Georgian Wineofficial1
Georgia's vineyard cadastre as provenance infrastructure
Key claim: Georgia's public vineyard cadastre provides a real institutional foundation for origin traceability.
MEPA documents the cadastre as an administrative and quality-support instrument, and subsequent reporting shows continued maintenance and rollout activity.
Why it matters: Terroir can extend an existing public registration logic instead of inventing provenance from zero.
Open evidenceGeorgian Wineofficial2
PDO specifications as structured rulebooks
Key claim: PDO documentation in Georgia encodes concrete constraints for protected names and claims.
National Wine Agency PDO pages describe protected denominations and linked requirements rather than only marketing descriptions.
Why it matters: Terroir can model provenance as structured claim sets with explicit rules and controls.
Open evidenceGeorgian Wineofficial3
Variety and region linkage in Georgian wine identity
Key claim: Georgian wine value is strongly tied to grape variety diversity and regional specificity.
National Wine Agency materials emphasize indigenous varietals and region-level distinctions as core components of Georgian wine identity.
Why it matters: The relevant verification unit is not only a label; it is a structured package of variety, origin, and production context.
Open evidenceAnti-Counterfeit and GIofficial4
Documented cross-border misuse of Georgian wine names
Key claim: Misuse of protected Georgian wine names is documented and handled through formal enforcement channels.
Sakpatenti case reporting and annual materials show GI-related disputes and cross-border legal action around protected indications.
Why it matters: Terroir needs to support verification workflows that hold across jurisdictions, not only domestic contexts.
Open evidenceAnti-Counterfeit and GIpolicy5
Existing legal substrate for GI protection in Georgia
Key claim: Georgia has an established legal framework for appellations of origin and geographical indications.
WIPO Lex entries document the governing legal instruments used for registration, use, and protection of GI-related rights.
Why it matters: Terroir should be framed as an evidence and coordination layer that supports legal enforcement, not a replacement for law.
Open evidenceAnti-Counterfeit and GIreport6
GI as an inspection and competitiveness instrument
Key claim: GI systems are positioned as both market-development and control instruments.
Sakpatenti's GI publication highlights inspection relevance and the value of precise product descriptions for fraud prevention.
Why it matters: Terroir aligns best when presented as a shared evidence layer for inspectors, certifiers, and buyers.
Open evidenceAnti-Counterfeit and GIofficial7
International momentum for stronger GI protection
Key claim: Recent WIPO reporting reflects active international institutional focus on GI systems under the Geneva Act framework.
WIPO's Lisbon/Geneva Act coverage highlights ongoing policy and implementation dialogue around stronger GI recognition and protection.
Why it matters: Terroir's positioning fits a broader policy direction toward more legible, cross-border origin evidence.
Open evidenceClimate Resilienceofficial8
2023 Kakheti hail events and coordinated response
Key claim: Major weather shocks in wine-producing municipalities already trigger multi-actor response operations.
MEPA's 2023 reporting documents hail impact and coordinated public response steps in key wine regions.
Why it matters: Shield can be grounded in existing emergency coordination patterns, with better evidence rails for speed and fairness.
Open evidenceClimate Resilienceofficial9
State agroinsurance as rollout substrate
Key claim: Georgia's agroinsurance program provides an active policy substrate for climate-risk transfer in vineyards.
RDA program updates describe co-financing and disaster-loss reduction objectives within a functioning state-backed program.
Why it matters: Shield can begin as auditable trigger and evidence infrastructure around existing mechanisms rather than replacing them.
Open evidenceClimate Resiliencereport10
Climate vulnerability and basis-risk design constraints
Key claim: Resilience design for GI-linked agriculture requires both adaptation awareness and explicit basis-risk governance.
Recent climate research and World Bank risk-finance guidance together support cautious, transparent trigger design rather than over-claiming index precision.
Why it matters: Shield should emphasize auditable rules and explicit limitations, not promise perfect loss matching.
Open evidenceProvenance and Traceabilitypaper11
Full traceability as economic value
Key claim: Traceability can produce direct operational and economic gains beyond compliance.
Management Science findings show value creation from improved product-level visibility during contamination and response scenarios.
Why it matters: Terroir messaging can credibly emphasize revenue protection and uncertainty reduction, not only fraud prevention.
Open evidenceProvenance and Traceabilitypaper12
Information loss as a core traceability failure
Key claim: Information loss across handoffs is a documented weakness of traceability systems.
Food Control analysis identifies significant data degradation and continuity gaps with practical safety and economic implications.
Why it matters: Terroir should prioritize evidence continuity across actors and documents rather than maximal data collection.
Open evidenceProvenance and Traceabilitypaper13
Adoption depends on ecosystem design, not UI alone
Key claim: Farmer participation in traceability systems is strongly shaped by institutional and ecosystem design.
Recent studies emphasize that data capture responsibilities fall on producers, but adoption stalls when incentives and support structures are weak.
Why it matters: Terroir should stay batch-first and low-friction while integrating trusted intermediaries and aligned incentives.
Open evidenceProvenance and Traceabilitypaper14
Selective blockchain architecture in agri supply chains
Key claim: Literature supports selective blockchain use with hybrid architecture tradeoffs.
Recent reviews repeatedly identify benefits in transparency and authenticity, while also noting cost, coordination, privacy, and readiness constraints.
Why it matters: Terroir's off-chain operations plus on-chain commitments model matches the strongest practical pattern.
Open evidenceProvenance and Traceabilitypaper15
Provenance visibility and buyer trust outcomes
Key claim: Buyer trust and quality perception are influenced by traceability visibility.
Consumer-facing traceability studies link transparent provenance information with stronger perceived trust and quality signals.
Why it matters: Terroir's public verification page turns hidden compliance evidence into a usable downstream trust surface.
Open evidenceDigital Public Goodspolicy16
Default-to-open as implementation doctrine
Key claim: Default-to-open is an operational build philosophy, not branding language.
UNDP's standard emphasizes open development, transparent roadmaps, reusable assets, and careful data-sharing practices.
Why it matters: Terroir's open repositories, public docs, and reusable specifications align with a recognized digital-public-goods discipline.
Open evidenceDigital Public Goodsreport17
DPG governance baseline: openness plus safeguards
Key claim: DPG framing combines openness with privacy and do-no-harm expectations.
DPGA publications frame DPG qualification around open assets and governance safeguards rather than open code alone.
Why it matters: Terroir's governance target should include accountability, privacy, and maintenance standards in addition to open licensing.
Open evidenceDigital Public Goodsreport18
DPGs as reusable building blocks for DPI
Key claim: Digital public goods are increasingly positioned as reusable components of digital public infrastructure.
DPGA and UNICEF materials frame open digital assets as scalable public-interest infrastructure rather than single-vendor products.
Why it matters: Terroir can be positioned as reusable trust infrastructure for origin-sensitive agricultural chains beyond a single wine use case.
Open evidenceFunding and Safeguardspolicy20
Rights-based safeguards for public-interest deployment
Key claim: Public-interest digital infrastructure should be deployed with explicit safeguards on rights, privacy, accountability, and remedy.
The Universal DPI Safeguards Framework outlines governance guardrails for funders and implementers across transparency, security, and redress dimensions.
Why it matters: Terroir should be framed as livelihoods, verification, and resilience infrastructure with explicit safeguards, not product promotion.
Open evidence