The NEPA governance framework defines the structural controls that ensure inspection outputs are attributable, reproducible, and defensible. This documentation is intended for regulatory reviewers, compliance stakeholders, and enterprise procurement teams conducting technical due diligence.
Every inspection run is assigned a unique, immutable run identifier that binds together all components of the system state at the time of execution. This binding is cryptographic and cannot be modified after the run is initiated.
The analytical configuration governing each inspection run is sealed at run-start and cannot be modified during execution. This property is enforced at the architecture level, not by access controls.
All analytical parameters — detection thresholds, lane weights, fusion coefficients, and confidence bounds — are hashed and sealed before the first frame enters the pipeline.
Parameter modification after run-start is architecturally prevented. Any attempt to alter parameters mid-run is logged as a critical governance violation and terminates the run.
Every configuration contract is stored under a versioned identifier. The full history of configuration changes is maintained with structured diffs and approval records.
The NEPA audit log is an append-only, hash-linked record of all system events from run initialisation to evidence archival. It is designed to support independent forensic analysis without requiring access to internal tooling.
The audit log is designed to be self-describing. An authorised third-party auditor with access to the log, the run manifest, and the replay package has sufficient information to independently validate any finding without further access to internal systems.
All inspection evidence is retained in a structured, queryable archive with defined retention periods, access controls, and integrity verification schedules.
| Evidence Type | Retention Period | Integrity Check | Auditor Access |
|---|---|---|---|
| Raw Sensor FramesOriginal camera, LiDAR, thermal data | 7 years | Weekly SHA-256 verification | Available |
| Processed Spike RepresentationsNeuromorphic encoded data | 7 years | Weekly SHA-256 verification | Available |
| Inspection FindingsDerived defect records with confidence scores | Indefinite | Daily integrity scan | Available |
| Audit Chain LogsComplete event logs with hash linkage | Indefinite | Continuous chain validation | Available |
| Configuration ContractsVersioned analytical parameter records | Indefinite | On-access hash verification | Available |
| Replay Attestation PackagesThird-party auditor evidence packages | 10 years | On-generation signing | Available |
All changes to the NEPA platform — including engine updates, configuration modifications, and infrastructure changes — follow a structured change management process designed to maintain the integrity of the audit and evidence systems.
| Control | Status |
|---|---|
| Determinism Policy Documentation | Active |
| Change Control Process | Active |
| Parameter Locking Enforcement | Active |
| Fault Injection Test Suite | Active |
| Readiness Matrix Review | In Progress |
| Third-Party Audit Program | Available on Request |
Full governance documentation packages are available for regulatory reviewers and enterprise procurement teams upon formal request.