Compliance

Access and permissions

Who is allowed to read, write, or change which piece of customer data inside an AI deployment, and the audit trail proving those rules are being followed.

What it means

Access and permissions in an AI deployment is more granular than 'admin or not'. It is: which AI agents can read which fields, which staff can see the agent's reasoning, which actions trigger a human approval step, which data leaves the environment and which never does, and who can change any of those rules.

A good permissions model maps to your real organisation: a junior staff member sees less than a senior staff member, an AI agent in sandbox mode can read more than it can write, an external auditor can read logs but cannot modify them. The model is documented and reviewed quarterly.

Why it matters

Permissions failures are the most common source of AI compliance incidents. An agent that can read PII it should not need, a logging system that captures sensitive content in plain text, a staff member with admin access who should not have it. Each of these is a regulator headline waiting to happen.

Building permissions in from day one is much cheaper than retrofitting them after a near miss. Most regulated firms (PDPA, GDPR, MAS, HIPAA) require role-based access control as part of their compliance posture; an AI deployment that does not include this from the start cannot pass their review.

Example

A specialty clinic deploys an AI assistant on clinical notes. Permissions are scoped so junior nurses see only their assigned patients, senior doctors see all patients, the AI agent sees no patient identifiers (only redacted summaries), and an audit log records every read and write. The compliance officer signs off in week two.

Where this comes up

← Back to all terms