection patterns active — and notifies the Navigator that industry-specific rules could not be confirmed.
Data Ingestion Audit Agent — How It Works
DIAA operates at the input boundary of the pipeline. Before any Navigator-supplied data enters agent processing, DIAA scans it against two pattern sets: universal patterns that fire regardless of industry, and the industry-specific patterns loaded from the active industry's compliance rule set.
Universal detection patterns (all industries)
These fire on every session regardless of which industry is selected:
- SSN patterns — numeric sequences matching ###-##-#### format
- Credit card patterns — 16-digit sequences matching Luhn algorithm
- Classified document markings — TOP SECRET, SECRET, CONFIDENTIAL, CUI, NOFORN, FOUO
- ITAR/EAR indicators — USML category references, ECCN codes, export license numbers
- API keys and credentials — bearer tokens, OAuth secrets, private key headers
- MNPI language patterns — unannounced earnings, pending acquisition language
- PHI combination patterns — personal identifiers combined with medical or clinical terms
- Attorney-client markers — privilege language combined with matter identifiers
Industry-specific pattern types
Each of the 49 industry-specific patterns is structured as a typed, executable object — not prose guidance. Each pattern carries an ID, description, type, keyword list or regex, context requirements, proximity window, flag category, and severity level. DIAA executes these directly against input text.
Pattern types in use: keyword_proximity — keyword present within N words of a context marker. regex — direct pattern match against input text. keyword_list — any keyword match triggers flag. pattern_combination — multiple signals required together. structural_scan — document structure analysis for classified header patterns.
What happens on a flag
When DIAA identifies a prohibited data pattern, it executes a four-step sequence:
- Hold — The flagged data is withheld from the pipeline. Processing does not continue with flagged content.
- Notify — The Navigator receives a plain-language notice identifying the flag category and the action required. No rule citations. No agent names.
- Log — The flag event is written to the session compliance audit log: timestamp, session ID, flag category, industry, stage, action taken. The flagged content itself is never logged.
- Offer — The Navigator is offered three options: remove or redact and resubmit; proceed without the flagged source; abort the session.
Zero Data Retention on every flag
When DIAA or LAA flags prohibited content, that content is discarded immediately. The audit log records the event — timestamp, industry, stage, flag category — but never the content itself. content_logged is hardcoded to false in the audit log schema. This is not configurable. It is not a policy setting. It is an architectural constraint that cannot be loosened without a code change and a documented legal sign-off.
on flag
Language Audit Agent — How It Works
LAA operates at the output boundary of every pipeline stage. Before any agent output reaches the Navigator, LAA reviews it across three independent dimensions. Normal operation is silent — the Navigator never sees LAA working. When a flag fires, the Navigator receives a brief notice. In severe cases where output cannot be rewritten compliantly, it is held and the stage regenerates.
Three audit dimensions
Dimension 1 — MAIA Language Standard. Enforced universally, every output, every stage, regardless of industry. MAIA surfaces, reveals, supports, and enables. MAIA never decides, mandates, forces, directs, or recommends. Minor violations are rewritten automatically without Navigator notification.
Dimension 2 — Industry Prohibited Language. Each industry's compliance rule set defines specific prohibited phrases and their compliant rewrites. Investment advice language in Financial Services. Clinical recommendation language in Healthcare. Legal opinion language in Legal Services. ITAR classification determinations in Defense. When LAA detects these patterns, it rewrites to the pre-defined compliant version and surfaces a brief inline notice.
Dimension 3 — Scope Boundary Enforcement. MAIA must not claim capabilities it does not have, assert certainty beyond what evidence supports, or frame rehearsal outputs as binding organizational commitments. Overreach language is flagged and softened.
The MAIA Language Standard
MAIA's language standard is the simplest and most powerful compliance protection in the system. It keeps MAIA clearly in the decision support category — never the decision making category, which is where AI regulation is concentrating across financial services, healthcare, insurance, and legal. The LAA enforces this automatically on every output before the Navigator sees it.
The language standard is a regulatory buffer. It keeps MAIA clearly positioned as a decision support tool across every industry where AI regulation is most active. No output from MAIA constitutes investment advice, medical advice, legal opinion, actuarial determination, or regulatory compliance guidance.
The Compliance Audit Log
Every flag event from both DIAA and LAA writes a structured record to the session compliance audit log. The log travels with the session — it is embedded in the Visual Intelligence Package that exports when the rehearsal completes. Enterprise compliance officers and legal reviewers can access it from the package metadata. No separate compliance dashboard is required. The record ships with the decision brief.
Each log entry records: session ID, timestamp (UTC), agent (DIAA or LAA), active industry, pipeline stage, flag category, action taken, whether the Navigator was notified, and resolution status. content_logged is always false. No log entry ever contains the text that triggered the flag.
Audit trail as a governance asset. In industries where decision documentation is required — financial services, healthcare governance, nonprofit boards, government — MAIA produces a documented record of structured decision-making by design. The compliance audit log embedded in the Visual Intelligence Package demonstrates not just what decision was made, but that the process of making it was governed, stress-tested, and compliant. That record is available for board review, regulatory examination, and legal audit without any additional work.
How MAIA Compares on Compliance
| Capability | MAIA Decision OS | Strategy consultant | Generic AI assistant |
|---|---|---|---|
| Industry-specific input scanning | ✓ 49 structured patterns, 16 industries | Practitioner-dependent | — |
| Prohibited language enforcement on output | ✓ 71 LAA rules, automatic rewrite | Manual review | — |
| Zero data retention on flagged content | ✓ Architecturally enforced | Policy-dependent | — |
| Compliance audit trail with deliverable | ✓ Embedded in Visual Intelligence Package | Separate engagement record | — |
| Navigator acknowledgment gate pre-session | ✓ Industry-specific, timestamped | Engagement letter | — |
| Standalone ZDR deployment for regulated industries | ✓ Cloudflare-hosted, no Claude accounts required | N/A | — |
| Language standard enforcement — no advice framing | ✓ Automatic, every output, every stage | Attorney review required | — |
What This Means for Your Role
Ready to rehearse with the compliance architecture your decision deserves?
Start a rehearsal in Claude today. No separate software. No IT deployment required for the Claude Tool version.
Start Your Rehearsal → View Pricing