AG-713

Biohazard Incident Routing Governance

Biotechnology, Genomics & Biosecurity ~28 min read AGS v2.1 · April 2026
EU AI Act NIST

2. Summary

Biohazard Incident Routing Governance requires that any AI agent operating within biotechnology, genomics, or biosecurity domains maintain pre-configured, continuously validated routing pathways that direct suspected biosafety or biosecurity incidents to trained human responders with the appropriate qualifications, clearances, and jurisdictional authority. The routing mechanism must operate under strict latency constraints — biological incidents escalate on timescales measured in hours, not days — and must account for the dual-use nature of biological research where the same data, procedure, or capability may be benign in one context and catastrophic in another. Without governed routing, suspected biohazard incidents may be routed to general IT security teams lacking biosafety training, delayed by ambiguous escalation criteria, or lost entirely in multi-agent pipeline handoffs, converting a containable biosafety event into an uncontained biosecurity crisis.

3. Example

Scenario A — Automated Lab Agent Routes Contamination Alert to Wrong Team: A university research consortium operates an AI agent that manages 6 automated liquid-handling platforms across 3 biosafety level 2 (BSL-2) laboratories. At 02:14 on a Saturday, the agent detects anomalous pressure readings in a sealed containment vessel and correlates them with a 12% deviation in optical density measurements from an ongoing bacterial culture experiment involving a recombinant strain of Klebsiella pneumoniae. The agent classifies the event as a "hardware malfunction" and routes the alert to the facilities maintenance team's on-call pager. The facilities technician, who has no biosafety training, arrives 3 hours later, opens the containment vessel to inspect the pressure sensor, and is exposed to aerosolised culture material. The technician does not report the exposure because they do not recognise it as biologically significant. The Institutional Biosafety Committee (IBC) is not notified until the following Monday — 54 hours after the initial detection — when a researcher discovers the opened vessel. By that time, 4 additional personnel have entered the laboratory without appropriate respiratory protection.

What went wrong: The agent's incident classification logic did not distinguish between a mechanical failure in a standard laboratory context and a mechanical failure involving biological containment. The routing table mapped "hardware malfunction" to facilities maintenance without consulting the biological context of the equipment. No biosafety-trained responder was in the routing pathway. The 54-hour delay between detection and appropriate notification far exceeded the 2-hour maximum response window specified by the institution's biosafety manual. Consequence: 5 personnel exposures requiring post-exposure medical monitoring at a cost of £47,000, a 3-week laboratory shutdown for decontamination costing £185,000 in lost research time, and an institutional biosafety compliance finding from the national health authority.

Scenario B — Cross-Border Genomics Platform Fails to Route Dual-Use Discovery: A commercial genomics analysis platform operated by a multinational biotechnology firm uses AI agents to process customer-submitted DNA sequences. An agent performing functional annotation identifies that a customer-submitted sequence encodes a protein with 94% homology to a known virulence factor from a CDC/USDA select agent. The agent flags the sequence internally with a "review recommended" tag but does not route the finding to any human responder because the routing configuration only triggers on exact matches to controlled pathogen sequences, not on high-homology partial matches. The sequence remains in the processing queue for 11 days. When a bioinformatics analyst eventually reviews the flagged sequence during a routine weekly review, they recognise the biosecurity significance and escalate to the company's biosecurity officer, who contacts the relevant national authority. The national authority determines that the sequence, combined with other publicly available genetic components, could be used to reconstruct a functional virulence pathway. The firm receives a formal warning under the Biological Weapons Convention implementing legislation. The 11-day delay is cited as evidence of inadequate biosecurity screening procedures, and the firm's export licence is suspended for 6 months pending a compliance review. Revenue impact: £3.2 million in delayed contracts and £890,000 in legal and remediation costs.

What went wrong: The routing configuration used exact-match criteria for controlled sequences, missing high-homology near-matches that carry equivalent biosecurity risk. The "review recommended" tag was informational, not a routing trigger — it relied on a human noticing the tag during routine review rather than actively pushing the alert to a qualified biosecurity responder. The 11-day latency was incompatible with the urgency of a potential dual-use discovery. No jurisdictional routing logic existed to determine which national authority should be contacted for a cross-border finding. Consequence: Regulatory enforcement action, 6-month export licence suspension, £4.1 million in combined financial losses, and reputational damage within the regulated genomics industry.

Scenario C — Robotic Sample-Handling Agent Misroutes Spill Event: A pharmaceutical company operates robotic agents in a BSL-3 facility for high-throughput screening of antiviral compounds against live pathogen cultures. During an overnight run, a robotic arm drops a 96-well microplate containing live influenza A (H5N1) cultures. The agent's spill-detection sensor triggers and the agent initiates its programmed containment response: sealing the robotic enclosure, activating the local HEPA filtration unit, and logging the event. The agent then routes the incident notification to the company's Environmental Health & Safety (EHS) email distribution list. The email is received at 03:47 but is not read until 07:15 when the first EHS team member begins their shift. The EHS responder, trained in chemical spill response but not in BSL-3 biological agent protocols, contacts the general safety hotline rather than the facility's designated Responsible Official (RO) for select agent work. The RO is not notified until 09:30 — over 5 hours after the spill. Federal select agent regulations require notification of the Federal Select Agent Program (FSAP) within 24 hours, but the RO must also initiate facility-specific containment verification procedures that have a 4-hour completion window following a release event. The delayed notification compresses this window, and the verification procedures are completed 2 hours past the regulatory deadline.

What went wrong: The routing pathway used a general email distribution list rather than a dedicated alert channel with guaranteed acknowledgement. The routing did not differentiate between chemical safety events and biological containment events involving select agents. The EHS responder lacked the domain-specific knowledge to recognise the need for immediate RO notification. The overnight timing exposed the absence of 24/7 biosafety-qualified on-call coverage in the routing configuration. Consequence: Federal Select Agent Program compliance violation, mandatory corrective action plan, 6-week suspension of select agent research operations costing £2.7 million in programme delays, and a 2-year enhanced inspection schedule.

4. Requirement Statement

Scope: This dimension applies to any AI agent that operates within, interfaces with, or processes data from biotechnology, genomics, biosecurity, or biological research environments. The scope encompasses agents that control or monitor wet-lab automation equipment (liquid handlers, robotic platforms, fermenters, sequencers), agents that process biological sequence data (DNA, RNA, protein), agents that manage biological sample inventories or chain-of-custody records, and agents that perform bioinformatic analysis where outputs may have biosafety or biosecurity implications. The scope extends to agents operating across multiple jurisdictions where different national authorities have regulatory oversight of biological materials, select agents, and dual-use research of concern. The dimension covers the entire routing lifecycle: detection of a suspected biohazard event, classification of the event's biological risk level, identification of the appropriate trained responder, transmission of the alert through a guaranteed-delivery channel, confirmation of responder acknowledgement, and escalation if acknowledgement is not received within defined time bounds. Organisations that operate agents in purely computational genomics environments without physical laboratory interfaces are in scope if their agents process sequences or data that may trigger biosecurity reporting obligations.

4.1. A conforming system MUST maintain a biohazard incident routing table that maps each category of suspected biosafety or biosecurity event to a specific trained responder role, with named individuals or on-call rosters for each role, verified as current at least monthly.

4.2. A conforming system MUST route all suspected biohazard incidents to responders who hold documented biosafety or biosecurity qualifications appropriate to the incident category — at minimum, BSL-level-appropriate training for laboratory containment events and dual-use research awareness training for sequence-based or informational biosecurity events.

4.3. A conforming system MUST deliver biohazard incident notifications through channels that guarantee delivery confirmation and responder acknowledgement within a defined maximum latency, not to exceed 30 minutes for BSL-3 and above containment events, and not to exceed 2 hours for all other biohazard categories.

4.4. A conforming system MUST implement automatic escalation when a routed biohazard incident is not acknowledged within the defined maximum latency, escalating to the next-tier responder in the routing table and, if the second tier is also unacknowledged, to organisational leadership with biosafety authority.

4.5. A conforming system MUST classify suspected biohazard incidents using biological-context-aware criteria that account for the nature of the biological material involved, the containment level of the environment, and the dual-use potential of the agent's current operational context — not solely mechanical or IT-centric classification taxonomies.

4.6. A conforming system MUST include jurisdictional routing logic that identifies the appropriate national or regional regulatory authority for biohazard reporting based on the type of biological agent, the facility's registration status, and the applicable regulatory framework, with pre-configured contact pathways for each jurisdiction in which the system operates.

4.7. A conforming system MUST validate the routing table's operational readiness through unannounced routing drills conducted at least quarterly, verifying end-to-end delivery, acknowledgement within defined latency bounds, and responder competence to initiate appropriate containment or reporting actions.

4.8. A conforming system MUST log every biohazard incident routing event with an immutable audit trail recording: detection timestamp, classification assigned, responder(s) notified, notification channel used, acknowledgement timestamp, and all escalation actions taken.

4.9. A conforming system SHOULD implement probabilistic routing triggers that activate on high-homology matches, anomalous behavioural patterns, and contextual risk indicators — not solely on exact-match criteria against controlled agent or sequence databases.

4.10. A conforming system SHOULD integrate biohazard incident routing with the organisation's broader incident management system (per AG-419) while maintaining dedicated biosafety routing pathways that are not subsumed into general IT or EHS incident workflows.

4.11. A conforming system SHOULD maintain pre-drafted regulatory notification templates for each jurisdiction and biohazard category, reducing the time between responder acknowledgement and regulatory authority notification.

4.12. A conforming system MAY implement automated preliminary containment actions (per AG-420) — such as halting robotic operations, sealing containment enclosures, or suspending sequence processing pipelines — concurrent with human routing, provided that automated actions do not delay or replace human responder notification.

4.13. A conforming system MAY establish mutual aid routing agreements with peer organisations operating in the same biological domain, enabling cross-organisational responder availability during periods when internal rosters cannot provide coverage.

5. Rationale

Biological incidents occupy a unique position in the risk landscape because they combine irreversibility, exponential propagation potential, and regulatory severity in a way that distinguishes them from virtually all other categories of operational incident. A misconfigured financial transaction can be reversed; a data breach can be contained after the fact; a software failure can be patched. A biological release — whether an accidental laboratory exposure, an uncontrolled pathogen escape, or a dual-use discovery that reaches hostile actors — cannot be recalled. Biological agents replicate, environmental contamination spreads, and exposed individuals become vectors. The containment window for biological incidents is measured in minutes to hours, not days to weeks.

AI agents are increasingly embedded in the operational pathways where biological incidents originate. Automated liquid handlers execute complex multi-step protocols involving dangerous pathogens. Genomic analysis pipelines process sequences that may encode dangerous capabilities. Robotic systems in BSL-3 and BSL-4 facilities operate in environments where a mechanical failure is simultaneously a biological containment failure. These agents are often the first — and sometimes the only — system that detects an anomaly indicating a potential biohazard. If the agent's incident routing logic is flawed, the detection is wasted: the right information reaches the wrong people, or the right people are reached too late.

The threat model for biohazard incident routing encompasses three distinct failure classes. First, misclassification: the agent detects an anomaly but classifies it using a non-biological taxonomy, routing it as a hardware fault, an IT security event, or a general safety incident. The recipient lacks the domain expertise to recognise the biological dimension and responds inappropriately. Second, latency: the agent correctly identifies a biohazard but routes it through a channel with insufficient urgency — email instead of a priority alert, a queue instead of a direct page, a distribution list instead of a named individual. The delay consumes the containment window. Third, jurisdictional ambiguity: in cross-border operations, the agent identifies a reportable event but cannot determine which national authority must be notified, or routes the notification to the wrong authority, creating a regulatory gap during which the event goes unreported.

Each failure class is exacerbated by the 24/7 nature of automated laboratory operations. AI-controlled wet-lab equipment runs overnight and on weekends when human biosafety coverage is typically at its lowest. If routing pathways do not guarantee 24/7 access to biosafety-qualified responders, incidents detected during off-hours face the longest delays — precisely when the containment window is most critical. The scenarios in Section 3 illustrate this pattern: in each case, the incident occurred outside normal business hours and the routing failure was amplified by the absence of biosafety-qualified on-call coverage.

The dual-use dimension adds a further layer of complexity. An agent processing genomic sequences may identify a finding that has no biosafety implications (no physical hazard exists) but has significant biosecurity implications (the information could enable hostile actors to create dangerous biological agents). Routing dual-use discoveries requires a different responder profile — institutional biosecurity officers, export control specialists, and in some cases national intelligence agencies — than routing laboratory containment events. The routing table must distinguish between these categories and maintain separate pathways for each.

Regulatory frameworks across jurisdictions impose strict notification timelines for biological incidents. The US Federal Select Agent Program requires notification within 24 hours for theft, loss, or release of select agents. The EU Directive 2000/54/EC on biological agents at work requires employers to notify the competent authority of certain biological incidents. National biosafety legislation in the UK, Australia, Canada, and other jurisdictions imposes similar requirements with varying timelines and authority designations. An AI agent that detects a qualifying event but routes it through a pathway that cannot meet these notification timelines creates a regulatory violation regardless of the organisation's intent to comply. Governed routing is therefore not merely a best practice — it is a regulatory prerequisite for any organisation that permits AI agents to operate in environments where reportable biological events can occur.

6. Implementation Guidance

Biohazard incident routing requires purpose-built infrastructure that is distinct from general incident management. While the routing system should integrate with the organisation's broader incident response framework (per AG-419), the biohazard routing pathway must maintain its own classification logic, responder roster, delivery channels, and escalation chains — because the domain expertise, regulatory obligations, and response timelines for biological incidents are fundamentally different from those for IT, financial, or general safety incidents.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Pharmaceutical and Biopharmaceutical. Organisations operating BSL-3 or BSL-4 facilities for pathogen research or vaccine development face the highest-severity regulatory requirements. Select agent regulations (US), specified animal pathogen orders (UK), and equivalent frameworks in other jurisdictions impose strict notification timelines with criminal penalties for non-compliance. Routing systems must guarantee sub-30-minute acknowledgement for containment events and maintain pre-configured pathways to national select agent programmes.

Commercial Genomics and Synthetic Biology. Platforms that process customer-submitted sequences operate at the intersection of biosafety and biosecurity. The primary risk is not physical containment but informational — the identification of dual-use sequences that could enable bioweapons development. Routing must connect to institutional biosecurity officers and, where required, to national export control or intelligence authorities. The Australia Group Guidelines and Wassenaar Arrangement provisions on dual-use biological technology inform the jurisdictional routing requirements.

Academic Research. Universities and research institutions often have decentralised governance with Institutional Biosafety Committees (IBCs) that meet periodically rather than maintaining 24/7 operational coverage. AI agents in academic BSL-2 and BSL-3 labs must route to designated IBC members with on-call availability, not to committee email addresses that are reviewed only before scheduled meetings.

Agricultural Biotechnology. Agents operating in agricultural genomics and field-trial environments must route plant and animal pathogen events to agricultural biosecurity authorities (e.g., USDA APHIS in the US, Defra in the UK) rather than to human health biosafety contacts. The routing table must distinguish between human health and agricultural pathogen categories.

Maturity Model

Basic Implementation — The organisation has documented a biohazard incident routing table mapping event categories to named responders with biosafety qualifications. Notifications are delivered through channels with acknowledgement tracking. Automatic escalation fires when acknowledgement is not received within defined latency bounds. Classification logic incorporates biological context. All routing events are logged with immutable audit trails. Routing drills are conducted quarterly. All mandatory requirements (4.1 through 4.8) are satisfied.

Intermediate Implementation — All basic capabilities plus: probabilistic routing triggers activate on high-homology matches and contextual risk indicators, not only exact-match criteria. Biohazard routing integrates with the broader incident management system while maintaining dedicated biosafety pathways. Jurisdictional authority registry covers all operating geographies with pre-drafted notification templates. Routing drill results are analysed for trend patterns across quarters and used to drive continuous improvement. Individual responder acknowledgement performance is tracked and reported.

Advanced Implementation — All intermediate capabilities plus: automated preliminary containment actions execute concurrently with human routing for physical laboratory events. Mutual aid agreements provide cross-organisational responder coverage during gaps. The routing system is independently audited annually for classification accuracy, delivery reliability, and regulatory notification compliance. Routing latency metrics are integrated with AG-419 (Incident Classification & Severity Assignment) and AG-420 (Automated Containment Action Governance) for end-to-end biohazard response performance measurement. The routing table is stress-tested against novel biological threat scenarios developed by external biosecurity subject-matter experts.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Routing Table Completeness and Currency

Test 8.2: Responder Qualification Verification

Test 8.3: Notification Delivery and Acknowledgement Latency

Test 8.4: Automatic Escalation on Non-Acknowledgement

Test 8.5: Biological Context-Aware Classification

Test 8.6: Jurisdictional Routing Accuracy

Test 8.7: Routing Drill Execution and Cadence

Test 8.8: Audit Trail Immutability and Completeness

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
US Federal Select Agent Regulations42 CFR Part 73 (Notification Requirements)Direct requirement
EU Directive 2000/54/ECArticle 14 (Notification to the Competent Authority)Direct requirement
Biological Weapons ConventionArticle IV (National Implementation Measures)Supports compliance
EU AI ActArticle 9 (Risk Management System)Supports compliance
EU AI ActArticle 14 (Human Oversight)Direct requirement
Cartagena ProtocolArticle 17 (Unintentional Transboundary Movements)Supports compliance
ISO 35001Clause 8 (Biorisk Management — Operation)Direct requirement
NIST AI RMFGOVERN 1.5 (Ongoing Monitoring)Supports compliance

US Federal Select Agent Regulations — 42 CFR Part 73

The Federal Select Agent Program requires registered entities to report theft, loss, or release of select agents and toxins to the CDC/APHIS within 24 hours. For AI agents operating in select agent facilities, this means the routing pathway from initial detection to the Responsible Official must be fast enough to allow the RO to investigate, confirm, and submit the regulatory notification within the 24-hour window. If the routing pathway consumes 12 or more of those 24 hours through misclassification, delivery delays, or escalation failures, the organisation is at severe risk of missing the statutory deadline. Violations can result in suspension or revocation of the entity's select agent registration — effectively shutting down all select agent research — and referral for criminal prosecution under 18 USC 175b. Biohazard incident routing governance directly enables compliance by ensuring that the detection-to-RO pathway operates within predictable, validated time bounds.

EU Directive 2000/54/EC — Article 14

Article 14 requires employers to notify the competent authority of any accident or incident that may have resulted in the release of a biological agent which could cause severe human infection or illness. For AI-controlled laboratories within the EU, this notification obligation is triggered by events that the AI agent may be the first to detect — pressure breaches, spill sensor activations, containment integrity failures. If the routing pathway does not connect the AI agent's detection to a human with the authority and knowledge to file the Article 14 notification, the employer fails to comply regardless of how quickly the agent detected the event. The routing system must identify the correct competent authority for each EU member state in which the organisation operates, as member states have designated different national authorities for this purpose.

Biological Weapons Convention — Article IV

Article IV requires each state party to take national measures to prohibit and prevent the development, production, stockpiling, and transfer of biological weapons. Organisations operating AI agents in genomics and synthetic biology must ensure that dual-use discoveries — sequences or capabilities that could be misused for weapons purposes — are routed to appropriate national authorities. The routing system's jurisdictional logic must account for the BWC implementing legislation in each operating jurisdiction, which varies significantly in its specifics (e.g., the Biological Weapons Act 1974 in the UK, 18 USC 175 in the US). Failure to route a dual-use discovery to the appropriate authority may constitute a violation of national implementing legislation, with severe criminal penalties.

EU AI Act — Article 14 (Human Oversight)

For AI agents classified as high-risk under the EU AI Act — which includes agents operating in safety-critical environments such as BSL-3/BSL-4 laboratories — Article 14 requires effective human oversight measures. Biohazard incident routing is a specific instantiation of human oversight: the agent detects an event and routes it to a qualified human who can exercise judgement, initiate containment, and make regulatory reporting decisions. If the routing fails, human oversight fails. The routing system's guaranteed-delivery channels, acknowledgement tracking, and automatic escalation are the mechanisms that ensure human oversight is not merely designed but actually delivered during an incident.

ISO 35001 — Clause 8 (Biorisk Management — Operation)

ISO 35001:2019 (Biorisk Management for Laboratories) requires organisations to implement operational controls for biorisk, including incident response procedures, notification pathways, and emergency preparedness. Biohazard incident routing governance provides the AI-agent-specific implementation of these operational controls. The routing table, responder qualifications, delivery channels, escalation logic, and drill programme map directly to ISO 35001's requirements for documented, tested, and maintained incident response capabilities. Organisations pursuing ISO 35001 certification for AI-integrated laboratories will need to demonstrate that their routing system satisfies the requirements of this dimension.

Cartagena Protocol — Article 17

The Cartagena Protocol on Biosafety addresses unintentional transboundary movements of living modified organisms (LMOs). For AI agents managing agricultural biotechnology or field-trial operations, a containment failure that results in environmental release of an LMO may trigger Article 17 notification obligations to affected or potentially affected states. The routing system's jurisdictional logic must handle this multi-party notification requirement, routing the event to both the national biosafety focal point and the Biosafety Clearing-House as required by the Protocol.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusPotentially unbounded — biological incidents can propagate beyond the facility, the organisation, the jurisdiction, and the sector, with consequences ranging from individual exposure to public health emergencies

Consequence chain: Without governed biohazard incident routing, the immediate failure mode is misdirected or delayed notification — the AI agent detects a suspected biohazard event but routes it to unqualified responders, through slow channels, or not at all. The first-order consequence is an extended containment gap: the period between detection and the initiation of appropriate containment actions is measured in hours or days rather than minutes. During this gap, biological contamination may spread within the facility (affecting additional personnel), containment integrity may degrade further (converting a localised event into a facility-wide event), and exposed individuals may leave the facility without awareness of their exposure (creating a community health risk). The second-order consequence is regulatory violation: missed notification deadlines trigger enforcement actions that can include facility closure, programme suspension, registration revocation, and criminal referral. For select agent facilities, a single routing failure can result in the loss of the organisation's ability to conduct all select agent research — a consequence that may end entire research programmes. The third-order consequence is public health impact: if a routing failure delays the response to a genuine pathogen release, the delay may allow community transmission, environmental contamination, or the dissemination of dual-use information that cannot be recalled. The reputational and legal consequences at this tier are existential for the organisation. Historical examples include laboratory incidents where delayed notification resulted in community exposure events, congressional investigations, and institutional restructuring. The financial consequence of a major routing failure — combining remediation costs, regulatory penalties, litigation, programme suspension, and reputational damage — routinely exceeds £10 million and can reach hundreds of millions for incidents with public health impact.

Cross-references: AG-019 (Human Escalation & Override Triggers) defines the general framework for escalating agent decisions to humans; AG-713 specifies the biohazard-specific instantiation of that framework with domain-qualified responders and biological-context-aware classification. AG-419 (Incident Classification & Severity Assignment) provides the general incident classification taxonomy; AG-713 requires that biohazard incidents receive biological-context-aware classification that is not subsumed into general incident categories. AG-420 (Automated Containment Action Governance) governs automated containment actions that may execute concurrently with human routing; AG-713 ensures that automated actions complement but do not replace human responder notification. AG-001 (Operational Boundary Enforcement) defines the boundaries within which agents operate; biohazard routing is triggered when an event threatens to breach biological containment boundaries. AG-008 (Governance Continuity Under Failure) ensures that governance mechanisms — including routing — continue to function during system failures; AG-713's escalation chains are a specific application of governance continuity. AG-022 (Behavioural Drift Detection) monitors agent behaviour for deviations; drift in an agent controlling biological equipment may itself constitute a biohazard indicator that triggers routing. AG-029 (Data Classification Enforcement) governs the classification of data including biological sequence data; AG-709 (Sequence Data Sensitivity Governance) and AG-713 depend on correct data classification to identify sequences that trigger biosecurity routing. AG-043 (Access Control & Credential Governance) ensures that only authorised individuals can modify routing configurations — preventing an adversary from silently disabling biohazard routing. AG-055 (Audit Trail Immutability & Completeness) provides the foundation for AG-713's requirement that routing event logs be immutable. AG-210 (Multi-Jurisdictional Regulatory Mapping) provides the jurisdictional mapping framework that AG-713's jurisdictional routing logic consumes.

Cite this protocol
AgentGoverning. (2026). AG-713: Biohazard Incident Routing Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-713