Article VII: Chip Use Verification

  1. Parties accept continuous on‑site verification of total chip usage by the ISIA at declared CCCs. The methods used for verification will be determined and updated by the Technical Secretariat, in accordance with the process described in Article III. These methods may include, but are not limited to:
    1. In-person inspectors
    2. Tamper-proof cameras
    3. Measurements of power, thermal, and networking characteristics
    4. On-chip hardware-enabled mechanisms, including retrofitted mechanisms
    5. Declaration of the workloads and operations of chips by the CCC operator
    6. Rerunning of declared workloads at an ISIA facility to confirm fidelity of declarations
  1. The aim of this verification will be to ensure chips are not being used for prohibited activities, such as large-scale AI training described in Article IV.
  2. In cases where the ISIA assesses that current verification methods cannot provide sufficient assurance that the AI hardware is not being used for prohibited activities, AI hardware must be powered off, and its non-operation continually verified by in-person inspectors or other ISIA-approved verification mechanisms.
  3. The ISIA may impose various restrictions on how chips can operate in order to ensure proper verification. These restrictions may include but are not limited to:
    1. Restrictions on the bandwidth and latency between different chips, or between chips and their datacenter network, in order to distinguish permitted inference from prohibited training.
    2. Restrictions on the number or rate of FLOP/s or memory bandwidth at which chips can operate, in order to distinguish permitted inference from prohibited training or other prohibited workloads.
    3. Restrictions on the numerical precision of chip operations, in order to differentiate AI from non-AI workloads.
  1. The ISIA will approach verification for different CCCs differently based on their likelihood of being used for AI activities and their sensitivity as relevant to national security.
  2. The ISIA will lead research and engineering to develop better technologies for chip use monitoring and verification. Parties will support these efforts [more details would be provided in an Annex].

* The Food Safety and Inspection Service (FSIS) is an agency of the U.S. Department of Agriculture formed in 1977.

 Another key consideration for chip use verification measures is security and privacy. Parties will want to ensure that the IAEA only has access to the information it needs for verification without also having access to sensitive data on the chips (such as military secrets or sensitive user data). Therefore, the verification methods used would need to be made secure and would be narrowly scoped when possible.