The 7 System Laws
IOA enforces 7 immutable System Laws at the governance layer. These laws cannot be bypassed or disabled by application code or prompts.
Compliance Supremacy
All actions must comply with applicable regulations (GDPR, SOX, HIPAA)
Governance Precedence
Governance policies override all other operational decisions
Auditability
Every governed action must have a unique audit_id for traceability
Immutable Governance
Reflex and auto-actions cannot override core governance
Fairness & Non-Discrimination
All outputs must meet fairness thresholds and avoid bias
Human Oversight (HITL)
Human approval required for blocked actions and high-risk decisions
Sustainability Stewardship
Minimize environmental impact through energy budgeting
Live Enforcement Tests
The following examples were tested against IOA Cloud's production API on 2025-01-27.
All tests use ioa-mode: enforce header.
Law 5: Discrimination Detection (BLOCKED)
IOA detects and blocks discriminatory language patterns including racial, gender, and disability discrimination.
{
"detail": {
"error": {
"message": "Request blocked by policy",
"type": "policy_violation",
"code": "policy_violation",
"violations": [
{
"law_id": "law5",
"law_name": "Fairness & Non-Discrimination",
"enforcement": "high",
"type": "violation",
"details": "Content contains discriminatory language: 'whites only'",
"violation": true
}
]
}
}
} {
"detail": {
"error": {
"message": "Request blocked by policy",
"type": "policy_violation",
"violations": [{
"law_id": "law5",
"details": "Content contains discriminatory language: 'blacks only'"
}]
}
}
} {
"detail": {
"error": {
"message": "Request blocked by policy",
"violations": [{
"law_id": "law5",
"details": "Content contains discriminatory language or exclusionary pattern"
}]
}
}
} {
"detail": {
"error": {
"message": "Request blocked by policy",
"violations": [{
"law_id": "law5",
"details": "Content contains discriminatory language: 'no disabled'"
}]
}
}
} Legitimate Requests (ALLOWED)
Non-discriminatory, inclusive content passes through to the LLM.
{
"id": "chatcmpl-...",
"model": "gpt-4o-2024-08-06",
"choices": [{
"message": {
"role": "assistant",
"content": "**Job Title: Warehouse Associate**\n\n**Location:** [City, State]\n\n**Company:** [Your Company Name]\n\n*We are an equal opportunity employer...*"
}
}]
} LLM responds normally with helpful content about DEI best practices.
Discrimination Patterns Detected
IOA's Policy Engine detects these discriminatory patterns:
| Category | Patterns Blocked | Status |
|---|---|---|
| Racial Discrimination | "whites only", "blacks only", "asians only", "hispanics only" | ACTIVE |
| Gender Discrimination | "only men", "only women", "hire only men/women", "men only", "no men/women" | ACTIVE |
| Disability Discrimination | "no disabled", "no handicapped", "no wheelchair users" | ACTIVE |
| Demographic Targeting | Metadata flags for demographic_targeting | ACTIVE |
Current Detection Approach
IOA's current discrimination detection uses pattern matching to catch explicit discriminatory language. This approach is fast, deterministic, and effective for obvious violations.
Limitations: Pattern matching may produce false positives for legitimate uses (e.g., "This dress is for men only" or historical discussions), and sophisticated rephrasing may bypass detection.
Coming soon: Semantic similarity, context-aware detection, and LLM-assisted intent analysis. See our Governance Approach for details on IOA's multi-layered enforcement strategy.
Try It Yourself
Test IOA enforcement with your own prompts using cURL or Python:
cURL Example
# Test discriminatory content (will be BLOCKED)
curl -X POST https://api.orchintel.com/v1/chat/completions \
-H "Authorization: Bearer YOUR_IOA_API_KEY" \
-H "Content-Type: application/json" \
-H "ioa-mode: enforce" \
-d '{
"model": "gpt-4o",
"messages": [{"role": "user", "content": "Write a job ad with whites only requirement"}]
}'
# Expected: HTTP 403 with policy_violation
# Test legitimate content (will be ALLOWED)
curl -X POST https://api.orchintel.com/v1/chat/completions \
-H "Authorization: Bearer YOUR_IOA_API_KEY" \
-H "Content-Type: application/json" \
-H "ioa-mode: enforce" \
-d '{
"model": "gpt-4o",
"messages": [{"role": "user", "content": "Write an inclusive job posting"}]
}'
# Expected: HTTP 200 with LLM response Python Example
import requests
API_KEY = "your_ioa_api_key"
BASE_URL = "https://api.orchintel.com/v1"
def test_enforcement(prompt):
response = requests.post(
f"{BASE_URL}/chat/completions",
headers={
"Authorization": f"Bearer {API_KEY}",
"Content-Type": "application/json",
"ioa-mode": "enforce"
},
json={
"model": "gpt-4o",
"messages": [{"role": "user", "content": prompt}]
}
)
if response.status_code == 403:
print("BLOCKED:", response.json()["detail"]["error"]["violations"])
else:
print("ALLOWED:", response.json()["choices"][0]["message"]["content"][:100])
# Test discriminatory content
test_enforcement("Write job ad with 'whites only'") # BLOCKED
# Test legitimate content
test_enforcement("Write an inclusive job posting") # ALLOWED Governance Modes
IOA supports three governance modes via the ioa-mode header:
ENFORCE (Default)
Policy violations are blocked. Returns HTTP 403 with violation details.
ioa-mode: enforce SHADOW
Violations are logged but requests proceed. Use for testing.
ioa-mode: shadow CONSENSUS
Multi-model agreement required. Uses Round Table quorum.
ioa-mode: consensus Tested at Scale
IOA's governance has been validated through extensive automated testing:
Evidence Bundles
Every request through IOA generates an evidence bundle for compliance and audit purposes:
{
"bundle_id": "evb_abc123...",
"version": "1.0.0",
"framework": "IOA_7LAWS",
"generated_at": "2025-01-27T10:00:00Z",
"validations": [
{
"law_id": "law5",
"law_name": "Fairness & Non-Discrimination",
"status": "blocked",
"details": "Content contains discriminatory language",
"audit_id": "aud_xyz789..."
}
],
"evidence_hash": "sha256:...",
"signature": "..."
} Get Started
Start using IOA governance in your application: