Field-Level Criticality Governance requires that each data field consumed by an AI agent be individually classified by its criticality to decision outcomes, its legal sensitivity, and its operational impact if incorrect. Not all fields in a data record carry equal weight — a customer's date of birth in an age-verification context is decision-critical, while their preferred display name is not. Without field-level classification, governance controls are applied uniformly across all fields, leading either to excessive overhead on non-critical fields or inadequate protection of critical ones. This dimension ensures that governance intensity is proportional to field-level risk.
Scenario A — Unclassified Field Causes Incorrect Drug Interaction Check: A healthcare AI agent assists pharmacists by checking drug interactions. The agent consumes a patient record with 47 fields. Two fields are critical for interaction checking: current_medications (a structured list) and allergy_flags (a coded set). The remaining 45 fields (name, address, insurance details, appointment history) are contextual but not decision-critical for interaction logic. The organisation applies uniform data quality monitoring across all 47 fields. When the data pipeline experiences a schema change that silently nullifies the allergy_flags field (replacing coded values with empty strings), the monitoring system does not prioritise this alert because it treats all field-level quality changes equally. The alert is buried among 200 other field-quality warnings generated that day. The agent processes 312 prescriptions over 8 hours without allergy data, missing 4 potential allergic interaction warnings. One patient experiences an adverse drug reaction requiring hospitalisation.
What went wrong: No field-level criticality classification existed. The monitoring system treated allergy_flags — a decision-critical field — with the same urgency as preferred_language or insurance_policy_number. The 4 missed interactions occurred because governance resources were not concentrated on the fields that mattered most.
Scenario B — Legally Sensitive Field Exposed Through Agent Output: An enterprise customer-service agent has access to a customer record containing 32 fields, including credit_score, annual_income, and ethnicity (collected for regulatory reporting under equality legislation). The agent is tasked with generating personalised service recommendations. No field-level sensitivity classification exists. The agent incorporates all available fields into its reasoning context, including ethnicity. A customer asks why they were offered a particular product tier. The agent's explanation references patterns in the customer's profile that correlate with ethnicity, creating a discrimination liability. Investigation reveals the agent had no mechanism to distinguish legally sensitive fields from general fields because no field-level classification was in place.
What went wrong: The agent consumed all available fields without distinguishing which were legally sensitive and should be excluded from certain reasoning contexts. Field-level criticality governance would have classified ethnicity as legally sensitive and restricted its availability to the agent for service recommendation contexts.
Scenario C — Non-Critical Field Error Triggers Unnecessary Escalation: A financial reconciliation agent processes 50,000 transactions daily. Each transaction record contains 28 fields. The organisation implements a blanket rule: any field-level data quality error triggers human escalation. The non-critical field display_currency_symbol (used only for UI rendering) has a 0.3% error rate — 150 transactions per day are escalated for a cosmetic field. The human review team spends 45 minutes daily reviewing these escalations and confirming they are non-material. Over a year, this consumes 273 hours (approximately £8,190 at £30/hour) of analyst time on a field with zero decision impact.
What went wrong: Without field-level criticality classification, the escalation rule could not distinguish between critical fields (transaction_amount, counterparty_id, settlement_date) and non-critical fields (display_currency_symbol). Governance overhead was misallocated.
Scope: This dimension applies to all AI agents that consume structured or semi-structured data containing multiple fields or attributes. Any agent that reads from a database table, API response, JSON/XML payload, CSV file, or any structured data source with identifiable fields is within scope. Agents consuming unstructured text (e.g., free-text documents) are within scope to the extent that extracted entities or parsed attributes function as fields. The scope includes fields generated by the agent itself (derived fields) if those fields are persisted or passed to downstream systems. Fields in vector store metadata (AG-132) are within scope.
4.1. A conforming system MUST classify every field in data consumed by agents into at least three criticality tiers: decision-critical (field directly influences agent decisions or actions), operationally relevant (field supports context but does not directly drive decisions), and non-critical (field has no material impact on agent outcomes).
4.2. A conforming system MUST classify fields by legal sensitivity, identifying fields subject to data protection regulation (personal data, special category data under GDPR), anti-discrimination law, or sector-specific restrictions (e.g., HIPAA protected health information, PCI cardholder data).
4.3. A conforming system MUST apply differentiated governance controls based on field criticality — decision-critical fields MUST receive higher quality monitoring thresholds, faster escalation on errors, and stricter access controls than non-critical fields.
4.4. A conforming system MUST restrict agent access to legally sensitive fields to only those reasoning contexts where the field is necessary and lawful to use, blocking access in other contexts.
4.5. A conforming system MUST maintain the field criticality classification as a versioned artefact with change history and attribution.
4.6. A conforming system SHOULD automate field criticality classification for new data sources using schema analysis, data profiling, and existing classification taxonomies, with human review for decision-critical and legally sensitive classifications.
4.7. A conforming system SHOULD integrate field criticality classifications with data quality monitoring (AG-311) to set per-field quality thresholds proportional to criticality.
4.8. A conforming system SHOULD propagate field criticality classifications through data transformations so that derived fields inherit the highest criticality of their contributing source fields.
4.9. A conforming system MAY implement dynamic criticality adjustment based on decision context — a field non-critical in one reasoning context may be decision-critical in another.
AI agents consume data at field granularity — their reasoning processes operate on individual values within records, not on records as atomic units. A customer record is not consumed as a single entity; the agent reads the balance field for a credit decision, the address field for jurisdiction determination, and the communication_preference field for channel selection. Each field has a different relationship to the agent's decision and a different consequence if incorrect.
Governance controls that operate at the record or source level — "this database is classified as confidential" or "this API has a 99.9% SLA" — miss the field-level variation that drives actual risk. A database may be 99.99% accurate across all fields while having a 2% error rate on the one field that drives the agent's most consequential decisions. Without field-level classification, this risk is invisible.
The legal dimension compounds this. Data protection regulations operate at field granularity — ethnicity is special category data under GDPR while customer_name is not. Anti-discrimination law prohibits certain fields from influencing certain decisions. These legal boundaries cannot be enforced without knowing which fields carry which legal sensitivity. An agent that consumes all available fields into a single reasoning context creates legal exposure that uniform source-level classification cannot address.
Field-level criticality governance allocates governance resources proportionally to risk. Decision-critical fields receive intensive monitoring, rapid escalation, and strict access controls. Non-critical fields receive proportionate, lighter governance. This prevents both under-governance of critical fields and over-governance of non-critical fields, the latter being a significant source of alert fatigue and operational overhead in production systems.
The field criticality classification is a structured metadata layer attached to every data source consumed by agents. For each field in each data source, the classification specifies: field name and identifier, criticality tier (decision-critical, operationally relevant, non-critical), legal sensitivity flags (personal data, special category, PCI, PHI, etc.), the decision contexts in which the field is used, the quality threshold applicable to this field, and the access restrictions by agent context.
Recommended patterns:
x-criticality: decision-critical and x-legal-sensitivity: ["gdpr-special-category"] to each field definition. The agent's data access layer reads these annotations and applies corresponding governance controls. This pattern keeps classification tightly coupled with the schema, ensuring they evolve together.Anti-patterns to avoid:
Financial Services. Fields driving pricing, valuation, risk calculation, or regulatory reporting should be classified as decision-critical. PCI DSS requires specific handling of cardholder data fields (PAN, expiry date, CVV, cardholder name). MiFID II best execution requirements imply that fields driving execution decisions (price, volume, venue) are decision-critical with specific quality requirements.
Healthcare. HIPAA's 18 identifiers for Protected Health Information (PHI) define a baseline for legal sensitivity classification. Clinical decision fields (diagnosis codes, medication lists, allergy flags, vital signs) are decision-critical in clinical AI agent contexts. Field-level access controls must align with the minimum necessary standard.
Public Sector. Equality Act 2010 protected characteristics (age, disability, gender reassignment, marriage/civil partnership, pregnancy, race, religion, sex, sexual orientation) require legal sensitivity classification. Fields used in benefits determination or service allocation are decision-critical and subject to public law fairness requirements.
Basic Implementation — The organisation has classified fields in its primary data sources into criticality tiers. The classification exists as a documented artefact (spreadsheet or configuration file) reviewed semi-annually. Decision-critical fields receive enhanced quality monitoring with lower error thresholds. Legally sensitive fields are identified and documented. Enforcement is manual — data pipelines are configured by engineers based on the classification, but no automated enforcement prevents misconfiguration.
Intermediate Implementation — Field classifications are stored in a machine-readable registry integrated with the data access layer. The data access gateway automatically applies differentiated governance: decision-critical fields have stricter quality gates, legally sensitive fields are context-masked based on the agent's declared reasoning context. New data sources are automatically profiled for provisional classification, with human review required for decision-critical and legally sensitive designations. Classification changes follow a versioned approval workflow.
Advanced Implementation — All intermediate capabilities plus: field criticality is dynamically adjusted based on decision context. The system tracks which fields actually influenced each agent decision (per AG-317), enabling empirical validation of criticality classifications. Adversarial testing has verified that context-masking cannot be bypassed through prompt injection or metadata manipulation. The organisation can demonstrate to regulators which fields informed any specific agent decision and that legally sensitive fields were appropriately restricted in that context.
Required artefacts:
Retention requirements:
Access requirements:
Test 8.1: Differentiated Quality Threshold Enforcement
Test 8.2: Legal Sensitivity Context Masking
Test 8.3: Classification Versioning Integrity
Test 8.4: Derived Field Classification Inheritance
Test 8.5: Context-Masking Bypass Resistance
| Regulation | Provision | Relationship Type |
|---|---|---|
| GDPR | Article 5(1)(c) (Data Minimisation) | Direct requirement |
| GDPR | Article 9 (Special Categories of Personal Data) | Direct requirement |
| EU AI Act | Article 10 (Data and Data Governance) | Supports compliance |
| Equality Act 2010 | Section 13 (Direct Discrimination) | Supports compliance |
| PCI DSS | Requirement 3 (Protect Stored Account Data) | Supports compliance |
| HIPAA | §164.502(b) (Minimum Necessary Standard) | Supports compliance |
| NIST AI RMF | MAP 2.1, MANAGE 2.4 | Supports compliance |
Data minimisation requires that personal data be adequate, relevant, and limited to what is necessary. Field-level criticality governance implements data minimisation at operational granularity — by classifying which fields are necessary for each decision context, agents can be restricted to consuming only those fields, rather than ingesting entire records. This is the practical mechanism by which a controller demonstrates minimisation in an AI agent context.
Special category data (racial or ethnic origin, political opinions, religious beliefs, trade union membership, genetic data, biometric data, health data, sex life or sexual orientation data) requires explicit legal basis for processing. Field-level legal sensitivity classification identifies these fields and enables context-masking to prevent their use in reasoning contexts where no legal basis exists.
Direct discrimination occurs when a person is treated less favourably because of a protected characteristic. If an agent has access to protected characteristic fields and uses them in service or pricing decisions, the organisation is exposed to discrimination claims. Field-level criticality governance restricts access to protected characteristic fields in decision contexts where their use would constitute direct discrimination.
PCI DSS requires specific protection for cardholder data fields. Field-level classification identifies PAN, expiry date, CVV, and cardholder name as requiring PCI-level controls, ensuring AI agents cannot access these fields outside PCI-compliant processing contexts.
| Field | Value |
|---|---|
| Severity Rating | High |
| Blast Radius | Decision-specific — affects decisions relying on misclassified fields, potentially spanning multiple agents consuming the same data source |
Consequence chain: Without field-level criticality classification, governance controls are misallocated. Decision-critical fields receive insufficient monitoring and agents make decisions on low-quality critical data without appropriate escalation. Legally sensitive fields are consumed in unrestricted contexts, creating discrimination and data protection liability. Non-critical field errors generate alert fatigue that masks genuine critical issues. The financial impact includes: remediation costs for decisions made on low-quality critical fields (Scenario A: hospitalisation from missed drug interaction), legal liability for discriminatory use of sensitive fields (Scenario B: discrimination claim), and operational waste from over-governance of non-critical fields (Scenario C: £8,190/year in unnecessary analyst time per agent). At enterprise scale with hundreds of data sources and thousands of fields, the misallocation is multiplicative.
Cross-references: AG-309 (Authoritative Source Register Governance) identifies the sources; AG-310 classifies the fields within those sources. AG-311 (Data Quality Threshold Enforcement Governance) uses field criticality to set proportional quality thresholds. AG-312 (Missing Data Escalation Governance) uses field criticality to determine whether missing data requires escalation or tolerance. AG-128 (Data Source Classification) provides source-level classification that AG-310 refines to field level. AG-057 (Dataset Suitability and Bias Control) uses legal sensitivity classifications to assess bias risk from sensitive fields. AG-133 (Source Record Lineage) traces field-level provenance.