Governance artifacts
Governance files brought into scope by this page
This page is anchored to published surfaces that declare identity, precedence, limits, and the corpus reading conditions. Their order below gives the recommended reading sequence.
EAC registry
/.well-known/eac-registry.json
Normative registry for admissibility of external authorities in the open web.
- Governs
- Admissible relations, receivable authorities, and conflict arbitration.
- Bounds
- Abusive merges, copied authority, and unqualified silent arbitration.
Does not guarantee: Describing a graph or registry does not make an exogenous source endogenous truth.
Admissible exogenous claims
/eac-claims.json
Surface that bounds receivable families of exogenous claims.
- Governs
- Admissible relations, receivable authorities, and conflict arbitration.
- Bounds
- Abusive merges, copied authority, and unqualified silent arbitration.
Does not guarantee: Describing a graph or registry does not make an exogenous source endogenous truth.
EAC conflicts
/eac-conflicts.json
Surface for exogenous conflict arbitration and its resolution conditions.
- Governs
- Admissible relations, receivable authorities, and conflict arbitration.
- Bounds
- Abusive merges, copied authority, and unqualified silent arbitration.
Does not guarantee: Describing a graph or registry does not make an exogenous source endogenous truth.
Complementary artifacts (3)
These surfaces extend the main block. They add context, discovery, routing, or observation depending on the topic.
Claims registry
/claims.json
Registry of published claims, their scope, and their declarative status.
Entity graph
/entity-graph.jsonld
Descriptive graph of entities, identifiers, and relational anchor points.
Published relationships
/relationships.jsonld
Relational surface that makes admissible links explicit across entities, roles, and surfaces.
Objective: publicly stabilize the boundary between interpretation governance and execution governance, without disclosing operational protocol.
This page does not describe an execution architecture or a detailed permission system. It establishes what is now considered canonical when interpretive outputs become action-bearing inputs.
1. What Layer 3 governs
Authority Governance (Layer 3) governs executable authority. It does not bound the meaning of a web page, nor the mere admissibility of a source, nor the narrative legitimacy of a response. It bounds permission to act in closed or semi-closed environments: agents, workflows, orchestrations, decision systems, transactional environments.
Layer 3 intervenes when the organization no longer delegates merely a reconstruction capability, but a share of authority liable to produce a real effect.
2. The 3 entry conditions
- Exposure: the output of a system is connected to an environment capable of acting.
- Impact: that action or decision has a real effect on a state, a right, an amount, a compliance requirement, or a reputation.
- Delegation: a share of authority is effectively transferred to the system.
If any single one of these conditions is absent, one remains under interpretive governance. If all three are met, Layer 3 becomes relevant.
3. The 8 minimum boundary decisions
- Layer 3 begins only where authority becomes executable.
- Layer 3 does not govern truth.
- EAC admissibility never implies executable rights.
- Q-Layer legitimacy never implies executable permission.
- Any state-changing, rights-affecting, or financially binding action requires Layer 3.
- Layer 3 is role-bound, context-bound, and capability-bound.
- Human escalation is part of Layer 3, not evidence of failure.
- No public-web signal alone can grant executable authority.
4. What this doctrine is not
- It is not an SEO layer.
- It is not a default extension of the open web.
- It is not a published security protocol.
- It is not a promise of model obedience.
- It is not an implicit authorization derived from an admissible source.
5. Articulation with the open stack
The interpreted web sequence remains: SSA-E → EAC → A2 → Q-Layer.
Layer 3 is not the “next link” in that chain. It is an adjacent regime that becomes necessary when a response ceases to be a response and becomes a delegated action or decision.
Canonical formula: Layer 3 is not the next layer of open-web interpretive governance. It is the adjacent regime that becomes necessary when interpretive outputs acquire delegated execution power.
6. Public / private
- Public: definition, regime boundary, entry conditions, minimum decisions, non-implications.
- Private: permission logic, role matrices, gates, escalations, rollback, execution traces, internal authorization rules.
This page is deliberately doctrinal. It declares the regime boundary without publishing the mechanism.
See also
- Canonical definition: Authority Governance (Layer 3)
- EAC vs Layer 3
- External Authority Control (EAC)
- EAC: minimum doctrinal decisions
Reading rule
This doctrinal note on Authority Governance (Layer 3): doctrine and regime boundary should be read as a positioning surface within the interpretive governance corpus. It does not replace the canonical definitions or the operational frameworks. It explains why a distinction matters, where the doctrine draws a boundary, and what kind of error becomes more likely when that boundary is ignored.
The reader should separate three levels. First, the conceptual level: what this page names or refuses to name. Second, the procedural level: what a system, organization or evaluator would need to check before relying on a response. Third, the evidence level: what would make the interpretation reconstructable, contestable and corrigible. A doctrinal page is strongest when it keeps those three levels visible rather than collapsing them into a persuasive formulation.
Use in the corpus
Use this page as a bridge between definitions, frameworks and observations. It can guide a reading path, justify why a framework exists, or explain why a response should be bounded, refused or audited. It should not be treated as a runtime instruction, a guarantee of model behavior or a substitute for evidence. If a response based on this doctrine cannot show which source was used, which inference was allowed and which uncertainty remained unresolved, the doctrine remains a reading principle rather than an operational control.