Public claim, public source
If the site says something is live, read-only, in progress, or limited by maturity, the source should be a public page a buyer can open directly.
IdentityFirst uses the term evidence-first narrowly. On this website, it means a public claim should point to a public page, a public attestation, or a public status surface that a buyer can inspect without asking for private access.
This is a website discipline first: claim less, point to proof, and keep the proof public where possible.
If the site says something is live, read-only, in progress, or limited by maturity, the source should be a public page a buyer can open directly.
A buyer should be able to click from a claim to the exact surface that supports it, then repeat that boundary in procurement or board language without embellishment.
Connector counts stay explicit, framework language stays at cross-reference level where that is the truth, and programme status stays qualified when work is still in progress.
This section is deliberately conservative.
Public product status, public trust wording, public connector catalog labels, and public attestations repeated on the site.
Private diligence packs, unpublished runtime data, internal implementation details, and roadmap promises that are not exposed on public pages.
If a buyer cannot inspect it on a public surface from this site, it should not appear here as public proof.
These are the website surfaces the register relies on today.
Public trust statements, read-only guarantee language, and public company attestations.
Open trust pageThe structured list of key public claims, evidence source, and verification path.
Open registerWhere the public truth is framework cross-reference support, we say that. We do not quietly turn that into certification, evidentiary guarantee, or audit-outcome language.
Findings cross-referenced to framework controls
The public claim is that MRI findings can be cross-referenced to these frameworks. Formal audit interpretation, certification outcomes, and stronger evidentiary workflows depend on written scope and the export path actually in use.
8 public claims grouped into 6 evidence areas, each with a public verification route.
1 register entry with a public source and verification path.
2 register entries with a public source and verification path.
1 register entry with a public source and verification path.
1 register entry with a public source and verification path.
2 register entries with a public source and verification path.
1 register entry with a public source and verification path.
Private customer reports, deployment-specific outputs, and diligence artefacts are outside public scope.
Where stronger verification, exports, or governed write paths matter, the controlling source is the written scope and deployment model.
The register records what is publicly stated now. It is not a place to imply unreleased breadth.
Use the register as the ceiling for public proof, not the starting point for a broader claim.