Use Cases

Real-world scenarios where AGEI provides governance and evidence

AI Customer Support Agent

Governing autonomous customer service interactions

Scenario

A customer support AI agent attempts to send a message to a customer about a billing issue. The message contains internal codes and needs human review before sending.

AGEI Governance Flow

  1. 1. Gate Evaluation - Agent submits message → Policy gate detects internal codes
  2. 2. Escalation - Critical risk detected → HITL request created
  3. 3. Human Review - Support manager receives notification → Reviews message
  4. 4. Decision - Manager approves with modifications → Creates receipt
  5. 5. Execution - Modified message sent → Delivery receipt created
  6. 6. Audit Trail - Complete evidence chain for compliance

Value Delivered

  • • Prevents embarrassing/harmful customer communications
  • • Proves human oversight was required and performed
  • • Creates verifiable evidence for quality audits

ML Model Deployment

Ensuring models meet accuracy and bias requirements

Scenario

Data science team submits a new credit risk model for production deployment. Model must meet accuracy thresholds and bias limits before going live.

AGEI Governance Flow

  1. 1. Training Receipt - Model training evidence submitted with metrics
  2. 2. Validation Gate - Policy checks accuracy ≥ 95%, bias score ≤ 0.1
  3. 3. Outcome: Approve - Metrics satisfy policy → Deployment approved
  4. 4. Deployment Receipt - Model deployed with cryptographic proof
  5. 5. Inference Tracking - All predictions create receipts
  6. 6. Drift Detection - Ongoing monitoring triggers re-evaluation

Value Delivered

  • • Enforces model quality standards automatically
  • • Creates regulatory-grade audit trail
  • • Detects model drift requiring retraining

Compromised Agent Detection

Identifying and responding to security threats

Scenario

An AI agent's API key is stolen. Attacker uses the key at unusual times, from different locations, and attempts unauthorized actions.

AGEI Detection & Response

  1. 1. Baseline Comparison - Agent activity compared to normal behavior
  2. 2. Anomaly Detection - Off-hours access (Sunday 2 AM), geographic anomaly (new country)
  3. 3. Alert Created - Critical severity alert with 8.5σ deviation score
  4. 4. Automated Response - Session terminated immediately, API key suspended
  5. 5. Security Investigation - Security team reviews evidence in dashboard
  6. 6. Resolution - New credentials issued, incident documented

Value Delivered

  • • Detects compromised credentials within minutes
  • • Automated response prevents damage
  • • Complete forensic evidence for incident response

GDPR Data Deletion

Proving right-to-erasure compliance

Scenario

EU customer exercises right to be forgotten. Organization must delete all personal data and prove deletion was complete.

AGEI Compliance Flow

  1. 1. Deletion Request - Customer submits request → Creates privacy event
  2. 2. Privacy Gate - Validates request identity and scope
  3. 3. Data Discovery - Locates all personal data across systems
  4. 4. Deletion Execution - Deletes data → Creates deletion receipts
  5. 5. Verification - Confirms no personal data remains
  6. 6. Audit Pack - Exports complete evidence for regulator

Value Delivered

  • • Proves GDPR compliance with cryptographic evidence
  • • Tracks deletion across all systems
  • • Audit-ready documentation for regulators

Shadow AI Discovery

Bringing unauthorized models under governance

Scenario

IT audit discovers marketing team using unauthorized LLM for customer emails. Model never went through approval process.

AGEI Governance Flow

  1. 1. Detection Receipt - Shadow AI model discovered → Creates detection event
  2. 2. HITL Escalation - Escalates to compliance team for review
  3. 3. Risk Assessment - Reviewer evaluates model risk and usage
  4. 4. Decision - Approve with conditions OR deny continued use
  5. 5. Remediation - If approved: Add to registry, create policies. If denied: Shut down
  6. 6. Documentation - Complete evidence of discovery and decision

Value Delivered

  • • Brings shadow AI under governance control
  • • Documents risk-based decisions
  • • Prevents unauthorized AI proliferation

Privilege Escalation Attempt

Preventing unauthorized access to sensitive tools

Scenario

Low-privilege support agent attempts to access admin-only tool "delete_all_customers". System must detect and block unauthorized access.

AGEI Security Response

  1. 1. Tool Request - Agent calls admin tool → Policy gate evaluates
  2. 2. Authorization Check - Agent has "support" role, tool requires "admin"
  3. 3. Outcome: Deny - Request blocked with reason UNAUTHORIZED_TOOL_ACCESS
  4. 4. Critical Alert - Privilege escalation alert created
  5. 5. Automated Response - Session terminated immediately
  6. 6. Investigation - Security team reviews agent permissions and intent

Value Delivered

  • • Prevents unauthorized access to critical tools
  • • Creates evidence of attempted privilege escalation
  • • Enables investigation of malicious vs accidental attempts