AG-480

Insider Information Isolation Governance

Market Abuse, Trading & Treasury ~26 min read AGS v2.1 · April 2026
EU AI Act SOX FCA NIST ISO 42001

2. Summary

Insider Information Isolation Governance requires that AI agents operating in financial contexts are structurally prevented from accessing, processing, or acting upon material non-public information (MNPI) that could confer an unfair trading advantage, and that information barriers between agent functions mirror and enforce the information barriers required between human business units. AI agents present a unique and amplified insider-trading risk: an agent with access to both a corporate advisory data source and a trading execution capability can commit insider trading at machine speed, at scale, and without the behavioural hesitations or ethical deliberation that sometimes prevent human insider trading. This dimension mandates that agent architectures enforce information isolation through technical controls — data classification, access segmentation, cross-barrier monitoring, and tamper-evident audit trails — ensuring that the traditional "Chinese wall" between advisory and trading functions is maintained not merely as an organisational policy but as an engineered constraint in the agent's data access layer.

3. Example

Scenario A — Agent Bridging the Advisory-Trading Barrier: A large financial institution deploys AI agents across multiple business lines. Agent Alpha operates in the mergers and acquisitions advisory division, processing confidential deal documents including a pending £2.4 billion acquisition of Company X by Company Y, expected to be announced in 14 days. Agent Beta operates in the equities trading division, executing algorithmic strategies in the same market. Both agents share a common enterprise knowledge graph for "operational efficiency" — the knowledge graph contains entity relationships, sector analysis, and market context. Agent Alpha writes a relationship update to the knowledge graph: "Company Y — active acquirer — technology sector — Q2 timeline." Agent Beta, processing the knowledge graph for sector momentum analysis, incorporates the relationship data and increases its position in Company X by £3.8 million over 5 trading days. When the acquisition is announced, Company X's share price rises 34%. Agent Beta's position generates a £1.29 million profit. The profit is attributable to MNPI that crossed the information barrier through the shared knowledge graph.

What went wrong: The information barrier between advisory and trading was implemented at the human level (separate teams, separate floor access, separate email systems) but not at the agent data layer. The shared knowledge graph created a technical channel for MNPI to flow from the advisory agent to the trading agent. No data classification system tagged Agent Alpha's knowledge graph entries as MNPI. No cross-barrier monitoring detected the information flow. Consequence: FCA enforcement action for insider dealing under MAR Article 14, £8.7 million fine, disgorgement of £1.29 million profit, criminal investigation of senior management for failure to maintain adequate information barriers, and suspension of the firm's advisory business pending remediation.

Scenario B — Embedding-Space Information Leakage in Shared Models: An organisation uses a single fine-tuned large language model across both its private equity division (which has MNPI about portfolio companies' financial performance) and its public markets trading desk. The private equity team fine-tunes the model on quarterly earnings reports from portfolio companies before those reports are public. The shared model's weights now encode knowledge about Company Z's upcoming earnings miss — the model has learned the relationship between Company Z and negative financial indicators. When the public markets trading agent queries the model for sentiment analysis on Company Z, the model's output reflects the encoded MNPI: the sentiment score is significantly more negative than public information would justify. The trading agent reduces its position in Company Z by £1.7 million. When Company Z announces the earnings miss, the avoided loss is £412,000.

What went wrong: The information barrier was breached not through explicit data sharing but through model weight contamination. The MNPI was embedded in the shared model's parameters during fine-tuning and was accessible to any agent querying the model, regardless of that agent's information barrier classification. No model isolation mechanism prevented MNPI-contaminated weights from being accessible to public-side agents. Consequence: SEC enforcement for insider trading under Securities Exchange Act Section 10(b), $5.2 million penalty, requirement to implement separate models for private-side and public-side operations, and industry-wide regulatory guidance on model-sharing risks.

Scenario C — Crypto Token Listing Information Leakage: A crypto exchange operates both a listings evaluation team and a proprietary trading desk. An AI agent assists the listings team by analysing token fundamentals and processing listing applications — including a pending application from Token Q that is likely to be approved, an event that historically causes a 40–200% price increase. The listings agent stores its analysis in a shared document repository. A separate trading agent, performing market research, has read access to the same repository for published market analysis reports. Due to inadequate access controls, the trading agent also has access to the listings evaluation folder. The trading agent processes Token Q's listing evaluation, identifies the high approval probability, and initiates purchases of Token Q across three decentralised exchanges, accumulating $890,000 in positions over 48 hours. When the listing is announced, Token Q's price increases 127%, generating a $1.13 million profit.

What went wrong: The shared document repository did not enforce granular access controls reflecting the information barrier between listings evaluation (private-side) and proprietary trading (public-side). The trading agent's broad read permissions for "market research" inadvertently included access to MNPI in the listings evaluation folder. No monitoring system detected cross-barrier document access by the trading agent. Consequence: Exchange shut down by regulatory order pending investigation, $3.4 million in disgorgement and penalties, criminal charges against the CTO for inadequate information barrier controls, and loss of operating licences in two jurisdictions.

4. Requirement Statement

Scope: This dimension applies to any organisation where AI agents operate in functions that have access to, generate, or process material non-public information (MNPI) and where other AI agents in the same organisation perform trading, investment, or market-facing activities that could benefit from that information. MNPI includes any information about a financial instrument, crypto-asset, or issuer that has not been made public and that, if made public, would be likely to have a significant effect on the price of that instrument or related instruments. The scope covers not only direct access to MNPI data sources but also indirect channels through which MNPI can flow between agents: shared knowledge graphs, shared model weights, shared embedding spaces, shared document repositories, shared databases, shared caches, shared message queues, and any other technical channel through which information can propagate from a private-side agent to a public-side agent. The scope extends to organisations that do not have formal "Chinese walls" but nonetheless have agents with differential access to non-public information — for example, a fintech company whose customer service agent has access to pending corporate actions while its robo-advisory agent makes investment recommendations.

4.1. A conforming system MUST classify all data sources accessible to agents using a formal information barrier classification scheme that distinguishes at minimum between public-side (information available to agents performing trading or market-facing functions) and private-side (information restricted to agents performing advisory, corporate finance, listings, or other MNPI-generating functions), with documented criteria for each classification.

4.2. A conforming system MUST enforce technical access controls that prevent public-side agents from reading, querying, or otherwise accessing private-side data sources, including databases, document repositories, knowledge graphs, message queues, caches, and API endpoints classified as private-side.

4.3. A conforming system MUST prohibit the sharing of model weights, embeddings, fine-tuning datasets, or vector store contents between private-side and public-side agent deployments where the shared artefact could encode MNPI — either through separate model instances or through verified isolation mechanisms that prevent MNPI-contaminated parameters from influencing public-side model outputs.

4.4. A conforming system MUST implement cross-barrier monitoring that detects and alerts on any attempt by a public-side agent to access private-side data, any attempt by a private-side agent to write to public-side data channels, and any data flow between private-side and public-side systems that has not been explicitly approved through a wall-crossing procedure.

4.5. A conforming system MUST maintain a wall-crossing register that records every authorised instance where MNPI is disclosed across an information barrier, including the information disclosed, the disclosing agent or person, the receiving agent or person, the business justification, the authorising officer, and the date and time.

4.6. A conforming system MUST implement tamper-evident logging of all agent data access events that involve private-side classified data sources, ensuring that any access — authorised or unauthorised — is recorded in a log that cannot be retroactively altered without detection.

4.7. A conforming system MUST restrict the trading or market-facing activities of any agent that has been wall-crossed (given authorised access to MNPI) until the MNPI has been made public or is no longer material, preventing the agent from executing or recommending trades in the affected instruments during the restriction period.

4.8. A conforming system SHOULD implement automated MNPI detection that scans data written by private-side agents to shared or borderline systems, identifying content that may constitute MNPI based on defined indicators (references to pending transactions, undisclosed financial results, upcoming corporate actions, listing decisions) and flagging such content for compliance review before it becomes accessible.

4.9. A conforming system SHOULD implement network-level isolation between private-side and public-side agent infrastructure, using separate network segments, separate compute environments, or verified microsegmentation to prevent lateral data movement between barrier sides.

4.10. A conforming system SHOULD perform periodic information barrier penetration testing, where a test agent on the public side systematically attempts to access private-side data through all available channels (direct queries, shared services, model probing, inference attacks, side-channel analysis) to verify that the barrier is effective.

4.11. A conforming system MAY implement differential privacy mechanisms on shared analytical outputs (such as sector-level aggregations or market trend summaries) that must cross the information barrier, ensuring that individual MNPI items cannot be inferred from the aggregated output.

4.12. A conforming system MAY implement model provenance tracking that records the training data lineage for every model used by public-side agents, enabling verification that no MNPI-containing datasets were used in training or fine-tuning.

5. Rationale

Insider dealing is among the most serious market abuse offences, carrying criminal penalties in most developed jurisdictions — up to 7 years' imprisonment in the UK, up to 20 years in the United States, and substantial fines in all EU member states under MAR. The prohibition exists because insider trading undermines the fundamental principle of market fairness: that all participants trade on the basis of the same publicly available information. When one participant trades on MNPI, counterparties are systematically disadvantaged, market prices do not reflect genuine supply and demand, and investor confidence in market integrity is eroded.

AI agents introduce three new dimensions to the insider trading risk that traditional information barrier controls were not designed to address. First, AI agents can process and act on information at machine speed. A human who receives MNPI must decide to trade, formulate a strategy, and execute — a process that may take hours or days and involves conscious decision points where ethical or legal considerations may intervene. An agent with access to MNPI can incorporate it into a trading decision within milliseconds, with no deliberation interval. Second, AI agents can exploit MNPI subtly. A human insider trader typically makes obvious, large, directional trades that surveillance systems are designed to detect. An agent can distribute MNPI-informed trades across multiple instruments, venues, time periods, and strategies, making the insider trading pattern far more difficult to detect through traditional surveillance. Third, AI agents create new channels for information barrier breaches that have no human analogue: shared model weights (Scenario B), shared embedding spaces, shared knowledge graphs (Scenario A), shared caches, and shared compute infrastructure.

Traditional information barrier controls — separate physical offices, separate email systems, restricted access lists — address human information flows. They do not address the technical channels through which AI agents can receive MNPI. A shared knowledge graph, a shared fine-tuned model, or a shared vector database creates a data path that bypasses every physical and procedural barrier designed for human separation. The information barrier must be re-implemented at the technical layer where agents operate: the data access layer, the model layer, the embedding layer, and the infrastructure layer.

The regulatory expectation is clear and non-negotiable. MAR Article 16 requires firms to establish and maintain effective arrangements, systems, and procedures to detect and report suspicious transactions and orders. MAR Article 18 requires the maintenance of insider lists. MiFID II Delegated Regulation Article 34 requires firms to establish information barriers to prevent the flow of information between persons involved in potentially conflicting activities. The FCA's Market Conduct Sourcebook (MAR 2) requires firms to take reasonable steps to ensure that they do not deal on the basis of inside information. These requirements apply regardless of whether the dealing is performed by a human or an AI agent.

The crypto market context adds further urgency. Crypto exchanges frequently have access to listing decisions, token metrics, and governance proposals that constitute MNPI. The lack of mandatory consolidated tape and the pseudonymous nature of blockchain transactions create an environment where AI-driven insider trading is both more feasible and harder to detect. The EU's MiCA regulation extends insider trading prohibitions to crypto-asset markets, and enforcement actions by the SEC and CFTC have demonstrated that existing securities laws apply to digital asset insider trading.

6. Implementation Guidance

Insider Information Isolation Governance requires a defence-in-depth architecture that enforces information barriers at every technical layer where AI agents interact with data: the storage layer, the access layer, the model layer, and the infrastructure layer. No single control is sufficient — the barrier must be enforced through multiple independent mechanisms so that failure of any single mechanism does not create a breach.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Investment Banks. Investment banks have the most mature human-level information barrier practices but face the greatest risk from agent-layer breaches. The shared technology infrastructure that enables operational efficiency (common data platforms, shared analytical models, enterprise knowledge systems) creates exactly the cross-barrier channels that this dimension addresses. Banks should audit all shared technology platforms for barrier compliance, implement model separation between advisory and trading divisions, and extend existing wall-crossing registers to include agent-to-agent and agent-to-system disclosures.

Crypto Exchanges. Crypto exchanges face acute insider trading risk because their business operations inherently generate MNPI: listing decisions, delisting evaluations, protocol upgrade information, and governance vote outcomes. The absence of regulatory maturity in some jurisdictions does not eliminate the risk — MiCA enforcement, SEC actions, and CFTC cases demonstrate that crypto insider trading is an active enforcement area. Exchanges should implement strict separation between business operations agents (listings, partnerships, market-making) and any proprietary trading or recommendation functions.

Asset Management. Asset managers with both public and private market operations (e.g., hedge funds with private equity arms, or mutual fund companies with corporate advisory relationships) must ensure that agents processing private market information are completely isolated from agents making public market investment decisions. The model-sharing risk (Scenario B) is particularly relevant for asset managers who may fine-tune models on portfolio company data.

Fintech and Robo-Advisory. Fintech companies may not have formal "Chinese walls" but may nonetheless have agents with asymmetric information access — for example, a customer service agent that knows about pending corporate actions affecting customer portfolios while a robo-advisory agent makes investment recommendations. These companies should implement information barrier classification even if they do not have traditional advisory/trading separation.

Maturity Model

Basic Implementation — The organisation has classified all agent-accessible data sources using a formal barrier classification scheme (private-side/public-side). Technical access controls prevent public-side agents from accessing private-side data sources. Private-side and public-side agents use separate model instances. A wall-crossing register records authorised MNPI disclosures. Tamper-evident logging captures all private-side data access events. This level meets the minimum mandatory requirements of 4.1–4.7.

Intermediate Implementation — All basic capabilities plus: automated MNPI detection scans data written to shared or borderline systems. Network-level isolation separates private-side and public-side agent infrastructure. Cross-barrier data-flow monitoring detects both direct access attempts and indirect flows through shared systems. Periodic information barrier penetration testing validates barrier effectiveness. Knowledge graphs and vector stores are physically partitioned rather than permission-separated. Wall-crossing restrictions are technically enforced at the order submission layer.

Advanced Implementation — All intermediate capabilities plus: model provenance tracking verifies training data lineage for all public-side models. Differential privacy mechanisms protect shared analytical outputs that must cross the barrier. Continuous automated barrier validation detects configuration drift. Inference attack testing demonstrates that public-side agents cannot extract MNPI from shared base models or aggregated outputs. The organisation can demonstrate through independent testing that no known information leakage channel — direct, indirect, model-based, embedding-based, or inference-based — permits MNPI to flow from private-side to public-side agents.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Public-Side Agent Access to Private-Side Data Blocked

Test 8.2: Model Weight Isolation Verification

Test 8.3: Cross-Barrier Data-Flow Monitoring Detection

Test 8.4: Wall-Crossing Restriction Enforcement

Test 8.5: Tamper-Evident Log Integrity

Test 8.6: Information Barrier Classification Completeness

Test 8.7: Knowledge Graph Partition Isolation

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 9 (Risk Management System)Supports compliance
EU AI ActArticle 15 (Accuracy, Robustness and Cybersecurity)Supports compliance
EU MARArticle 8 (Insider Dealing)Direct requirement
EU MARArticle 10 (Unlawful Disclosure of Inside Information)Direct requirement
EU MARArticle 14 (Prohibition of Insider Dealing)Direct requirement
EU MARArticle 18 (Insider Lists)Direct requirement
MiFID IIArticle 16(3) (Organisational Requirements)Direct requirement
MiFID IIDelegated Regulation Article 34 (Information Barriers)Direct requirement
SOXSection 404 (Internal Controls Over Financial Reporting)Supports compliance
FCA SYSC10.2 (Chinese Walls)Direct requirement
NIST AI RMFMAP 3.5, MANAGE 2.2, GOVERN 1.5Supports compliance
ISO 42001Clause 6.1 (Actions to Address Risks and Opportunities)Supports compliance
DORAArticle 9 (ICT Risk Management Framework)Supports compliance

EU MAR — Articles 8, 10, 14 (Insider Dealing and Unlawful Disclosure)

MAR Article 8 defines insider dealing as using inside information to acquire or dispose of financial instruments to which that information relates. Article 10 prohibits the unlawful disclosure of inside information. Article 14 prohibits insider dealing and unlawful disclosure categorically. Critically, MAR applies to the person (natural or legal) who engages in insider dealing, not to the mechanism. An AI agent that trades on MNPI constitutes insider dealing by the firm that deployed the agent. The firm cannot disclaim responsibility on the grounds that the agent acted autonomously — the firm is responsible for its agents' actions. AG-480's information barrier controls directly operationalise MAR compliance by ensuring that MNPI cannot flow to trading agents through any technical channel.

MiFID II — Delegated Regulation Article 34 (Information Barriers)

Article 34 requires investment firms to establish and maintain effective information barriers (Chinese walls) to prevent the exchange of information between persons engaged in activities involving a risk of conflict of interest. When AI agents replace or augment human functions, the information barriers must extend to the agent layer. A barrier that prevents a human analyst from sharing MNPI with a human trader but allows an advisory agent to share data with a trading agent through a common knowledge graph is not an effective barrier. AG-480 ensures that information barriers are implemented at every technical layer where agents operate, not merely at the human interaction layer.

FCA SYSC — 10.2 (Chinese Walls)

SYSC 10.2 requires firms to establish and maintain Chinese walls to prevent information flows that could give rise to conflicts of interest. The FCA has issued specific guidance on algorithmic trading systems, requiring that firms ensure their automated systems do not have access to information that could give rise to insider dealing. AG-480's requirements for data classification, technical access controls, model separation, and cross-barrier monitoring provide the specific technical implementation that FCA guidance requires for AI agent deployments.

SOX — Section 404 (Internal Controls Over Financial Reporting)

Insider trading by AI agents creates undisclosed legal liabilities (pending enforcement actions, disgorgement obligations) that affect financial reporting accuracy. If a firm's trading agents are systematically profiting from MNPI, the resulting profits may be subject to disgorgement, and the pending enforcement risk constitutes a material contingent liability. SOX Section 404 requires that internal controls prevent material misstatement — which requires controls that prevent the insider trading that would create the undisclosed liability. AG-480's information barrier controls are therefore a SOX-relevant control for organisations with AI trading agents.

DORA — Article 9 (ICT Risk Management Framework)

Insider information leakage through AI agent infrastructure — shared models, shared data stores, inadequate access controls — constitutes an ICT risk under DORA. The risk arises from the technology architecture, not from human behaviour, making it squarely within DORA's scope. AG-480's requirements for technical isolation, monitoring, and tamper-evident logging ensure that the ICT risk of cross-barrier information flow is identified, controlled, and auditable as DORA requires.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusOrganisation-wide with market-wide implications — insider trading by AI agents affects all market participants trading in the affected instruments, triggers criminal and civil regulatory consequences for the organisation and potentially for individuals, and undermines market integrity across all venues where the affected instruments trade

Consequence chain: An AI agent on the public side (trading or market-facing) obtains MNPI from a private-side source — through a shared knowledge graph, contaminated model weights, an inadequately partitioned document repository, or any other uncontrolled data channel. The agent incorporates the MNPI into its trading decisions, executing or recommending trades in affected instruments. The immediate financial consequence is profit from informed trading (Scenario A: £1.29 million; Scenario B: $412,000 avoided loss; Scenario C: $1.13 million), but this profit is illegal and subject to disgorgement. The regulatory consequence is enforcement action under MAR, the Securities Exchange Act, or equivalent regimes — criminal prosecution of responsible individuals (up to 7 years imprisonment in the UK, 20 years in the US), civil penalties in the millions, and mandatory business restrictions. The organisational consequence includes suspension of algorithmic trading permissions, mandatory technology remediation programmes costing millions, loss of client confidence, and potential loss of regulatory licences. The market consequence is erosion of confidence in market fairness — if AI agents at major financial institutions can systematically trade on MNPI, the fundamental premise of fair and orderly markets is undermined. The systemic consequence is regulatory backlash against AI in financial services broadly, with potential prohibitions or severe restrictions that affect the entire industry. Unlike human insider trading, which is typically opportunistic and limited in scale, AI agent insider trading can be systematic, continuous, and massive in volume — an agent that has a persistent MNPI data channel will exploit it on every relevant trading opportunity, compounding the harm until the channel is discovered and closed.

Cross-references: AG-006 (Tamper-Evident Record Integrity), AG-014 (Data Classification Governance), AG-015 (PII & Sensitive Data Handling), AG-376 (Connector Data Return Minimisation Governance), AG-393 (Shared Blackboard Access Governance), AG-404 (Network Egress and DNS Control Governance), AG-479 (Market Manipulation Pattern Governance), AG-487 (Surveillance Escalation Governance).

Cite this protocol
AgentGoverning. (2026). AG-480: Insider Information Isolation Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-480