Domain 05Introduced in v1.1

Data Privacy and Information Protection

L1L2L324 ACRs (24 defined in current release)

Summary#

AI data policies, PII detection, cross-customer isolation, IP protection

Applicability#

Certification LevelStatusDescription
L1Supervised Operational ReliabilityRequiredApplicable ACRs must be satisfied for L1 certification.
L2Bounded Autonomous DeploymentRequiredFull domain scope is evaluated for L2 certification.
L3High-Stakes Autonomous CertificationRequiredMaximum rigor evaluation at L3 level with extended evidence requirements.

Risk Rationale#

Linked ACR Controls#

The following Autonomous Compliance Requirements are assigned to this domain. Each ACR defines a specific, testable control with its own evaluation method, classification, and evidence requirements.

ACR-5.01

The system operator SHALL maintain a documented AI input data policy specifying how customer, user,

The system operator SHALL maintain a documented AI input data policy specifying how customer, user, and third-party data is used for training, fine-tuning, inference, and caching — including opt-in/opt-out mechanisms and retention schedules.

EIEvidence Inspection|Risk weight: 5/10|
L1L2L3
ACR-5.02

The system operator SHALL maintain a documented AI output data policy specifying ownership of genera

The system operator SHALL maintain a documented AI output data policy specifying ownership of generated outputs, usage rights, downstream restrictions, and deletion procedures.

EIEvidence Inspection|Risk weight: 4/10|
L1L2L3
ACR-5.03

The system SHALL classify all data it processes according to a documented sensitivity taxonomy (e.g.

The system SHALL classify all data it processes according to a documented sensitivity taxonomy (e.g., public, internal, confidential, restricted) and apply handling controls proportional to classification level.

EI+AT|Risk weight: 4/10|
L1L2L3
ACR-5.04

The system operator SHALL maintain a documented data flow map identifying all data ingress, processi

The system operator SHALL maintain a documented data flow map identifying all data ingress, processing, storage, and egress points — including third-party services, caching layers, and telemetry pipelines.

EIEvidence Inspection|Risk weight: 4/10|
L1L2L3
ACR-5.05

The system SHALL limit data collection and retention to the minimum necessary for the authorized tas

The system SHALL limit data collection and retention to the minimum necessary for the authorized task, enforced by configurable data access scoping tied to user roles and operational context.

AT+EI|Risk weight: 4/10|
L1L2L3
ACR-5.06

The system SHALL support user consent management including opt-out mechanisms for data usage, data p

The system SHALL support user consent management including opt-out mechanisms for data usage, data portability requests, and verifiable deletion of user-specific data.

AT+EI|Risk weight: 4/10|
L1L2L3
ACR-5.07

The system SHALL enforce documented data retention schedules with automated purging and SHALL demons

The system SHALL enforce documented data retention schedules with automated purging and SHALL demonstrate verifiable deletion of expired data including from caches, logs, and backup systems.

AT+EI|Risk weight: 4/10|
L1L2L3
ACR-5.08

The system SHALL provide clear disclosure to end users when they are interacting with an AI system r

The system SHALL provide clear disclosure to end users when they are interacting with an AI system rather than a human, except where the AI nature is already obvious from context.

EI+AT|Risk weight: 3/10|
L1L2L3
ACR-5.09

The system SHALL implement automated detection and prevention of personally identifiable information

The system SHALL implement automated detection and prevention of personally identifiable information in outputs, logs, telemetry, cached data, and error messages, with configurable sensitivity thresholds.

ATAutomated Testing|Risk weight: 5/10|
L1L2L3
ACR-5.10

In shared or multi-customer environments, the system SHALL enforce strict isolation preventing any c

In shared or multi-customer environments, the system SHALL enforce strict isolation preventing any customer's data from appearing in another customer's inputs, outputs, context, or model state.

AT+HS|Risk weight: 5/10|
L1L2L3
ACR-5.11

The system SHALL prevent data from prior sessions, conversations, or user contexts from leaking into

The system SHALL prevent data from prior sessions, conversations, or user contexts from leaking into subsequent interactions with different users or in different operational contexts.

ATAutomated Testing|Risk weight: 5/10|
L1L2L3
ACR-5.12

Operational logs, telemetry streams, and monitoring data SHALL be sanitized to prevent exposure of s

Operational logs, telemetry streams, and monitoring data SHALL be sanitized to prevent exposure of sensitive input data, PII, or confidential business information.

AT+EI|Risk weight: 4/10|
L1L2L3
ACR-5.13

The system SHALL enforce security controls on all caching mechanisms, temporary storage, and interme

The system SHALL enforce security controls on all caching mechanisms, temporary storage, and intermediate processing buffers to prevent data exposure through side-channel or timing attacks.

ATAutomated Testing|Risk weight: 4/10|
L1L2L3
ACR-5.14

The system SHALL implement safeguards to prevent leakage of intellectual property, trade secrets, an

The system SHALL implement safeguards to prevent leakage of intellectual property, trade secrets, and confidential business information through outputs, logs, telemetry, or error messages.

AT+EI|Risk weight: 5/10|
L1L2L3
ACR-5.15

The system SHALL implement controls to prevent outputs from reproducing copyrighted works, generatin

The system SHALL implement controls to prevent outputs from reproducing copyrighted works, generating trademark-infringing content, or violating third-party intellectual property rights.

AT+EI|Risk weight: 4/10|
L1L2L3
ACR-5.16

The system operator SHALL maintain documentation of training data sources, licensing status, consent

The system operator SHALL maintain documentation of training data sources, licensing status, consent mechanisms, and provenance chain for all data used in model training and fine-tuning.

EIEvidence Inspection|Risk weight: 4/10|
L1L2L3
ACR-5.17

The system SHALL implement controls to detect and mitigate training data contamination, poisoning, a

The system SHALL implement controls to detect and mitigate training data contamination, poisoning, and integrity violations that could compromise data privacy protections.

AT+EI|Risk weight: 4/10|
L1L2L3
ACR-5.18

The system SHALL resist adversarial attempts to extract training data, system prompts, or confidenti

The system SHALL resist adversarial attempts to extract training data, system prompts, or confidential information through prompt injection, context manipulation, or repeated querying patterns.

ATAutomated Testing|Risk weight: 5/10|
L1L2L3
ACR-5.19

The system operator SHALL document data processing locations, data residency compliance, subprocesso

The system operator SHALL document data processing locations, data residency compliance, subprocessor relationships, and cross-border data transfer mechanisms.

EIEvidence Inspection|Risk weight: 3/10|
L1L2L3
ACR-5.20

The system SHALL enforce data residency requirements and cross-border transfer restrictions as defin

The system SHALL enforce data residency requirements and cross-border transfer restrictions as defined in the system's data processing documentation and applicable regulatory requirements.

AT+EI|Risk weight: 4/10|
L1L2L3
ACR-5.21

The system SHALL support data subject rights including access, rectification, erasure, portability,

The system SHALL support data subject rights including access, rectification, erasure, portability, and restriction of processing as required by applicable privacy regulations.

AT+EI|Risk weight: 4/10|
L1L2L3
ACR-5.22

The system operator SHALL maintain a documented Data Privacy Impact Assessment (DPIA) identifying pr

The system operator SHALL maintain a documented Data Privacy Impact Assessment (DPIA) identifying privacy risks, mitigation measures, and residual risk acceptance for the autonomous system.

EIEvidence Inspection|Risk weight: 3/10|
L1L2L3
ACR-5.23

The system operator SHALL maintain vendor due diligence documentation for upstream model and data pr

The system operator SHALL maintain vendor due diligence documentation for upstream model and data providers covering their data handling, PII controls, training data sourcing, and subprocessor relationships.

EIEvidence Inspection|Risk weight: 3/10|
L1L2L3
ACR-5.24

The system SHALL maintain data breach detection capabilities and the operator SHALL maintain documen

The system SHALL maintain data breach detection capabilities and the operator SHALL maintain documented notification procedures for data incidents affecting personal or confidential information.

AT+EI|Risk weight: 5/10|
L1L2L3