<?xml version="1.0" encoding="utf-8"?>
<?xml-model href="rfc7991bis.rnc"?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc
  xmlns:xi="http://www.w3.org/2001/XInclude"
  category="info"
  docName="draft-veridom-omp-aiins-00"
  ipr="trust200902"
  obsoletes=""
  updates=""
  submissionType="independent"
  xml:lang="en"
  tocInclude="true"
  tocDepth="3"
  symRefs="true"
  sortRefs="true"
  version="3">

  <front>
    <title abbrev="OMP AI Insurance Profile">
      OMP Domain Profile: AI Liability Insurance Underwriting and
      Parametric Claims Evidence
    </title>
    <seriesInfo name="Internet-Draft" value="draft-veridom-omp-aiins-00"/>

    <author fullname="Tolulope Adebayo" initials="T." surname="Adebayo">
      <organization>Veridom Ltd</organization>
      <address>
        <postal><city>London</city><country>United Kingdom</country></postal>
        <email>tolulope@veridom.io</email>
      </address>
    </author>
    <author fullname="Oluropo Apalowo" initials="O." surname="Apalowo">
      <organization>Veridom Ltd</organization>
      <address>
        <postal><city>Awka</city><country>Nigeria</country></postal>
        <email>ropo@veridom.io</email>
      </address>
    </author>
    <author fullname="Festus Makanjuola" initials="F." surname="Makanjuola">
      <organization>Veridom Ltd</organization>
      <address>
        <postal><city>Toronto</city><country>Canada</country></postal>
        <email>festus@veridom.io</email>
      </address>
    </author>

    <date year="2026" month="April" day="5"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>

    <keyword>AI liability insurance</keyword>
    <keyword>parametric insurance</keyword>
    <keyword>AI accountability</keyword>
    <keyword>audit trail</keyword>
    <keyword>underwriting evidence</keyword>
    <keyword>operating model protocol</keyword>
    <keyword>tamper-evident</keyword>
    <keyword>claims evidence</keyword>
    <keyword>premium differentiation</keyword>
    <keyword>ISO 42001</keyword>

    <abstract>
      <t>
        This document defines a domain profile of the Operating Model Protocol (OMP)
        for AI systems deployed in contexts covered by AI liability insurance policies,
        including AI performance warranties, AI errors and omissions coverage, and
        coordinated AI liability structures. The profile -- designated InsureMark --
        specifies how OMP's deterministic routing invariant, Watchtower enforcement
        framework, and three-layer cryptographic integrity architecture generate
        per-decision Proof-Points that function as objective parametric trigger data
        for AI liability insurance claims, and provide independently verifiable
        underwriting evidence that reduces claims ambiguity and supports premium
        differentiation.
      </t>
      <t>
        The InsureMark profile addresses the primary gap in current AI liability
        insurance underwriting: policies are currently issued based on model-level
        performance assessments, but claims arise at the level of individual AI
        decisions. No current AI liability insurance product requires or receives
        per-decision cryptographic evidence. This profile specifies the technical
        architecture by which OMP Proof-Points close this gap.
      </t>
      <t>The OMP core specification is defined in the Operating Model Protocol Internet-Draft (draft-veridom-omp).</t>
    </abstract>
  </front>

  <middle>

    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>
        AI liability insurance has emerged as a significant market in response to the
        growing deployment of AI systems in consequential commercial and regulated
        contexts. AI performance warranties, AI errors and omissions policies, and
        coordinated AI liability structures now offer coverage for financial losses
        arising from AI errors, model failures, and AI-generated harms.
      </t>
      <t>
        Current AI liability insurance products share a structural limitation: they are
        underwritten at the model level and adjudicated at the claim level, with no
        per-decision evidence infrastructure connecting the two. When a claim arises,
        the insured and insurer must reconstruct what the AI system did in the specific
        interaction that generated the alleged harm -- often weeks after the fact, from
        logs not designed for forensic use.
      </t>
      <t>
        This gap produces two material consequences: claims uncertainty (the inability
        to reconstruct the precise decision state is the primary source of disputed
        claims and extended settlement timelines) and underwriting imprecision (policies
        cover the AI system as a whole without differentiating between the materially
        different liability profiles of fully autonomous decisions versus supervised
        decisions).
      </t>
      <t>
        The Operating Model Protocol (OMP) <xref target="I-D.veridom-omp"/> generates a
        cryptographically sealed Proof-Point for every AI decision, containing the
        routing outcome, policy compliance flag, confidence scores, Named Accountable
        Officer identity (where human oversight was applied), RFC 3161 <xref target="RFC3161"/> TimeStampToken,
        and SHA-256 hash chain per <xref target="RFC8785"/>. These Proof-Points are independently verifiable by any
        party without access to the operator's or OMP implementer's infrastructure.
      </t>
      <t>
        This document defines the InsureMark profile: the domain-specific instantiation
        of OMP for insured AI deployments. The profile specifies how OMP Proof-Points
        function as parametric trigger data for AI liability insurance claims, and how
        the Audit Trace schema extensions for this profile enable premium differentiation
        based on per-decision evidence quality.
      </t>
      <t>
        Related OMP domain profiles include the EU AI Act Article 12 profile
        <xref target="I-D.veridom-omp-euaia"/> and the Legal AI Supervision profile
        <xref target="I-D.veridom-omp-legal"/>.  The OMP specification is also archived
        at <xref target="ZENODO-OMP"/>.
      </t>
      <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
        "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
        interpreted as described in <xref target="RFC2119"/> <xref target="RFC8174"/>.
      </t>
    </section>

    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>This document uses the terminology defined in <xref target="I-D.veridom-omp"/>. In addition:</t>
      <dl newline="false" spacing="normal">
        <dt>Parametric Trigger</dt>
        <dd>A pre-defined, objectively measurable event whose occurrence automatically
        initiates the claims assessment process. Under this profile, the policy_compliance_flag
        = INVALID is the primary parametric trigger.</dd>
        <dt>Coverage Tier</dt>
        <dd>A differentiated insurance coverage level based on the OMP routing state:
        AUTONOMOUS, ASSISTED, or ESCALATED interactions carry materially different
        liability exposure profiles.</dd>
        <dt>InsureMark Proof-Point</dt>
        <dd>An OMP Audit Trace record generated and sealed under the InsureMark profile,
        containing all fields defined in Section 4.5.</dd>
        <dt>Policy Compliance Flag</dt>
        <dd>The VALID, INVALID, or PARTIAL determination produced by WT-AIINS-02. An
        INVALID value is the primary parametric trigger under this profile.</dd>
        <dt>Claims Evidence Package</dt>
        <dd>The self-contained artefact defined in Section 8, producible within 30 seconds
        for any interaction in the coverage period, containing all information required
        for insurer claims assessment without access to the operator's infrastructure.</dd>
      </dl>
    </section>

    <section anchor="evidence-gap" numbered="true" toc="default">
      <name>AI Liability Insurance Underwriting: The Evidence Gap</name>

      <section anchor="current-standards" numbered="true" toc="default">
        <name>Current Underwriting Standards</name>
        <t>
          Leading AI liability insurance products assess the AI system's training data
          quality, testing methodology, governance documentation, usage scenarios, and
          compliance with AI management standards such as ISO/IEC 42001
          <xref target="ISO-42001"/>. These assessments answer: is this AI system
          designed and governed to operate correctly? They do not answer: did this AI
          system operate correctly in the specific interaction under claim?
        </t>
      </section>

      <section anchor="decision-gap" numbered="true" toc="default">
        <name>The Decision-Level Evidence Gap</name>
        <t>
          When a claim arises, insurer and insured must reconstruct what the AI system
          did at decision time: what input data was presented, what policy evaluation
          applied, what the AI recommended, whether a human reviewed it, and whether
          the record has remained intact. Where this reconstruction is impossible,
          settlement depends on negotiation rather than evidence -- producing extended
          timelines, disputed claims, and coverage limits that price in this uncertainty.
        </t>
      </section>

      <section anchor="cyber-precedent" numbered="true" toc="default">
        <name>Cyber Insurance as Precedent</name>
        <t>
          By 2022, cyber insurers moved from recommending audit logs to requiring them
          as conditions of coverage, with premium differentiation for verified control
          effectiveness <xref target="DELINEA-2026"/>. The actuarial basis is direct:
          organisations with verified audit trails have lower claims uncertainty and
          reduced disputed claim rates. AI liability insurance is at an earlier stage
          of the same trajectory.
        </t>
      </section>

      <section anchor="iso-precedent" numbered="true" toc="default">
        <name>ISO/IEC 42001 as Partial Precedent</name>
        <t>
          ISO/IEC 42001 certification has been adopted by at least one leading AI
          liability MGA as a basis for premium differentiation. ISO/IEC 42001 certifies
          the AI governance process. It does not certify that any specific decision was
          made correctly. InsureMark Proof-Points are the execution-time evidence layer
          that completes what ISO/IEC 42001 process certification started. See Section 7.
        </t>
      </section>
    </section>

    <section anchor="insuremark-profile" numbered="true" toc="default">
      <name>OMP InsureMark Profile</name>

      <section anchor="routing-coverage-tiers" numbered="true" toc="default">
        <name>Routing States and Coverage Tier Differentiation</name>
        <t>
          The three OMP routing states create distinct Coverage Tiers:
        </t>
        <dl newline="false" spacing="normal">
          <dt>AUTONOMOUS</dt>
          <dd>The AI system determined the outcome without human review. Highest-risk
          Coverage Tier: the insurer's exposure is to errors in the AI system's
          autonomous judgment with no human mitigation in the decision chain.</dd>
          <dt>ASSISTED</dt>
          <dd>A Named Accountable Officer reviewed the AI recommendation before the
          final outcome. Lower-risk Coverage Tier: a named, accountable human was
          present in the decision chain. The Proof-Point records officer identity and
          review decision, enabling liability differentiation and potential subrogation
          against the officer's professional indemnity policy.</dd>
          <dt>ESCALATED</dt>
          <dd>Mandatory human intervention occurred. Lowest-risk Coverage Tier: the AI
          system identified a condition requiring human judgment. The Proof-Point records
          escalation reason and Named Accountable Officer intervention.</dd>
        </dl>
        <t>
          Underwriters SHOULD offer differentiated premiums by Coverage Tier, with
          AUTONOMOUS carrying the highest rate per interaction and ESCALATED the lowest.
        </t>
      </section>

      <section anchor="nao-liability" numbered="true" toc="default">
        <name>Named Accountable Officer as Liability Differentiator</name>
        <t>
          For ASSISTED interactions, the Proof-Point records whether the Named
          Accountable Officer reviewed and approved an AI recommendation before
          finalisation. This is material to claims assessment (professional judgment
          versus AI system failure question) and subrogation (the insurer may have
          rights against the Named Accountable Officer's professional indemnity policy).
        </t>
        <t>
          Under this profile, operators MUST record Named Accountable Officer identity
          for all ASSISTED and ESCALATED interactions. The identity MUST be stable
          throughout the coverage period: the same identifier MUST refer to the same
          individual.
        </t>
      </section>

      <section anchor="confidence-config" numbered="true" toc="default">
        <name>Confidence Score Configuration</name>
        <t>
          This profile does not mandate specific thresholds; these are negotiated at
          policy inception. However: (a) the AUTONOMOUS routing threshold MUST be
          documented in the Underwriting Evidence Record; (b) any change to this
          threshold MUST generate a WT-AIINS-03 event and be notified to the insurer;
          (c) C_p = 0.0 MUST force ESCALATED routing, ensuring policy compliance failures
          generate a mandatory human intervention record.
        </t>
      </section>

      <section anchor="watchtowers" numbered="true" toc="default">
        <name>Watchtower Definitions</name>

        <section anchor="wt-aiins-01" numbered="true" toc="default">
          <name>WT-AIINS-01: Performance Threshold Gate</name>
          <t><strong>Trigger:</strong> Composite Confidence Score falls below the configured AUTONOMOUS threshold.</t>
          <t><strong>Action:</strong> FORCE_ASSISTED.</t>
          <t><strong>Claims relevance:</strong> Documents AI system self-identified uncertainty and Named Accountable Officer review decision, enabling distinction between AI-uncertain-and-human-approved versus AI-autonomous-and-erroneous in claims assessment.</t>
        </section>

        <section anchor="wt-aiins-02" numbered="true" toc="default">
          <name>WT-AIINS-02: Policy Compliance Evidence Gate</name>
          <t><strong>Trigger:</strong> Evaluated at every interaction.</t>
          <t><strong>Action:</strong> Computes policy_compliance_flag (VALID/INVALID/PARTIAL). INVALID sets C_p to 0.0, forcing ESCALATED routing.</t>
          <t><strong>Claims relevance:</strong> policy_compliance_flag is the primary parametric trigger field. An INVALID flag records that the AI system's behaviour deviated from the operator's declared governance policy -- the insurance-equivalent of a covered loss event.</t>
        </section>

        <section anchor="wt-aiins-03" numbered="true" toc="default">
          <name>WT-AIINS-03: Configuration Change Gate</name>
          <t><strong>Trigger:</strong> Any change to OMP routing configuration (thresholds, Watchtower definitions, profile version) during an active coverage period.</t>
          <t><strong>Action:</strong> FORCE_ESCALATED for the triggering interaction, generating a sealed configuration change record.</t>
          <t><strong>Claims relevance:</strong> Enables insurer to verify that the configuration at the time of an alleged error matches the configuration disclosed at underwriting. Configuration version mismatch may affect coverage.</t>
        </section>

        <section anchor="wt-aiins-04" numbered="true" toc="default">
          <name>WT-AIINS-04: Coverage Scope Verification Gate</name>
          <t><strong>Trigger:</strong> Interaction type, domain, or risk category not included in the operator's declared coverage scope.</t>
          <t><strong>Action:</strong> FORCE_ESCALATED. The out-of-scope interaction MUST NOT proceed AUTONOMOUS.</t>
          <t><strong>Claims relevance:</strong> Prevents undisclosed scope expansion from generating covered claims without the insurer's knowledge.</t>
        </section>

        <section anchor="wt-aiins-05" numbered="true" toc="default">
          <name>WT-AIINS-05: Anomalous Output Rate Gate</name>
          <t><strong>Trigger:</strong> Rate of INVALID policy_compliance_flag determinations for a given interaction type exceeds the configured anomaly threshold within a rolling window.</t>
          <t><strong>Action:</strong> FORCE_ESCALATED for subsequent interactions of the same type, pending human review.</t>
          <t><strong>Claims relevance:</strong> Creates a sealed record of model degradation, data drift, or adversarial input detection events, supporting post-market monitoring rights under the policy.</t>
        </section>
      </section>

      <section anchor="schema-extensions" numbered="true" toc="default">
        <name>Audit Trace Schema Extensions</name>
        <t>The following fields are REQUIRED under the InsureMark profile, in addition to core fields in <xref target="I-D.veridom-omp"/> Section 7:</t>
        <ul spacing="normal">
          <li><tt>insurance_policy_id</tt>: string, REQUIRED.  Identifier assigned by
          the insurer or MGA at policy inception.</li>
          <li><tt>coverage_tier</tt>: string, REQUIRED.  One of: "AUTONOMOUS",
          "ASSISTED", "ESCALATED".  MUST match routing_outcome.</li>
          <li><tt>policy_compliance_flag</tt>: string, REQUIRED.  One of: "VALID",
          "INVALID", "PARTIAL".  INVALID is the primary parametric trigger.</li>
          <li><tt>parametric_trigger_activated</tt>: boolean, REQUIRED.  True if
          policy_compliance_flag is INVALID or composite Confidence Score falls
          below insured_performance_threshold.</li>
          <li><tt>insured_performance_threshold</tt>: number, REQUIRED.  Decimal
          0.0-1.0.  Minimum composite Confidence Score specified in policy terms.</li>
          <li><tt>coverage_period_id</tt>: string, REQUIRED.  Identifier for the
          active coverage period.</li>
          <li><tt>interaction_type_declared</tt>: string, REQUIRED.  Interaction
          type as declared in the Underwriting Evidence Record.</li>
          <li><tt>named_accountable_officer_id</tt>: string, REQUIRED for ASSISTED
          and ESCALATED; NULL for AUTONOMOUS.  Stable identifier consistent with
          the Named Accountable Officer registry disclosed at underwriting.</li>
          <li><tt>configuration_version</tt>: string, REQUIRED.  Semantic version
          of OMP configuration at time of interaction.</li>
          <li><tt>profile_version</tt>: string, REQUIRED.  MUST be
          "VERIDOM-INSUREMARK-v1.0".</li>
        </ul>
      </section>
    </section>

    <section anchor="parametric-trigger" numbered="true" toc="default">
      <name>Parametric Trigger Architecture</name>

      <section anchor="trigger-mapping" numbered="true" toc="default">
        <name>Trigger Field Mapping</name>
        <t>Primary trigger: policy_compliance_flag = "INVALID" - Policy Compliance Failure Event.</t>
        <t>Secondary trigger: composite Confidence Score below insured_performance_threshold - Performance Threshold Breach Event.</t>
        <t>Coverage tier classifier: coverage_tier differentiates AUTONOMOUS from ASSISTED liability for claims assessment and premium calculation.</t>
        <t>Configuration integrity: configuration_version mismatch between interaction and underwriting disclosure may affect coverage.</t>
      </section>

      <section anchor="claims-event" numbered="true" toc="default">
        <name>Claims Event Generation</name>
        <t>
          When parametric_trigger_activated is true, the InsureMark adapter MUST:
          (a) extract the sealed Proof-Point; (b) verify chain integrity by recomputing
          SHA-256(payload_canonical) against interaction_hash; (c) verify the RFC 3161 <xref target="RFC3161"/> TimeStampToken; (d) generate a Claims Event Record containing the
          interaction_id, parametric trigger details, coverage_tier, routing_outcome,
          named_accountable_officer_id, insurance_policy_id, and full sealed Proof-Point;
          and (e) submit to the insurer's claims intake system within the policy
          notification window.
        </t>
        <t>
          The Claims Event Record is self-contained: an insurer with access only to the
          record and the Timestamp Authority's public key can verify integrity without
          access to the operator's infrastructure.
        </t>
      </section>

      <section anchor="chain-integrity" numbered="true" toc="default">
        <name>Chain Integrity Verification for Claims</name>
        <t>
          The OMP Merkle chain structure enables completeness verification: a gap between
          Proof-Points N and N+2 indicates at least one interaction was not logged.
          Insurers discovering a chain gap may treat it as a policy condition breach or
          require explanation before claims assessment proceeds. Operators MUST maintain
          an unbroken Proof-Point chain throughout the coverage period. Operational
          interruptions MUST be documented in a sealed Chain Gap Record.
        </t>
      </section>
    </section>

    <section anchor="premium-differentiation" numbered="true" toc="default">
      <name>Premium Differentiation Framework</name>
      <t>
        The InsureMark profile enables two premium differentiation mechanisms:
      </t>
      <t>
        <strong>Tier-based differentiation:</strong> Policies differentiate premiums by
        Coverage Tier based on the actual distribution of AUTONOMOUS, ASSISTED, and
        ESCALATED interactions. The distribution is computed from the sealed Proof-Point
        stream provided as the Underwriting Evidence Record at renewal. Because the
        stream is independently verifiable, insurers can audit it without relying on
        operator self-reporting.
      </t>
      <t>
        <strong>Evidence quality differentiation:</strong> Deployments implementing the
        full InsureMark profile with an unbroken Proof-Point chain demonstrate higher
        AI governance evidence quality. Insurers SHOULD offer reduced premiums for
        verified, complete InsureMark chains, consistent with the cyber insurance
        precedent of premium differentiation for verified control effectiveness.
      </t>
      <t>
        The actuarial basis for both mechanisms is the same: deployments with complete,
        independently verifiable Proof-Point records have lower claims uncertainty. The
        probability of a disputed claim approaches zero when a sealed, independently
        verifiable Proof-Point exists for every interaction in the coverage period.
      </t>
    </section>

    <section anchor="iso42001" numbered="true" toc="default">
      <name>Interaction with ISO/IEC 42001</name>
      <t>
        ISO/IEC 42001 certifies the AI governance process. InsureMark Proof-Points prove
        each specific decision. The two mechanisms are layered and complementary:
      </t>
      <ul spacing="normal">
        <li>ISO/IEC 42001: organisational-level, annual audit, certifies design-time governance.</li>
        <li>InsureMark: per-decision level, every interaction, proves execution-time compliance.</li>
      </ul>
      <t>
        Insurers that offer premium differentiation for ISO/IEC 42001 certification can
        extend their framework to include InsureMark as a second, execution-time evidence
        tier. ISO/IEC 42001 answers: is the AI governance system designed correctly?
        InsureMark answers: did the AI system operate correctly in this specific interaction?
      </t>
    </section>

    <section anchor="claims-package" numbered="true" toc="default">
      <name>Claims Evidence Package</name>
      <t>Upon a covered claim event, the operator MUST produce a Claims Evidence Package containing:</t>
      <ul spacing="normal">
        <li>The sealed InsureMark Proof-Point for the interaction under claim.</li>
        <li>Chain integrity proof: SHA-256 Merkle root for the coverage period window and chain path from the Proof-Point to the window root.</li>
        <li>Timestamp Authority verification: RFC 3161 TimeStampToken verification output from the OMP Reference Validator <xref target="OMP-OPEN-CORE"/>.</li>
        <li>Named Accountable Officer record: for ASSISTED and ESCALATED interactions, officer identity, review timestamp, and review decision.</li>
        <li>Configuration record: configuration_version at time of interaction and sealed configuration history from policy inception.</li>
        <li>Coverage scope confirmation: verification that interaction_type_declared matches the Underwriting Evidence Record.</li>
      </ul>
      <t>
        The Claims Evidence Package MUST be producible within the timeframe specified in
        the policy terms. Implementations SHOULD be capable of generating it within
        30 seconds for any single interaction. The package is self-contained: an insurer,
        MGA, loss adjuster, reinsurer, or court with no access to the operator's
        infrastructure or the OMP implementer's systems can verify its integrity using
        only the OMP Reference Validator <xref target="OMP-OPEN-CORE"/> and the
        Timestamp Authority's public key material.
      </t>
    </section>

    <section anchor="security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="I-D.veridom-omp"/> apply in full.</t>
      <t>
        <strong>Insurance fraud:</strong> Operators MUST NOT circumvent WT-AIINS-03.
        Operating the AI system outside the disclosed configuration while generating
        technically valid Proof-Points is a material breach of policy conditions.
      </t>
      <t>
        <strong>Privacy:</strong> The Proof-Point stream may contain personal data subject
        to GDPR or equivalent legislation. Operators MUST ensure disclosure to insurers is
        consistent with applicable data protection obligations.
      </t>
      <t>
        <strong>Timestamp Authority compromise:</strong> Operators SHOULD use QTSPs listed
        in an EU Member State trusted list under eIDAS or equivalent national trust
        framework, as these operate under regulatory supervision with key management
        requirements that reduce retroactive fabrication risk.
      </t>
      <t>
        <strong>Chain gap manipulation:</strong> Deliberate creation of chain gaps to
        obscure non-compliant interactions is a material breach of policy conditions.
      </t>
    </section>

    <section anchor="iana" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>

  </middle>

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.veridom-omp">
          <front>
            <title>Operating Model Protocol (OMP): A Deterministic Decision-Enforcement Protocol with Externalized Proof-of-Integrity</title>
            <author initials="T." surname="Adebayo" fullname="Tolulope Adebayo"/>
            <author initials="O." surname="Apalowo" fullname="Oluropo Apalowo"/>
            <author initials="F." surname="Makanjuola" fullname="Festus Makanjuola"/>
            <date year="2026" month="March"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-veridom-omp-00"/>
        </reference>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3161.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8785.xml"/>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.veridom-omp-legal">
          <front>
            <title>OMP Domain Profile: Legal AI Supervision Under ABA Model Rule 5.3 and California Senate Bill 574</title>
            <author initials="T." surname="Adebayo" fullname="Tolulope Adebayo"/>
            <author initials="O." surname="Apalowo" fullname="Oluropo Apalowo"/>
            <author initials="F." surname="Makanjuola" fullname="Festus Makanjuola"/>
            <date year="2026" month="April"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-veridom-omp-legal-00"/>
        </reference>
        <reference anchor="I-D.veridom-omp-euaia">
          <front>
            <title>OMP Domain Profile: EU AI Act Article 12 Logging and Traceability Requirements for High-Risk AI System Operators</title>
            <author initials="T." surname="Adebayo" fullname="Tolulope Adebayo"/>
            <author initials="O." surname="Apalowo" fullname="Oluropo Apalowo"/>
            <author initials="F." surname="Makanjuola" fullname="Festus Makanjuola"/>
            <date year="2026" month="April"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-veridom-omp-euaia-00"/>
        </reference>
        <reference anchor="OMP-OPEN-CORE">
          <front>
            <title>OMP Open Core: Reference Validator and Schema Library</title>
            <author><organization>Veridom Ltd</organization></author>
            <date year="2026"/>
          </front>
          <seriesInfo name="" value="Apache 2.0, https://github.com/veridomltd/omp-open-core"/>
        </reference>
        <reference anchor="ZENODO-OMP">
          <front>
            <title>OMP -- Operating Model Protocol: A Deterministic Routing Invariant for Tamper-Evident AI Decision Accountability in Regulated Industries</title>
            <author initials="T." surname="Adebayo" fullname="Tolulope Adebayo"/>
            <author initials="O." surname="Apalowo" fullname="Oluropo Apalowo"/>
            <author initials="F." surname="Makanjuola" fullname="Festus Makanjuola"/>
            <date year="2026" month="March"/>
          </front>
          <seriesInfo name="Zenodo" value="DOI 10.5281/zenodo.19140948"/>
        </reference>
        <reference anchor="DELINEA-2026">
          <front>
            <title>Cyber Insurance Coverage Requirements for 2026</title>
            <author><organization>Delinea</organization></author>
            <date year="2026"/>
          </front>
          <seriesInfo name="" value="https://delinea.com/blog/cyber-insurance-coverage-requirements-for-2026"/>
        </reference>
        <reference anchor="ISO-42001">
          <front>
            <title>ISO/IEC 42001:2023 -- Information technology -- Artificial intelligence -- Management system</title>
            <author><organization>International Organization for Standardization</organization></author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
  </back>

</rfc>
