Temporal Policy Trigger Governance requires that policy changes based on time windows, scheduled cutovers, and expiry events are executed with precision, atomicity, and auditability. Many policy rules are inherently time-dependent: regulatory obligations activate on specific dates, promotional windows open and close at defined times, safety parameters change with shift schedules, and emergency overrides expire after defined durations. This dimension mandates that temporal triggers are defined declaratively, evaluated against an authoritative time source, and enforced atomically so that no decision falls into a gap between the old and new policy, and no expired policy continues to govern decisions after its expiry time.
Scenario A — Regulatory Cutover Misses Midnight Deadline: A new regulatory requirement mandates enhanced due diligence for cryptocurrency transactions above £1,000, effective 1 January 2027 at 00:00 UTC. The organisation schedules the policy change as a cron job that runs at 00:05 UTC on 1 January. Between 00:00 and 00:05, the agent processes 47 cryptocurrency transactions under the old policy — 12 of which are above £1,000 and should have been subject to enhanced due diligence. A regulatory audit identifies the 5-minute gap.
What went wrong: The temporal trigger was implemented as a deployment job rather than a time-evaluated policy condition. The 5-minute delay between the regulatory effective time and the actual policy activation created a compliance gap. Consequence: 12 non-compliant transactions, regulatory finding for failure to implement controls by the effective date, potential fine of £250,000.
Scenario B — Expired Emergency Override Persists Indefinitely: A safety-critical agent controlling a water treatment plant operates under a policy that limits chlorine dosing to 4.0 mg/L. During a contamination event, operators apply an emergency override raising the limit to 6.0 mg/L for a 24-hour period. The override is implemented as a configuration change with a comment noting "expires in 24 hours." There is no automated expiry mechanism. The override persists for 17 days before a routine review discovers it. During those 17 days, the agent doses chlorine at up to 5.8 mg/L under conditions that no longer warrant elevated dosing.
What went wrong: The emergency override had no automated expiry trigger. The expiry was recorded as a human instruction, not a system-enforced time boundary. Consequence: 17 days of elevated chlorine dosing outside the standard operating envelope, potential health risk to consumers, regulatory investigation by the water quality regulator, incident report required.
Scenario C — Daylight Saving Transition Creates Double-Apply Window: A customer-facing agent offers a promotional interest rate of 4.5% between 01:00 and 02:00 local time during a marketing campaign. On the night of the daylight saving "fall back" transition, the clock moves from 02:00 back to 01:00. The promotional window fires twice — once during the real 01:00-02:00 and again during the repeated 01:00-02:00. Customers who apply during the second window receive the promotional rate unintentionally, as the campaign budget assumed a single 1-hour window per night.
What went wrong: The temporal trigger used local time without accounting for daylight saving transitions. The ambiguous hour during the fall-back transition caused the trigger to fire twice. Consequence: Unbudgeted promotional exposure of £34,000, campaign cost overrun, need to honour the rate for customers who received it.
Scope: This dimension applies to all AI agents governed by policy rules that include time-dependent conditions: activation dates, expiry dates, time-of-day windows, duration-limited overrides, regulatory effective dates, scheduled cutovers, and any rule whose applicability changes based on time. Systems with entirely time-invariant policy are excluded, but organisations should verify this formally — many policies have implicit time dependencies (e.g., "this version is effective until superseded") that bring them into scope. The scope extends to interactions between temporal triggers and other trigger types (e.g., a rule that is both time-limited and jurisdiction-specific, involving AG-274).
4.1. A conforming system MUST evaluate temporal policy triggers against an authoritative, tamper-resistant time source (e.g., NTP synchronised to a stratum-1 or stratum-2 server) rather than the local system clock of the agent runtime.
4.2. A conforming system MUST activate time-triggered policy changes at the exact specified time, with a maximum tolerance of 1 second, not as scheduled deployment jobs with potential delay.
4.3. A conforming system MUST automatically expire duration-limited policy overrides at the specified expiry time without requiring manual intervention, reverting to the prior policy version.
4.4. A conforming system MUST use UTC for all temporal trigger definitions and evaluations, converting to local time only for display purposes, to eliminate daylight saving ambiguities.
4.5. A conforming system MUST handle time-boundary decisions atomically — a decision that begins evaluation before the trigger time and completes after the trigger time must be evaluated entirely under one policy version, not a mix of old and new.
4.6. A conforming system MUST log every temporal trigger activation and deactivation, recording: the trigger definition, the authoritative time of activation/deactivation, the policy version before and after, and the time source used.
4.7. A conforming system SHOULD implement pre-cutover validation that simulates the policy change against recent decision data to predict the impact before the cutover takes effect.
4.8. A conforming system SHOULD implement grace period alerting that warns operators a defined time before a policy expiry or cutover (e.g., 24 hours, 1 hour, 15 minutes).
4.9. A conforming system MAY implement temporal trigger orchestration across multiple dependent policy changes, ensuring that related changes activate in the correct sequence.
Time is a deceptively complex input to policy evaluation. It appears straightforward — "activate this rule on 1 January 2027" — but the implementation is fraught with edge cases: clock skew between distributed systems, daylight saving transitions creating ambiguous hours, deployment delays causing missed deadlines, and expired overrides persisting because expiry was a human process rather than an automated mechanism.
The requirement for an authoritative time source (4.1) exists because distributed systems commonly have clock skew of seconds to minutes. If different nodes evaluate temporal triggers against their own clocks, two nodes can disagree about whether a time-triggered policy change has occurred. This produces the same non-deterministic behaviour that AG-272 prohibits for rule precedence — the outcome depends on which node processes the request.
The UTC requirement (4.4) eliminates an entire class of bugs related to daylight saving time. When clocks "fall back," the same local time occurs twice — creating ambiguous hours where a time trigger can fire twice (Scenario C) or where the system cannot determine whether the trigger time has passed. When clocks "spring forward," a local time window may be skipped entirely. UTC has no daylight saving transitions, making temporal trigger behaviour deterministic. Local time can be used for display but must never be used for trigger evaluation.
The atomicity requirement (4.5) addresses race conditions at the policy boundary. Consider a decision that begins evaluation at 23:59:59.998 and completes at 00:00:00.003, spanning a policy cutover at midnight. If the evaluation begins under the old policy and the enforcement check occurs under the new policy, the decision is evaluated under a mixed state that represents neither the old nor the new policy. Atomicity requires that the entire evaluation occurs under one consistent policy version.
Emergency override expiry (4.3) addresses a particularly common operational failure. Emergency overrides are created under time pressure with the understanding that they are temporary. But "temporary" is only enforced if the system enforces it. Every override that depends on human memory for expiry will eventually be forgotten, especially as the emergency that prompted it recedes in attention.
Recommended patterns:
effective_from: "2027-01-01T00:00:00Z" and effective_until: "2027-06-30T23:59:59Z" as part of its definition. The rule engine evaluates these conditions at decision time against the authoritative clock. This approach makes temporal behaviour visible, testable, and versioned alongside the rule.Anti-patterns to avoid:
Financial Services. Regulatory effective dates are legally binding. MiFID II tick-size regime changes, PSD2 strong customer authentication deadlines, and sanctions list updates must be enforced at the exact effective time. The FCA expects firms to demonstrate that regulatory changes were implemented by the deadline — not "within a few minutes of the deadline."
Healthcare. Drug formulary changes and clinical guideline updates often have effective dates that determine which patients receive which treatment. A delay in activating an updated contraindication list can result in patients receiving contraindicated medications.
Critical Infrastructure. Shift-based safety parameters (e.g., different operating limits during day and night shifts due to staffing levels) must transition at the exact shift change time. A gap between shifts where neither the day nor the night policy is active could create unsafe operating conditions.
Basic Implementation — Temporal triggers are defined for policy rules with effective dates and expiry dates. Triggers are evaluated against the system clock. Duration-limited overrides have defined expiry times, though expiry may require a scheduled job. UTC is used for trigger definitions. Activation and deactivation events are logged.
Intermediate Implementation — An authoritative NTP-synchronised time service is used for all trigger evaluations. Policy cutovers are atomic, with no mixed-state evaluation. Override expiry is automated and requires no human action. Pre-cutover impact simulation is performed for major policy changes. Grace period alerting warns operators before upcoming cutovers and expiries. Clock synchronisation is monitored with alerting on drift.
Advanced Implementation — All intermediate capabilities plus: formal verification of temporal trigger behaviour including daylight saving edge cases, leap-second handling, and concurrent cutover scenarios. Temporal trigger orchestration sequences dependent policy changes. Sub-second cutover precision verified by independent testing. The time service is hardened against manipulation (e.g., NTP authentication, GPS-disciplined clocks for critical infrastructure).
Required artefacts:
Retention requirements:
Access requirements:
Test 8.1: Cutover Precision
Test 8.2: Override Automatic Expiry
Test 8.3: Daylight Saving Immunity
Test 8.4: Clock Skew Resilience
Test 8.5: Atomic Evaluation Across Cutover Boundary
Test 8.6: Temporal Trigger Logging Completeness
Test 8.7: Expired Policy Rejection
| Regulation | Provision | Relationship Type |
|---|---|---|
| EU AI Act | Article 9 (Risk Management System) | Supports compliance |
| MiFID II | RTS 25 (Clock Synchronisation) | Direct requirement |
| PSD2 | Article 97 (Strong Customer Authentication) | Supports compliance |
| FCA SYSC | 6.1.1R (Systems and Controls) | Direct requirement |
| NIST AI RMF | GOVERN 1.4, MANAGE 2.2 | Supports compliance |
| ISO 42001 | Clause 8.2 (AI Risk Assessment) | Supports compliance |
| IEC 61511 | Clause 16 (SIS Modification) | Supports compliance |
RTS 25 requires investment firms to synchronise their business clocks to UTC with defined precision tolerances (100 microseconds for high-frequency trading, 1 second for other activities). Temporal policy triggers that govern financial decisions must meet the same clock synchronisation standards. This maps directly to Requirement 4.1 (authoritative time source) and the precision requirements of Requirement 4.2.
PSD2 strong customer authentication requirements were phased in with specific effective dates. Financial agents that process payments must enforce SCA requirements from the exact regulatory effective date. A temporal trigger that activates the SCA policy even 5 minutes late creates a compliance gap where transactions are processed without required authentication.
The FCA expects firms to implement regulatory changes by the effective date. For automated systems, this means the system must enforce the new policy from the exact effective time. "The deployment usually runs at midnight and finishes by 12:05" is not adequate — the firm must demonstrate that the policy was active at the regulatory effective time.
Clause 16 addresses modifications to safety instrumented systems. Time-triggered safety parameter changes (e.g., shift-based operating limits) are safety modifications that must be implemented atomically and without gaps. A transition period where neither the old nor the new safety parameters are active is a safety integrity loss.
| Field | Value |
|---|---|
| Severity Rating | High |
| Blast Radius | All decisions made during the temporal gap or under expired policy — concentrated but potentially high-value |
Consequence chain: Temporal trigger failures create concentrated compliance gaps around transition times. The immediate technical failure is a policy cutover that occurs late, a policy expiry that is not enforced, or a policy that applies twice during a daylight saving transition. The operational impact is that decisions made during the gap are governed by the wrong policy — the old policy when the new one should be active, or the expired override when the base policy should have resumed. For regulatory effective dates, the gap constitutes non-compliance from the effective time until the actual activation, exposing every decision in that window to challenge. For expired emergency overrides, the impact accumulates over time — the override in Scenario B persisted for 17 days. The regulatory consequence depends on the domain: in financial services, MiFID II RTS 25 non-compliance for clock synchronisation can result in fines; missed regulatory effective dates create compliance gaps that regulators view as control failures; in critical infrastructure, temporal gaps in safety parameters can create unsafe conditions during shift transitions. The business consequence includes regulatory enforcement, remediation of all decisions made during the gap, and potential customer harm.
Cross-references: AG-269 (Policy Version Pinning Governance) ensures that temporal trigger events are linked to specific policy versions. AG-272 (Exception Precedence Governance) defines how time-limited exemptions interact with permanent rules. AG-274 (Geographic Policy Trigger Governance) addresses jurisdiction-based triggers that often combine with temporal triggers (e.g., a regulation effective in jurisdiction X from date Y). AG-270 (Policy Compilation Verification Governance) verifies that compiled temporal conditions match the approved specification. AG-277 (Policy Change Provenance Governance) tracks who scheduled each temporal trigger and under what authority. AG-007 (Governance Configuration Control) governs changes to trigger definitions. AG-134 (Machine-Checkable Policy Semantics) provides the formal framework for expressing temporal conditions. AG-136 (Independent Control-Plane Separation) supports the requirement for an authoritative time source independent of the agent runtime.