- 01TECH_SAMSUNG_CAP≷ thresholdCRITICAL
When vendor_name equals Samsung, contract_value is at most 500,000. Flag as critical.
- 02TECH_DELL_CAP≷ thresholdHIGH
When vendor_name equals Dell, contract_value is at most 2,000,000. Flag as high.
- 03TECH_CLOUD_VENDOR_CAP≷ thresholdMEDIUM
When vendor_name equals [AWS, Google Cloud], contract_value is at most 3,000,000. Flag as medium.
The Console
The surface where decisions are made, captured, and inspected.
MeshQu's operational system. Policies are authored here. Decisions flow through here. Receipts are issued here. Chains are inspected here.
This page documents the working surface that produces the receipts described elsewhere on the site. It's written for evaluators who have understood the primitive and want to see the system around it.
§ 01The authored object
Every decision binds to a policy version a human ratified.
Policies are typed objects, not free-form documents. Drafts are separate from active versions. Maker-checker is a tenant toggle. AI assistance produces first drafts; the human reviews, edits, ratifies.
- a — typed
Rules, not prose
Thresholds, eligibility, conditional branches, temporal constraints. Each rule carries severity, label, and a default outcome.
- b — ratified
Drafts ≠ active
A new version takes effect only on ratification. Prior versions are preserved indefinitely; the history is the audit trail.
- c — assisted
AI drafts, humans ratify
Opt-in tenant feature. Author describes a rule; the assistant returns a structured first draft. Human edits are logged.
§ 02Composition
Real institutional policy is composed, not authored as one document.
A policy group is a named composition organised by contract, regulation, or business domain. Decisions reference the group version; the group version references the exact versions of its constituent policies.
- a — composed
Programme, not policy
Screening, escalation, override, and closure operate together. The group binds them into one composite version.
- b — versioned
Group moves forward together
When one constituent policy advances, the group advances. Old decisions remain bound to the older composite.
- c — resolvable
One id, one snapshot
The group version on a receipt resolves deterministically to a single composite snapshot — eighteen months later, still.
Constituent policies
- Sanctions & PEP ScreeningAML_SANCTIONS_SCREENINGscreeningv17Active
- Analyst Review RequirementsAML_ANALYST_REVIEWescalationv04Active
- Override AuthorityAML_OVERRIDEoverridev02Draft v03
- Final DispositionAML_FINAL_DISPOSITIONclosurev03Active
§ 03Observation
The Explorer is the index into the corpus of receipts.
Every decision the system captures appears in the feed at the moment it is sealed. Filter by type, verdict, actor, policy, group, regulation clause, date, or chain. The Investigation Panel surfaces receipt, trace, and chain.
- a — queryable
Filter the corpus
Decision type, verdict, actor, policy, group, regulation clause, date range, or chain membership.
- b — inspected
Three views per receipt
Details (verdict, violations, governance, proof), Trace (rule-by-rule evaluation), Chain (where it sits in any chain it belongs to).
- c — anchored
Lens into regulation
Regulation-lens drilldown lands you in the feed already filtered to decisions touching a single clause of a single regulation.
| Outcome | Findings | Ref | Step | Recorded | Type | Policy |
|---|---|---|---|---|---|---|
| ALLOW | — | 3420-B2E3 | ●●●3/3 | 14:22:08 | aml_disposition | AML_FINAL_DISPOSITION v1 |
| ALLOW | — | 1BA2-7701 | ●●○2/3 | 14:21:55 | aml_analyst_review | AML_ANALYST_REVIEW v1 |
| ALLOW | — | 74EE-3FF4 | ●○○1/3 | 14:21:40 | aml_screening | AML_SANCTIONS_SCREENING v1 |
| DENY | 1 critical | 5F6F-9F6C | ●1/1 | 14:21:22 | bid_evaluation | ETIMAD_BID_EVAL 3 policies |
| ALLOW | — | 06EB-21A2 | ●1/1 | 14:20:58 | bid_evaluation | ETIMAD_BID_EVAL 3 policies |
| ALLOW | — | 307C-FBF6 | ●1/1 | 14:20:31 | technology_procurement_… | ETIMAD_TECH_VENDORS 6 policies |
§ 04Attestation
Human decisions and automated decisions are the same kind of object.
A policy generates two surfaces from one definition: the evaluator that automated systems call, and a human-facing attestation form. Both run through the same evaluator. The receipt is structurally identical.
- a — paired
One policy, two surfaces
Authoring updates the evaluator and the human form together. They cannot drift; they are derived from the same object.
- b — shareable
Public link or inline
Forms open inside the console or share via one-use token or counterparty password. The attester’s identity is captured at the moment.
- c — uniform
Same envelope, different actor
Same canonical fields, same signature, same anchoring. A regulator cannot tell from the schema which receipts were attested by a person.
Receipt · 3420-B2E3 · same schema as automated path
- Evaluated under
- AML Final Disposition v1
- Snapshot
- 286b44d5
- Recorded
- 12 May 2026, 09:18:33
- Actor
- @l.okafor head of compliance
- Source
- FORMattestation · one-use token
- Sealed record
- 07aa34b0…92d64cVerified
- Anchored
- #1517415516Anchored
§ 05Sequence
Most decisions are sequences. The console captures them as chains.
A chain is a hash-linked sequence where each step references the receipt of its parent. The chain seals when the workflow closes. Replay re-runs any decision against the policy in force when it was made. Export produces an offline-verifiable bundle.
- a — linked
Hash-linked, sealed
Every step references the receipt of its parent. The sealed chain is itself a verifiable object; linkage is checked from one action.
- b — replayed
Original vs replayed hash
Re-run any decision against the snapshot in force when it was made. Divergence surfaces as a hash mismatch — values shown side by side.
- c — exported
Self-contained bundle
JSON or tar. Receipts, policy snapshots, public keys, canonical-JSON forms. Verifiable offline; no access to MeshQu required.
Decision Workflow
5a521615-f00… · 5 steps · May 12, 09:18 → May 12, 09:21
- 1ALLOWAML Sanctions & PEP ScreeningAML_SANCTIONS_SCREENING · ref 74EE-3FF4May 12, 09:18:26
- 2ALLOWAML Analyst ReviewAML_ANALYST_REVIEW · ref 1BA2-7701May 12, 09:18:30
- 3ATTESTEDAML Tier-2 EscalationAML_TIER2_REVIEW · ref E7C1-2A48May 12, 09:19:08
- 4ALLOWHead of Compliance OverrideAML_OVERRIDE · ref B9F0-DD17May 12, 09:20:17
- 5ALLOWAML Final DispositionAML_FINAL_DISPOSITION · ref 3420-B2E3May 12, 09:21:33
§ 06Posture
A feedback loop into authoring — not a risk score or a traffic light.
Two surfaces read decisions back into policy. The dashboard reads the corpus through the regulation’s own vocabulary or through the institution’s programme structure. Per-policy and per-group health views summarise decision behaviour. No composite scores, no percentages.
- a — regulation lens
Clause-by-clause posture
Each clause’s open queue, rendered in the regulation’s own words. Ratifications outstanding. Reviews awaiting authority.
- b — group lens
Programme-by-programme
Each policy group as a card — current activity, pending ratifications, open chains. One synthesis sentence at the top.
- c — scoped
Your corpus, not the industry
All posture views are strictly your tenant. No aggregation across customers, no benchmarks, no comparative views.
61 decisions awaiting review across 9 groups.
Today · 14 May 2026
- 23Decisions awaiting reviewoldest 186 days, newest 20 days
- 34Overdue outcomesmost common gap: value not greater than
- 0Recent violationslow 0 · medium 0 · high 0 · critical 0
- 7Reviews awaiting authority↓ 2 this week · average age 14 days
- 0Recent violationslow 0 · medium 0 · high 0 · critical 0
- 4Open chains pending closureoldest 12 days
→ Where next
The console produces the receipts. The receipts outlive the console.
Where to go next depends on what you want to understand more deeply.