Folium Systems

AI systems for real operations
Public-facing PDF Review before production Folium Systems

Security and procurement review

Folium Security Procurement Review

This PDF is designed for the people who have to say yes responsibly: security, procurement, IT, counsel, operations, leadership, and process owners. It turns AI review into a staged operating process instead of a trust-me demo.

Audience Security, procurement, IT, counsel, operations, leadership
Purpose Prepare buyer-ready review questions, materials, requirements, and owner responsibilities
Updated May 2026

Access should expand in stages: public review, scoped discovery, sandbox, architecture review, pilot, production plan.

AI permissions must separate drafting, retrieval, recommendation, routing, execution, blocking, and escalation.

Every serious review should leave behind records, known limits, owners, and a next decision point.

Trust architecture

Security and governance work best when the picture is calm and exact.

Folium turns trust into visible operating structure: data boundaries, permissions, audit trails, and model routing before access grows.

Data boundary map

Public

Education, browser-only tools, public PDFs, and sandbox examples.

Scoped

Approved sources, reviewers, retention, and customer-side owners.

Blocked

Secrets, credentials, live-risk actions, and unapproved regulated decisions.

Permission matrix

Action State Record
Explain Allowed Logged
Retrieve Scoped Source checked
Draft Review Owner decides
Execute Blocked Explicit approval

Audit trail flow

  1. 01 Scope
  2. 02 Source
  3. 03 Action
  4. 04 Reviewer
  5. 05 Decision
  6. 06 Record

Model routing layer

Public demoCloud APIPrivate endpointLocal modelHybrid route

Each workload can be placed by privacy, cost, latency, access, fallback, and owner review instead of forcing every job into one provider.

01

Review frame

Security review should begin before the process gets private access.

AI procurement gets cleaner when the buyer can see scope, data flow, runtime placement, permissions, records, support, and customer responsibilities before credentials or sensitive data enter the build.

RecordBoundaryAction

Scope

What is the process?

Name the business process, users, systems, data classes, exclusions, reviewers, assumptions, and success criteria.

Boundary

What can the AI see?

Separate public, internal, customer, regulated, confidential, secret, and blocked data before the build expands.

Runtime

Where will the AI run?

Choose public-demo review, cloud API, private endpoint, local model, hybrid route, or production service based on risk and value.

Authority

What can the AI do?

Define draft, retrieve, recommend, route, execute, block, escalate, and human-approve actions.

Folium Systems Public-facing PDF foliumsystems.com

02

Procurement matrix

The questions buyers should not have to chase.

Folium turns common procurement questions into a review file instead of leaving them scattered across calls, emails, screenshots, and assumptions.

Decision gridReview lensNext step
QuestionFolium answer patternRecords to prepare
What data is involved?Data classification, approved sources, blocked data, retention, and redaction.Data boundary map, source list, redaction notes, retention stance.
Where does it run?Runtime placement by process and sensitivity.Runtime decision table, cost/privacy rationale, fallback route.
Who can use it?Role-based access and permissioned process steps.User roles, approval chain, blocked actions, owner signoff.
What can it change?Separate draft/recommend from execute/update/send.Tool permission table, human-review points, audit trail plan.
How is quality measured?Evaluate process behavior, not only answer polish.Eval cases, browser checks, known limits, failed-case notes.
What happens on failure?Support path, incident class, rollback, degraded mode, and repair loop.Support guide, severity ladder, rollback trigger, communication path.
Folium Systems Public-facing PDF foliumsystems.com

03

Access ladder

Access should expand only when records support it.

The safest AI implementation does not jump from idea to production. It moves through staged access with explicit reviews.

Decision gridReview lensNext step
StageAllowed accessAdvance requirement
Public reviewPublic pages, PDFs, screenshots, public tools, and public-facing examples.Buyer understands value and agrees to scoped discovery.
Scoped discoveryCustomer describes process, systems, risks, users, blockers, and desired outcome.Scope is narrow enough for a safe sandbox build.
Redacted sandboxApproved safe samples, synthetic examples, public policies, or redacted documents.Behavior is useful enough for technical architecture review.
Architecture reviewSystem map, runtime plan, provider plan, permissions, logging, and support assumptions.Security, operations, leadership, and owners approve a controlled pilot.
Controlled pilotLimited users, limited data, limited actions, monitoring, support, and rollback.Records show readiness or identify repairs before production.
Production planApproved live access only after legal, security, operational, and owner signoff.Final responsibilities, monitoring, training, and change process are accepted.
Folium Systems Public-facing PDF foliumsystems.com

04

Security controls

The review should cover the whole operating path.

Procurement should not evaluate a model in isolation. The real risk lives across data, software, people, providers, logs, permissions, and change management.

ChecklistOwner pathRelease signal
  • Document source systems and destination systems before any integration is approved.
  • Separate public PDFs from customer-specific records that belong in controlled review.
  • Define what gets logged, where logs live, who can access them, and how long they remain.
  • Keep secrets, API keys, customer credentials, provider tokens, and passwords outside public files and prompts.
  • Use least-privilege tokens and service accounts when automation touches external systems.
  • Name who can approve runtime choices, provider choices, data access, production credentials, and launch timing.
  • Prepare fallback behavior for model outage, retrieval failure, tool failure, stale source, and user rejection.
  • Review dependency posture, headers, public file handling, PDF downloads, and privacy-safe analytics before launch.
Folium Systems Public-facing PDF foliumsystems.com

05

AI permission model

Not every AI action belongs in the same permission bucket.

Folium helps customers design permissions so the business can gain speed without giving AI unreviewed authority.

Decision gridReview lensNext step
Action classExamplesReview posture
DraftWrite first-pass emails, FAQs, summaries, work notes, task descriptions.Generally safe in sandbox when sources and limits are visible.
RetrieveFind policy, procedure, product, order, ticket, document, or knowledge-base detail.Requires source boundaries, freshness notes, and access controls.
RecommendSuggest next process step, routing choice, response, escalation, or review file.Needs human accountability for sensitive outcomes.
RouteSend work to queue, owner, reviewer, or next system without changing final records.Needs audit trail and blocked-route rules.
ExecuteUpdate record, send official message, place order, issue refund, approve account, change access.Requires explicit approval, logging, rollback, and human review where impact is material.
Block or escalateRefuse unsafe request, route to human, stop launch, flag missing data.Should be encouraged when the system lacks authority or records.
Folium Systems Public-facing PDF foliumsystems.com

06

Operating ownership

Security review fails when nobody owns the process after launch.

Folium pushes ownership into the review file so the buyer can see who maintains quality, sources, support, and change after the exciting demo ends.

RecordBoundaryAction

Business owner

Owns the process outcome, success criteria, staff adoption, and priority decisions.

Technical owner

Owns integration choices, runtime placement, access, deployment, monitoring, and fallback.

Knowledge owner

Owns source accuracy, document freshness, policy updates, and retrieval boundaries.

Security reviewer

Owns data sensitivity, credentials, access control, logs, retention, and external provider posture.

Support owner

Owns incidents, user questions, rollback, degraded mode, and post-incident improvement.

Executive sponsor

Owns the decision to continue, stop, repair, expand, or move into production planning.

Folium Systems Public-facing PDF foliumsystems.com

07

Red flags

These signs should slow the deal down, not speed it up.

A serious AI partner should welcome these checks. They prevent a buyer from adopting an impressive but ungoverned system.

ChecklistOwner pathRelease signal
  • The demo requires private customer data before a data boundary is approved.
  • The vendor cannot explain where prompts, files, outputs, and logs live.
  • The system can take live action without a named approval path.
  • No one can show failed cases, known limits, or repair decisions.
  • The buyer has no owner for source freshness, support, incidents, or rollback.
  • Staff are expected to trust the AI without role clarity or training.
  • Procurement, security, counsel, and operations are introduced after production pressure exists.
  • The proposal assumes one AI vendor, one model, or one cloud can solve every process.
Folium Systems Public-facing PDF foliumsystems.com

08

Review file output

A good review should leave behind useful material.

After a serious review, the buyer should not be left with a vague call recap. The next decision should be supported by clear documents and records.

RecordBoundaryAction

Scope brief

Process, users, systems, exclusions, assumptions, desired outcome, and decision criteria.

Boundary map

Data classes, approved sources, blocked data, provider handoffs, retention, and secrets handling.

Permission table

Draft, retrieve, recommend, route, execute, block, escalate, and human-approve rules.

Review file

Screenshots, browser checks, eval cases, known limits, failed-case notes, and repair plan.

Operations guide

Owners, support, incidents, rollback, degraded mode, monitoring, and improvement cadence.

Decision point

A plain recommendation: stop, repair, continue sandboxing, pilot, production-plan, or move to AI operations.

Folium Systems Public-facing PDF foliumsystems.com

09

Next step

A cleaner review creates a faster yes or a safer no.

Use this PDF before private access expands. Folium can help turn one process into a reviewable AI path with boundaries, records, owners, and a launch decision the business can defend.

Bring the process

Name the business process, the systems involved, the people affected, and the decision this PDF should support.

Separate demo from production

Keep public examples, sandbox review, pilot access, and production dependency in separate stages with clear owners.

Ask for the record

Request screenshots, browser checks, known limits, launch blockers, support plans, and the next approval path.

Folium Systems Public-facing PDF foliumsystems.com