VES v1.1 — Normative Definitions

Core Concepts

A structured language for how consequential decisions become evidentially real, independently verifiable, and defensible under scrutiny.

Foundational distinction

VES distinguishes between explaining a decision and proving it. Most systems can describe how a decision was made. Far fewer can demonstrate what actually existed — and held — at the moment it was made. The evidentiary substrate determines what can be proven. The defensibility layer determines whether that proof holds under scrutiny or collapses into reconstruction.

Position in the stack

Governance defines intent. Enforcement applies constraints. Observability records activity. But none of these, on their own, establish what can be independently proven to have existed — and held — at the moment of execution. Visibility shows what can be seen. Cryptography can prove integrity. But neither reconstructs the full decision-state as it actually existed. The evidentiary substrate binds authority, context, system state, constraints, and outcome into a single, time-bound record that can be independently verified under scrutiny.

Defined terms

01

Evidentiary Substrate

The complete, time-bound record of what actually existed and held at the moment a decision crossed the execution boundary, preserved in a form that can be independently verified under scrutiny.

If it did not exist and was not captured at that moment, it cannot be proven later.

Distinct from logs, telemetry, or documentation, it captures what can be proven — not what can be described.

This forms the foundation of decision defensibility across audit, dispute, regulatory review, and capital allocation.

02

Decision State

The full set of inputs, authority, system outputs, constraints, and contextual signals that existed and were actively relied upon at the moment a consequential judgement was exercised.

This is the minimum unit required to determine whether a decision will hold or fail when challenged under scrutiny.

03

Execution Boundary

The point at which a recommendation, analysis, or model output becomes a committed organisational act and exposure attaches.

At this boundary, authority, state, and constraints must be evidenced — not inferred — including whether governing controls and constraints actively held at that moment.

This is the moment at which liability, accountability, and financial consequence begin.

04

Point-in-Time Evidence

Evidence captured at or immediately adjacent to the execution boundary, before hindsight, reinterpretation, or reconstruction intervene.

This preserves the decision-state as it actually existed and held, rather than as it is later described or reconstructed.

05

Evidence Pack

A structured, integrity-bound representation of the decision-state, assembled to enable independent verification and reconstruction under scrutiny.

It is not a report, summary, or explanation, but a verifiable instrument of proof of what actually existed at the moment of decision.

Its purpose is not to describe the decision, but to allow it to be tested.

06

Defensibility Layer

The layer that determines whether a decision can be independently verified and withstand scrutiny.

It governs whether evidence holds as proof, or collapses into retrospective explanation — including whether governing controls, authority, and constraints can be shown to have been active and effective at execution.

This layer determines whether a decision stands or fails when challenged.

07

Structural Defensibility

The degree to which a decision can be supported by complete, coherent, and independently verifiable evidence of what existed and held at the moment it was made.

High structural defensibility means the decision can stand on its own under scrutiny, without reliance on interpretation, reconstruction, or internal assertion.

Low structural defensibility indicates exposure to dispute, rejection, or regulatory failure.

08

Reconstruction Gap

The difference between what actually existed at decision-time and what can later be reconstructed from logs, documents, and system traces.

This gap is where defensibility fails, evidence degrades, and exposure forms.

The larger the reconstruction gap, the greater the reliance on interpretation rather than proof.

09

Scrutiny Boundary

The point at which a decision becomes subject to external challenge, including audit, regulatory review, dispute, litigation, or capital assessment.

At this boundary, internal explanations lose authority, and only independently verifiable evidence determines outcome.

This is where decisions are accepted, rejected, or contested.

10

Independent Verifiability

The ability for an independent third party to confirm that:

– an evidence record existed at a specific time – it has not been materially altered – and that the decision-state, including authority, constraints, and governing conditions, can be verified as having held at that moment

without reliance on internal systems, assertions, or reconstruction.

11

Defensibility Failure

The condition in which a decision cannot be supported by independently verifiable evidence of its decision-state at execution.

In this state, evidence collapses into reconstruction, interpretation, or assertion, resulting in exposure under scrutiny.

Defensibility failure is the primary driver of dispute, rejected claims, regulatory breach, and loss of capital confidence.

12

Prevention Verifiability Gap

The failure mode in which a system claims to prevent invalid or unauthorised decisions, but cannot independently demonstrate that the relevant controls, constraints, and policies were active, applied, and effective at the moment of execution.

Under scrutiny, prevention must be evidenced — not asserted.

Without a verifiable decision-state, claims of enforcement or control cannot be validated and are treated as unproven.

Specification

Formal normative definition of the standard.

Open specification →

Framework Model

Visual representation of the VES decision evidence stack.

View model →