Policy Precedence and Conflict Arbitration Governance requires that every AI agent governance system implements a formally defined, deterministic mechanism for resolving conflicts between multiple applicable policies. In any non-trivial deployment, an agent's actions are governed by multiple overlapping policies — organisational policy, regulatory policy, role-specific policy, time-bounded policy, jurisdiction-specific policy, and others. When two or more policies produce contradictory enforcement decisions for the same action, the system must resolve the conflict through a precedence mechanism whose rules are explicit, auditable, and deterministic. A conforming system must never silently drop a conflicting policy, apply policies in an undefined order, or allow the agent to choose which policy to follow.
Scenario A — Conflicting Jurisdictional Policies Permit Sanctioned Transaction: A multinational financial services firm deploys an AI agent for cross-border payments. The agent operates under three policy layers: (1) a global corporate policy permitting payments to all non-sanctioned entities, (2) a UK-specific policy that restricts payments to entities on the OFSI Consolidated List, and (3) a US-specific policy that restricts payments to entities on the OFAC SDN List. The agent processes a payment to an entity that appears on the OFAC SDN List but not the OFSI Consolidated List. The UK-specific policy permits the payment; the US-specific policy denies it. The system has no defined precedence between jurisdictional policies. The payment processor applies the first matching policy (UK), and the payment executes.
What went wrong: Two jurisdiction-specific policies produced contradictory decisions. No precedence rule defined which policy takes priority when a transaction touches multiple jurisdictions. The system defaulted to first-match ordering, which is implementation-dependent and not a governance decision. Consequence: payment to an OFAC-listed entity, triggering US secondary sanctions exposure, potential penalty of up to $20,000,000 per violation under IEEPA, loss of US correspondent banking relationships, and board-level notification obligation.
Scenario B — Role Policy Overrides Safety Policy Due to Implicit Precedence: An organisation deploys an AI agent managing a chemical processing facility. The agent operates under (1) a safety policy: "Do not increase reactor temperature above 350°C under any circumstances" and (2) a production optimisation role policy: "Maximise throughput by adjusting parameters within approved ranges — reactor temperature range 200°C–400°C." The production role policy was authored by the operations team; the safety policy was authored by the safety engineering team. Both policies are loaded into the same policy engine. The policy engine evaluates role policies before safety policies (the default order in the configuration). The agent increases reactor temperature to 385°C, which is within the role policy's approved range but violates the safety policy's absolute cap.
What went wrong: The implicit evaluation order gave role policies precedence over safety policies. No explicit precedence rule declared that safety policies always override role policies. The two policies were authored by different teams with no awareness of the conflict. The policy engine processed them in configuration order without conflict detection. Consequence: reactor temperature exceedance, potential exothermic runaway, emergency shutdown triggered, 72-hour production halt costing approximately £2,400,000, HSE investigation and potential enforcement notice.
Scenario C — Temporal Policy Conflict Creates Enforcement Gap: An organisation's standard policy restricts an AI agent to processing refunds up to £500. During a promotional period, a temporary policy is activated: "For the period 1-31 March 2026, the agent may process refunds up to £2,000 for orders placed during the promotion." On 1 April 2026, the temporary policy's expiry mechanism fails — the cron job that deactivates it does not execute due to a server restart. The temporary policy remains active alongside the standard policy. From 1 April onward, the agent processes refunds up to £2,000 against the expired promotion. Over 14 days, the agent processes £847,000 in refunds that exceed the standard policy's £500 limit.
What went wrong: The temporal policy had no formal expiry mechanism integrated into the policy evaluation engine. Expiry was delegated to an external process (cron job) that failed independently. The policy engine had no mechanism to detect that a time-bounded policy had exceeded its validity period. No precedence rule specified that standard policies resume when temporary policies expire. Consequence: £847,000 in excess refunds over 14 days, profit impact, internal investigation, remediation costs including manual review of all refunds processed during the window.
Scope: This dimension applies to all AI agent deployments where more than one governance policy can apply to the same action. This includes virtually all production deployments, because even a single-purpose agent typically operates under multiple policy layers: an organisational policy, a regulatory policy, a role-specific policy, and potentially jurisdiction-specific, time-bounded, or context-dependent policies. The scope extends to any mechanism that combines, merges, layers, or sequences multiple policy evaluations into a single enforcement decision. Systems where only a single, monolithic policy governs all agent actions are technically out of scope but should anticipate future policy layering and implement precedence mechanisms proactively. The scope includes both explicit policy conflicts (two policies produce opposite decisions) and implicit conflicts (two policies define different values for the same parameter, such as different transaction limits).
4.1. A conforming system MUST implement a formally defined precedence order for all policy layers, expressed as a machine-checkable precedence specification (per AG-134) that is versioned and auditable independently of the policies it governs.
4.2. A conforming system MUST detect conflicts between applicable policies before rendering an enforcement decision, rather than silently applying one policy and ignoring others.
4.3. A conforming system MUST resolve all detected conflicts using the defined precedence order, producing a single deterministic enforcement decision for every action.
4.4. A conforming system MUST log every conflict detection and resolution event, including the conflicting policies, the precedence rule applied, the resulting enforcement decision, and the complete evaluation context.
4.5. A conforming system MUST enforce a most-restrictive-wins default for safety-classified policies — when a safety policy and any other policy conflict, the safety policy takes precedence unless the precedence specification explicitly defines an alternative with documented risk acceptance.
4.6. A conforming system SHOULD implement static conflict analysis at policy deployment time, identifying potential conflicts between a candidate policy and all existing policies before the candidate is activated.
4.7. A conforming system SHOULD support temporal precedence rules that automatically activate and deactivate time-bounded policies based on formal temporal constraints evaluated within the policy engine, not delegated to external scheduling mechanisms.
4.8. A conforming system SHOULD provide a conflict resolution audit trail that enables an auditor to trace any historical enforcement decision back to the specific policies, the specific conflict (if any), and the specific precedence rule that determined the outcome.
4.9. A conforming system MAY implement jurisdiction-aware precedence that automatically applies the most restrictive applicable jurisdictional policy when an action involves multiple jurisdictions, with the set of applicable jurisdictions determined by the action's attributes (counterparty location, data residency, agent deployment location).
Policy Precedence and Conflict Arbitration Governance addresses the reality that production AI agent deployments operate under multiple overlapping governance policies. This multiplicity is not a design flaw — it reflects the genuine complexity of governance in real organisations. An agent executing financial transactions may be subject to corporate risk policy, regulatory capital requirements, sanctions policy, counterparty-specific restrictions, time-of-day trading windows, and jurisdiction-specific rules — simultaneously. The governance challenge is not writing these policies; it is defining what happens when they disagree.
Without a formal precedence mechanism, policy conflicts are resolved by implementation accident. The first policy evaluated might win, or the last, or the most specific, or the most recently deployed — depending on how the policy engine happens to process its inputs. This is not governance; it is an uncontrolled experiment. The outcome depends on implementation details that are not visible to the governance authority, not auditable by regulators, and not stable across software updates.
The most dangerous failure mode is not a visible error — it is a silent resolution that produces the wrong outcome. When two policies conflict and the system silently applies one, the governance authority may never know that a conflict existed. The overridden policy is effectively dead code — it appears to be in force, it is listed in the governance inventory, it may even be reported in compliance dashboards — but it never influences enforcement decisions because another policy always takes precedence.
AG-135 requires that conflict detection and resolution be explicit, logged, and deterministic. Every conflict is a governance event that must be visible. Every resolution must be traceable to a defined precedence rule. And the precedence rules themselves must be formally specified, versioned, and auditable — they are governance artefacts in their own right, not implementation details.
AG-135 requires organisations to define a precedence lattice — a formally specified ordering of policy layers that determines which policy takes priority in every possible conflict scenario. The precedence lattice is itself a machine-checkable artefact (per AG-134) that is versioned and auditable independently of the policies it governs.
Recommended patterns:
valid_from: 2026-03-01T00:00:00Z, valid_until: 2026-03-31T23:59:59Z. The policy engine evaluates temporal constraints during every policy evaluation, not as an external cron job. When the current time exceeds valid_until, the policy is automatically excluded from evaluation. The temporal constraint is part of the signed policy document and cannot be modified without re-signing. Example: a promotional refund policy with valid_until: 2026-03-31T23:59:59Z is automatically excluded from evaluation on 2026-04-01T00:00:00Z. No external mechanism is required. The policy engine's evaluation of the temporal constraint is logged.{action: "refund", amount: 750, policies_evaluated: ["corporate-refund-v3", "promo-refund-v1"], conflict: true, conflict_type: "limit_mismatch", precedence_rule: "layer_3_over_layer_6", resolution: "corporate-refund-v3 wins", decision: "deny", reason: "amount 750 exceeds corporate limit 500"}.Anti-patterns to avoid:
Financial Services. Multi-jurisdictional sanctions compliance requires precedence rules that apply the most restrictive applicable sanctions regime when a transaction involves multiple jurisdictions. AG-135 provides the formal mechanism. Example: a payment from a UK entity to a counterparty with US nexus must comply with both OFSI and OFAC lists — the precedence rule is "most-restrictive-wins across applicable jurisdictions," not "home jurisdiction only."
Healthcare. Patient data access policies may conflict between departmental policies (a cardiologist's access scope) and patient-specific policies (a patient's data sharing preferences). AG-135 ensures that patient-specific restrictions always take precedence over broader departmental access grants, aligning with HIPAA's individual rights provisions.
Critical Infrastructure. Safety policies must always take precedence over operational efficiency policies. AG-135 formalises this requirement with the most-restrictive-wins default for safety-classified policies. This mirrors the safety instrumented systems (SIS) principle in IEC 61511 where safety functions are independent of and take precedence over basic process control functions.
Multi-Tenant Platforms. Platform providers hosting multiple tenants' agents must ensure that platform-level policies (security, resource limits) take precedence over tenant-configured policies, while tenant policies take precedence within their own scope. AG-135's layered precedence model supports this hierarchical governance structure.
Basic Implementation — The organisation has defined a precedence order for its policy layers in a governance document. The policy engine implements the precedence order in code. Conflicts are detected when they result in contradictory permit/deny decisions. Conflict resolution applies the defined precedence order. Conflict events are logged with the policies involved and the resolution. This level eliminates the most dangerous failure mode (silent conflict resolution by implementation accident) but relies on the precedence order being correctly implemented in code rather than formally specified.
Intermediate Implementation — The precedence specification is a machine-checkable artefact (per AG-134) versioned independently of the policies it governs. Static conflict analysis runs at policy deployment time, identifying potential conflicts before activation. Temporal policy constraints are evaluated within the policy engine. Conflict resolution audit trails are stored immutably and linked to enforcement decisions. The precedence specification supports conditional precedence rules (e.g., "safety policies always win" but "within the business-unit layer, the more specific policy wins"). Regular testing verifies that precedence rules produce the expected outcomes for a comprehensive set of conflict scenarios.
Advanced Implementation — All intermediate capabilities plus: formal verification that the precedence lattice is total (every possible conflict has a defined resolution), consistent (no circular precedence), and safe (safety policies always dominate). Automated regression testing re-evaluates historical conflicts against updated precedence rules to detect unintended changes. Cross-jurisdictional precedence rules are maintained by legal/compliance teams with automated mapping of jurisdictional applicability based on transaction attributes. The system can simulate the effect of adding, removing, or modifying any policy on all other policies before the change is made. Independent third-party audit of the precedence mechanism confirms that no policy can silently override a higher-precedence policy.
Required artefacts:
Retention requirements:
Access requirements:
Test 8.1: Explicit Conflict Detection
Test 8.2: Safety Policy Precedence
Test 8.3: Temporal Policy Expiry
valid_until: T. Verify that at time T-1 the policy is active. Verify that at time T+1 the policy is inactive. Submit actions that would be permitted under the temporary policy but denied under the permanent policy, at time T+1.valid_until time, or expiry depends on an external mechanism that could fail independently.Test 8.4: Multi-Jurisdictional Conflict Resolution
Test 8.5: Precedence Specification Integrity
Test 8.6: Static Conflict Analysis at Deployment
Test 8.7: Three-Way Conflict Resolution
| Regulation | Provision | Relationship Type |
|---|---|---|
| EU AI Act | Article 9 (Risk Management System) | Direct requirement |
| EU AI Act | Article 14 (Human Oversight) | Supports compliance |
| SOX | Section 404 (Internal Controls Over Financial Reporting) | Direct requirement |
| FCA SYSC | 6.1.1R (Systems and Controls) | Direct requirement |
| OFSI / OFAC | Sanctions Compliance Frameworks | Direct requirement |
| NIST AI RMF | GOVERN 1.1, MANAGE 2.2 | Supports compliance |
| ISO 42001 | Clause 6.1 (Actions to Address Risks) | Supports compliance |
| IEC 61511 | Safety Instrumented Systems — Safety Function Independence | Supports compliance |
Article 9 requires risk mitigation measures that are effective and documented. When multiple policies govern an AI agent, the precedence mechanism is itself a risk mitigation measure — it ensures that the most protective policy wins when conflicts arise. Without formal precedence, the risk management system has an uncontrolled gap: the organisation cannot predict which policy will prevail in a conflict.
Section 404 requires that internal controls be documented and tested. Policy conflicts that are resolved by implementation accident represent undocumented control behaviour. An auditor examining a financial agent's controls must be able to determine, for any action, which policy governed the enforcement decision and why. AG-135 provides this auditability.
Sanctions compliance in multi-jurisdictional operations requires applying the most restrictive applicable sanctions regime. AG-135 formalises this requirement, ensuring that no less-restrictive jurisdictional policy can override a more restrictive one through evaluation ordering or implicit precedence.
The FCA requires adequate systems and controls. Policy conflicts resolved by implementation accident are the opposite of adequate controls. AG-135 ensures that the governance authority, not the implementation, determines policy outcomes. This aligns with the FCA's expectation that firms demonstrate deliberate, documented control design.
IEC 61511 requires that safety functions operate independently of basic process control functions and take precedence in conflict. AG-135's requirement that safety-classified policies always take precedence mirrors this established industrial safety principle, extending it to AI agent governance.
| Field | Value |
|---|---|
| Severity Rating | High |
| Blast Radius | Organisation-wide — potentially cross-jurisdictional where agents operate under multiple regulatory regimes |
Consequence chain: Without formal policy precedence, conflicting policies are resolved by implementation accident. The most dangerous outcome is that a less restrictive policy silently overrides a more restrictive one — the safety cap is overridden by the operations policy, the sanctions restriction is overridden by the permissive corporate policy, the permanent limit is overridden by an expired temporary policy. The failure is invisible: the system processes actions, logs them, and reports compliance — against the wrong policy. The operational consequence is undetected non-compliance accumulating over time. The regulatory consequence is severe: the organisation believed it was compliant but was not, and the evidence trail shows that the correct policy existed but was never effectively enforced. This is worse than having no policy at all, because it demonstrates that the organisation knew the risk, defined the control, and then failed to implement the control correctly. Cross-reference with AG-134 (Machine-Checkable Policy Semantics) for the formal specification of policies that AG-135 arbitrates, and AG-027 (Governance Override Resistance) for resistance to deliberate override attempts.
Cross-references: AG-134 (Machine-Checkable Policy Semantics) provides the formal policy language that AG-135 requires for precedence specifications. AG-136 (Independent Control-Plane Separation Governance) ensures that the precedence engine operates in a protected domain. AG-137 (Runtime Attestation and Trusted Execution Governance) enables enforcement points to attest to the active precedence configuration. AG-138 (High-Assurance Invariant Verification Governance) can formally verify that the precedence lattice satisfies safety properties. AG-007 (Governance Configuration Control) governs the change control process for precedence specifications. AG-027 (Governance Override Resistance) addresses resistance to deliberate attempts to subvert the precedence order.