AI Voice Agents

The Compliance Layer Your Partners Don't Have to Build

Workforce Wave

April 17, 20267 min read
#compliance#hipaa#partners#security#tcpa

When a partner deploys a Workforce Wave agent for a healthcare client, they're not just offering a voice receptionist. They're offering a voice receptionist that is compliant with HIPAA by default, every call, no configuration required.

That sentence does a lot of work. Most partners don't fully appreciate it until they start asking what it would cost to build it themselves.

The Compliance Problem for Platform Builders

If you were building a white-label voice AI platform from scratch, here's what you'd have to handle on the compliance side before your first healthcare client could go live:

HIPAA (Health Insurance Portability and Accountability Act) — PHI (Protected Health Information) cannot be stored, logged, or transmitted in ways that violate the Security Rule. Any tool that writes data — booking systems, CRM updates, intake forms — needs PHI controls. Identity verification must happen without collecting unnecessary health information. Staff training requirements technically extend to AI systems handling PHI.

TCPA (Telephone Consumer Protection Act) — outbound AI calls have strict rules: no calls before 8am or after 9pm local time, consent requirements for automated calls, opt-out mechanisms that must work immediately. The regulations vary by state; California's CCPA layered on top creates additional complexity.

Fair Housing Act — for real estate and property management, prohibited phrases in automated communications are expansive and specific. An AI that describes a property as being in a "great school district" or "quiet neighborhood" is potentially in violation. The list of problematic phrases is long and not intuitive.

PCI DSS — if an agent ever touches payment information — even just repeating a card number back — that interaction must meet PCI compliance standards. The safest approach is masking and routing, never storing or logging raw card data.

Building and maintaining this infrastructure is a significant legal and engineering effort. It's also the kind of thing where a mistake is not a product bug — it's a regulatory violation with real consequences.

How WFW Solves It: ComplianceRules.enforceForTool()

The compliance layer in Workforce Wave is not a pre-call checklist or a post-call audit. It runs synchronously before every tool call the agent attempts to make.

The enforcement model is straightforward: before the agent executes any tool, ComplianceRules.enforceForTool() runs against the call context, the tool being called, and the parameters being passed.

// Simplified enforcement flow — called before every tool execution
const result = await ComplianceRules.enforceForTool({
  tool: 'booking.createAppointment',
  params: toolCallParams,
  callContext: {
    vertical: 'dental',
    jurisdiction: 'CA',
    callTime: new Date(),
    callerConsent: session.consentFlags
  }
});

// result.allowed: boolean
// result.redactedParams: sanitized version of params if allowed
// result.blockReason: string if blocked
// result.auditEntry: always written, regardless of allow/block

If the enforcement check returns allowed: false, the tool call does not execute. The agent receives a structured reason and either handles it gracefully (explaining to the caller what it cannot help with) or escalates to a human.

If the enforcement check returns allowed: true, the agent receives redactedParams — a sanitized version of the parameters with any restricted data masked or removed before the tool executes.

What Each Rule Set Covers

HIPAA module — runs for vertical: 'medical' | 'dental' | 'mental_health' | 'vision' | 'pharmacy'. Checks for:

  • PHI fields in tool call parameters: blocks writes of diagnosis codes, medication details, or insurance benefit details to non-HIPAA-compliant integrations
  • Identity verification scope: only DOB and last name are permitted for identity confirmation; full SSN, insurance ID, or medical record number collection is blocked in the voice channel
  • Logging redaction: call transcripts for healthcare agents are automatically redacted before storage — dates of birth, insurance member IDs, and any detected PHI patterns are replaced with [REDACTED-PHI]

TCPA module — runs for all outbound-capable agents. Checks:

  • Local time at the destination number against the 8am–9pm window
  • Consent flags from the session: if the caller hasn't given explicit consent for automated callbacks, the callback scheduling tool is blocked
  • State-specific overlays: California, Florida, and several other states have stricter windows or additional consent requirements; these are applied automatically based on area code

Fair Housing module — runs for vertical: 'realestate' | 'propertymanagement'. Maintains a phrase filter list (currently 340+ flagged phrases and patterns) that is checked against any generated speech or outbound message content. Flagged phrases are either replaced with compliant alternatives or trigger a human escalation flag.

PCI module — runs for any tool call that touches payment parameters. Card numbers, CVVs, and expiration dates in tool parameters are masked to their last four digits before the tool executes. Raw card data is never written to WFW logs. Agents are instructed to route payment collection to out-of-band secure channels (SMS link to a PCI-compliant payment form) rather than handling card numbers over voice.

Why the Compliance Profile Is Read-Only

Every WFW partner deployment has a compliance profile page in the admin UI. It shows which compliance modules are active for each vertical, the current rule set version, and the last enforcement log summary.

It is entirely read-only.

Partners cannot toggle compliance rules on or off. They cannot add exceptions. They cannot override the PHI redaction patterns or expand the TCPA time windows.

This is a deliberate product decision, and it occasionally generates pushback from partners who want more control. Here's the reasoning:

Compliance is not a preference. HIPAA violations are not bugs — they're federal violations. If a partner could disable PHI redaction and a client's healthcare agent then stored a patient's insurance details in a non-HIPAA-compliant system, the resulting liability doesn't belong to the partner alone. WFW's infrastructure is involved. The only defensible position is non-negotiable enforcement.

Partners benefit from not owning the compliance liability. When a partner sells to a dental practice, one of the genuine value propositions is: "You don't have to worry about whether the AI is HIPAA compliant. It is, by design, and WFW guarantees it." That promise only holds if the compliance layer cannot be misconfigured.

Audit trails need to be authoritative. The compliance audit log — every enforcement check, every block, every redaction — is a legal artifact. If the rules can be modified, the audit log becomes ambiguous. Read-only configuration means the audit log reflects what actually happened under a known, fixed rule set.

Partners can see the compliance profile. They can use it to explain to their clients exactly what protections are in place. They cannot change it. That's the right design.

What This Means for Partner Sales

The compliance layer is one of the most concrete value propositions in a partner's sales motion.

For healthcare: "Every agent we deploy is HIPAA-compliant by default. PHI handling, identity verification scope, and call logging redaction are handled at the infrastructure layer. Your IT team doesn't need to audit the AI."

For real estate: "Fair Housing phrase filtering runs on every outbound message and every agent-generated response. You're not relying on individual agents to know the current list of flagged phrases."

For any client doing outbound: "TCPA time windows are enforced automatically, including state-specific overlays. You're not managing a timezone and consent spreadsheet."

These aren't marketing claims. They're observable, auditable behaviors that partners can demonstrate to clients with the compliance profile page. The enforcement log shows real check results from real calls.

Most partners find that compliance handling — the part they expected to be a headache — is the part of the platform they trust most because they can see exactly what it does.


Next in this series: Workforce Wave AI: The Engine Behind Auto-Provisioning — what happens inside the 5-step pipeline when a partner enters a business URL, and why partners get an operationId instead of a 30-second wait.

Share this article

Ready to put AI voice agents to work in your business?

Get a Live Demo — It's Free