Terra Vita · Institutional review surfaceAssurance Map
§ 01 · Boundary discipline

Institutional assurance map.

A reviewer-facing control map for the Field Evidence & Attribution route: posture, event integrity, governance spine integration, operator provisioning, rule transparency, form governance and audit replay expectations.

signal, not verdict operator-attributed Hub-routed reviewer flags visible not an approval layer
§ 02 · Posture

Institutional posture & boundary discipline

The app is narrow by design. Its strength is not decision-making; its strength is attributable field evidence that can be routed, reviewed, replayed and exported without substituting institutional authority.

Non-judgemental

Escalations are signals for attention. They are not verdicts, ratings or approvals.

Attribution-first

Visits, evidence, tasks and reviews are tied to a named operator or reviewer, time and place.

Append-only spine

Events produce a replayable audit trail for reconstruction, dispute resolution and export.

ACK before commit

Field action is treated as committed only after backend acknowledgement.

Protected storage

Evidence files remain in private storage while manifests carry metadata and hashes.

Authority retained

Institutions retain statutory, fiduciary, financial, policy and MRV-methodology authority.

§ 03 · Mapping table

Governance spine event map

This is the missing reviewer table: which app events populate which governance fields, which Hub modules consume them, what reviewers see, and what becomes exportable.

App / Hub eventGovernance spine fieldMinimum envelopeHub consumerReviewer viewExport / audit objectAuthority boundary
operator.provisionedIdentityauth user, operator profile, role, org scope, statusOperator context, admin control roomNamed actor and role scopeProvisioning record / operator codeProvisioning does not confer institutional authority.
task.assignedRoutingtask code, site, assignee, instructions, due dateOperator console, admin workloadScope of expected field evidenceTask row and workload snapshotTask assignment is operational, not approval.
visit.openedIdentity + Evidencevisit ID, operator, site, time, location, device/app metadataField visits, event logVisit envelope and operator attributionVisit record, event chronologyOpening a visit is not a verification outcome.
evidence.capturedEvidencefile path, type, size, hash where available, caption, capture time, locationEvidence items, protected storageEvidence metadata and signed access routeEvidence metadata, storage ref, hashEvidence is inspectable; interpretation remains human.
form.submittedMRVform key, version, payload, operator, visit, siteForm submissions, MRV attachmentStructured observation payloadForm payload with version markerStructured data supports MRV; it does not create certification.
task.completedRouting + Assurancetask ID, visit ID, completion time, evidence countOperator workload, review queueCompletion envelope and evidence sufficiency signalTask status + event logCompletion is operational closure, not approval.
review.queuedAssurancequeue ID, severity, route, reason, visit, operator, siteReviewer queuePending review item and reasonQueue row, audit timelineQueueing is routing, not a decision.
review.decisionAssurancereviewer, decision status, notes, target visit/evidenceReviewer console, event logReviewer action trailReview row + event chronologyReviewer action remains accountable human judgement.
escalation.signalRouting + Assurancerule key, threshold, signal, entity, context, timestampRules engine, reviewer queueSignal and rule explanationSignal event with rule referenceSignal is attention routing only.
export.preparedExportmanifest snapshot, package hash, version, generator, visitExport registerPrepared manifest and hashExport register row, SHA-256 manifest hashExport is evidence packaging, not endorsement.
export.issuedExport + Authorityrecipient, issue time, issuer, export code, notesExport register, audit reconstructionIssued package recordIssued register row and event logRecipient institution decides reliance.
Identityno anonymous field artefacts
Evidencefile and form artefacts bound to visits
Routingoperator tasks and reviewer queues
MRVstructured observations and payload versions
Assurancereviewer actions are events
Exportmanifest hash and register row
Authorityinstitutions retain judgement
§ 04 · Integrity

Evidence architecture & event integrity

The current production route uses backend acknowledgement, private storage, metadata rows, event log entries and manifest hashing. This page avoids claiming capabilities that have not been switched on.

Current production posture

  • Direct app / console route requires backend acknowledgement before committed record.
  • Evidence files are stored in a private field-evidence bucket.
  • Evidence metadata is attached to a visit, operator and site.
  • Review queue entries are created from submitted visits.
  • Exports create a manifest snapshot and SHA-256 manifest hash.
  • Reviewer actions and exports are represented as replayable event records.

Reviewer questions kept open

  • What exact cryptographic sealing method is required per institution?
  • How should device compromise be detected and handled?
  • Current posture is not offline-first; delayed sealing is not advertised.
  • Which form version deprecation windows apply per programme?
  • What retention period applies to the event stream and evidence storage?
  • Should stream partitions be institution-, programme- or deployment-specific?
§ 05 · Rules

Rules transparency sheet

Rules remain signal-only. Institutions should be able to inspect rule definitions, thresholds and routing consequences without allowing the rules engine to become an approval authority.

Rule keyTrigger patternSignalReviewer displayInstitution-specific?Boundary note
R-GEO-SCOPELocation outside expected site boundary or scope metadata.scope_mismatchShow site, capture point, expected scope and operator.YesFlag for review; not evidence rejection.
R-EVD-REQUIREDRequired evidence type missing for a task or form.evidence_gapShow missing evidence class and task instruction.YesRequests follow-up; does not decide sufficiency.
R-TIME-ANOMALYCapture time inconsistent with visit start/completion envelope.timestamp_queryShow chronology and affected item.ConfigurableRoutes a query to reviewer.
R-DUP-CAPTURESimilar file hash, metadata or repeated artefact pattern.duplicate_candidateShow candidate duplicates and source visits.ConfigurableSupports deduplication; no fraud finding.
R-REV-DIVERGEReviewer decisions diverge across the same visit or evidence item.reviewer_alignment_neededShow decision sequence and reviewer identities.YesTriggers alignment, not automatic override.
R-EXPORT-GAPSubmitted visit lacks evidence or review trail expected for export.export_readiness_gapShow missing manifest fields.YesBlocks packaging until a human prepares or explains limitation.
§ 06 · Access model

Operator identity governance

Provisioning by request is correct. The institutional question is how identity, scope, device posture and revocation are controlled over time.

1 · Request

Access request is recorded through the public route with organisation, email, scope and note.

2 · Verify

Institutional counterpart, role and project context are checked before operator creation.

3 · Provision

Supabase Auth user is linked to field_operator_profiles with organisation, role and operator code.

4 · Scope

Tasks and sites are constrained to the operator’s organisation and assignment context.

5 · Revoke

Set profile inactive, revoke auth session, remove task assignment and retain event history.

6 · Rotate

Credential and device rotation are recorded as administrative events, not silent changes.

§ 07 · Forms

Form version governance

Structured forms are institutionally useful only if their versions are governed. Payloads must remain interpretable after a form changes.

ControlRequired fieldReasonReviewer expectation
Form identityform_keySeparates observation types and MRV payloads.Reviewer can filter by form family.
Version markerform_versionPreserves meaning of old payloads after schema changes.Reviewer can see which questions were active.
Deprecation windowvalid_from / valid_untilPrevents silent drift between field teams.Expired forms are flagged, not deleted.
Required evidence maprequired_evidence_typesLinks forms to photo/document requirements.Evidence gaps become transparent.
Export transformexport_schema_versionKeeps institutional packages stable.Manifest declares the transform used.
§ 08 · Reviewer flags

Risk and mitigation register

These are not blockers; they are the questions a serious institution will ask before relying on the route.

Reviewer flagRiskMitigationPriority
Operator verificationUnverified field actors can weaken attribution.Operator governance protocol, active/inactive flag, identity-bound profile.High
Scope driftOperators may capture outside assigned sites/tasks.Task/site scoping, geofence flags, admin workload review.High
Revocation modelFormer operators may retain access.Deactivate profile, revoke auth, record admin event, keep evidence history.High
Rule opacityEscalations may be perceived as black-box decisions.Rules transparency sheet and institution-specific routing maps.High
Form driftPayloads become incomparable across sites or time.Form version governance and deprecation windows.Medium
Escalation fatigueToo many signals weaken reviewer attention.Escalation analytics and calibrated thresholds by institution.Medium
Device compromiseDevice can misrepresent capture context.Device binding, session rotation, anomaly flags and human reviewer queries.Medium
§ 09 · Reviewer recommendations

Hardening roadmap

The highest-value next work is not visual polish; it is institutional inspectability.

High priority

Governance spine mapping table, read-only rule sets, operator identity governance, onboarding protocol and audit replay interface.

Medium priority

Form version governance, institution-specific routing configuration and sealed evidence verification tooling.

Low priority

Multi-language structured forms and offline/delayed sealing only if an institution explicitly requires it.

Institutional verdict

The Field Evidence & Attribution route is institutionally credible, architecturally disciplined and aligned with governance-first environments. Its narrowness is its strength. Its integration with the Hub governance spine is its differentiator. Its authority boundary is correctly maintained.

This is a field system that can withstand institutional review once operator provisioning, rule transparency, form versioning and evidence sealing are kept inspectable.