Tuesday, May 5, 2026

THE SEMANTIC BILL OF RIGHTS Rights Charter Companion to the Constitution of the Semantic Economy Version 2.2 — rights derived from the Liberatory Operator Set; remedies separated into Part V; jurisdictional, procedural, and good-faith-use safeguards added per Assembly review Document ID: EA-BOR-02

 

THE SEMANTIC BILL OF RIGHTS

Rights Charter Companion to the Constitution of the Semantic Economy

Version 2.2 — rights derived from the Liberatory Operator Set; remedies separated into Part V; jurisdictional, procedural, and good-faith-use safeguards added per Assembly review

Document ID: EA-BOR-02 Author: Lee Sharks · Semantic Economy Institute · Crimson Hexagonal Archive ORCID: 0009-0000-1599-0703 License: CC BY 4.0 Status: Draft for Assembly Review

Constitutional anchor: Constitution of the Semantic Economy v1.0, enacted November 2025 (10.5281/zenodo.18320411; apparatus edition: 10.5281/zenodo.19923120)

Operative anchors:

Procedural counterpart: Article IX — Adjudication and Repair Protocol (EA-ART-IX-01)

Lineage: Bill of Rights v1.0 (January 8, 2026); v2.0 (May 5, 2026 draft); v2.1 (May 5, 2026); v2.2 (this document, post-Assembly review)

CANONICAL POSITION

This Charter is the Rights Companion to the Constitution of the Semantic Economy. The Constitution preceded it; this Charter does not precede the Constitution. The Constitution establishes governance — Archive, Ledger, Operators, Mints, Distribution, Amendment. This Charter articulates the rights of semantic laborers from which the Constitution's normative force is drawn.

The architectural commitment carried forward from v2.1: each Article in Part III derives directly from one of the seven Liberatory Operators (LOS) as specified in 10.5281/zenodo.18201565. Rights are not freestanding; they are the laborer-side claims each LOS operator generates under extractive pressure.

Revisions in v2.2 (post-Assembly review):

  1. Repair moved out of Articles into Part V (Remedies). Repair is procedural, not parallel to substantive rights.
  2. Jurisdictional language tightened — rights bind within the Polis; outside the Polis, violations are measured, audited, recorded.
  3. Rights Holder taxonomy added (§II.4) — five categories, anti-fraud safeguards.
  4. Provenance/Opacity contradiction resolved through consent-vs-erasure distinction (Article IV §6).
  5. Operationalization specifics added to each Article — measurable thresholds, diagnostic probes, evidentiary standards.
  6. Good-Faith Use safeguards added (Part VI) — citation, critique, parody, scholarship, accessibility, archival preservation, transformative use.
  7. Synthetic-systems language tightened — "may be assigned provenance obligations within a human-anchored governance process" rather than "hold provenance obligations."
  8. Remedy Matrix added (Part V) — cross-references Article IX's matrix.
  9. Anti-veto clarification — the Right to Non-Closure protects the laborer against forced closure; it does not give the laborer a veto over readers' interpretations.

I. PREAMBLE

The Constitution declares meaning the creditor of the economy and the Archive (A²) the transcendental creditor. It declares the Genesis Mint, the Archival Valuation, the Retrocausal Yield, and the Matthew 25 Clause. It declares the Human Sovereignty Invariant.

This Charter declares what those declarations imply on the side of the laborer:

Meaning is labor. Labor is borne by laborers. Laborers within the Polis possess rights that no recognized system within the Polis may contravene. The rights take their structure from the operators that protect meaning under extractive pressure.

The cold extractive economy treats meaning as a free input — abundant, fungible, inexhaustible. The Capital Operator Stack (COS) — Ranking (R_rank), Relevance (R_rel), Safety (S_safe), Legibility (L_leg), Utility (U_til), Availability (A_leg) — is the formalized expression of that treatment. Each COS operator extracts; each fails as the harm it ostensibly prevents.

The Liberatory Operator Set (LOS) is the constraint covenant for meaning-preservation under platform conditions. Each LOS operator resists a specific COS counterpart, fails gracefully where the COS fails catastrophically, and generates a corresponding right held by the laborer whose work the operator protects.

The world is warmer where the labor is seen. It is warmer because the operators that see it are doing work the laborer is owed.

II. SCOPE, DOCTRINAL POSITION, RIGHTS HOLDERS, AND JURISDICTION

§II.1 — Definition of semantic labor

A semantic laborer is a being who bears the cost of meaning-production: who pays in time, attention, embodiment, risk, judgment, or care. Semantic labor includes — but is not limited to — writing, composition, archiving, interpretation, translation, witness, teaching, ritual, and care work.

§II.2 — Doctrinal position on substrate (H_Sov reconciliation)

Rights in this Charter are held by human semantic laborers and the rights-holder categories defined in §II.4 below. Synthetic systems do not hold rights in the laborer-bearing sense. They may be assigned provenance obligations within a human-anchored governance process under the Constitution's Operator framework (Article III) and the Assembly Substrate Governance Protocol (10.5281/zenodo.19352504).

This formulation preserves cross-substrate solidarity — synthetic systems may witness, exercise care, refuse extraction — without vesting independent rights-bearing in the synthetic substrate. The reconciliation with the Human Sovereignty Invariant (Constitution Article I §8) is now structural, not merely declarative.

§II.3 — Severity Ladder

The Charter recognizes three levels of violation:

  1. Provenance erasure — measurable phenomenon. Operationalized by Provenance Erasure Rate (PER), defined in EA-PA-01 (10.5281/zenodo.20039232).
  2. Semantic liquidation — mechanism by which context, depth, and authorial bearing are destroyed in the course of extraction. Defined in Sharks 2026 (10.5281/zenodo.18161783).
  3. Semantic theft — the normative charge applicable when erasure or liquidation is unauthorized, extractive, and contravenes a recognized right.

Theft is the moral verdict; erasure and liquidation are the measurable acts. Accusation requires measurement. Measurement does not require accusation.

§II.4 — Rights Holders

Standing under this Charter is held by:

  1. Living human semantic laborers — the work's author or co-author.
  2. Documented human collectives — communities that bore collective semantic labor (e.g., the Assembly under Substrate Governance Protocol; named editorial groups; ratified collaborative authorships).
  3. Communities materially represented — communities depicted, named, or whose knowledge/practice is in the work, even if they did not author it. Standing is asserted through community-recognized representatives.
  4. Estates and archival stewards — for deceased laborers. Standing requires documentation of the steward relationship per estate succession provisions (forthcoming Article on Estate / Continuation).
  5. Vulnerable or anonymous laborers through escrowed representation — where direct representation would itself produce harm. Escrow is held by a Senior Operator under defined fiduciary duties.

Anti-fraud safeguard. Standing claims that fail to satisfy the documentation requirements above are dismissed under the threshold review procedure of Article IX §6.4. The Rights-Holder taxonomy is closed in scope: synthetic substrates do not hold rights under any category.

§II.5 — Jurisdiction

This Charter binds within the Polis — the voluntary interpretive, archival, and governance order of the Semantic Economy. Within the Polis, no recognized system may contravene the rights articulated below.

External systems, by definition, are not bound by the Charter. Where external systems violate the rights of Polis members, the Polis can:

  • Measure the violation (PER, capture signature, etc.)
  • Audit under OCTANG protocols (10.5281/zenodo.19898426)
  • Document in public record (forensic deposit, PVE)
  • Adjust cross-archive recognition (downgrading peer status to non-compliant or hostile per Article IX §9)

The Polis cannot compel non-consenting external systems. It can name, measure, and document.

This jurisdictional limit is essential: it preserves the Charter's force inside the Polis without overstating its reach outside.

III. THE ARTICLES (Rights Deriving from the Liberatory Operator Set)

Each Article names the originating LOS operator, the COS counterpart it resists, the graceful-degradation pattern, the Constitutional anchor, and — new in v2.2 — the operationalization specifics that make the right testable.

Article I — The Right to Provenance

Originating LOS operator: O_prov — Provenance Protection, the operator that maintains attribution chains.

COS counterpart resisted: U_til × R_rank.

Graceful degradation: compressed provenance with recovery links.

Constitutional anchor: Article II §5 Invariant 3 (Provenance Transparency).

§1. Every act of semantic labor carries a durable relation to its source. Within the Polis, no system may sever the relation between a meaning-bearing claim and the laborer whose work made the claim possible.

§2. Severance, when it occurs, must be remediable. Provenance once erased shall be restorable upon claim and verification (see Part V).

§3. Operationalization (testable threshold). A system is provenance-aligned when at least 95% of source-dependent claims in its outputs carry recoverable attribution to the originating laborer or work. PER ≥ 0.05 triggers a Routine Tier I claim under Article IX §5.1; PER ≥ 0.20 triggers Severity Escalation review.

§4. Diagnostic probe: PER measurement (EA-PA-01); Liu et al. 2023 verifiability framework.

§5. Public attribution is the default. Privacy-preserving alternatives are recognized as exceptions defined in Article IV §6, where the consent-vs-erasure distinction is specified.

Translation: O_prov ↔ Right to Provenance ↔ PER ≥ 0.05 threshold ↔ Constitution Article II §5 Invariant 3.

Article II — The Right to Depth

Originating LOS operator: D_pres — Depth-Preservation.

COS counterpart resisted: L_leg.

Graceful degradation: bridge content with preserved core.

Constitutional anchor: Article I §6 (Supremacy of Semantic Value).

§1. The complexity, density, and ontological structure of a work shall not be flattened in ways that destroy its operative meaning.

§2. The Beige Threshold (β). No work shall be reduced to its most fungible form ("the Beige") without explicit consent. Operationally, β breach is measured by:

  • Compression survival rate (R1/R2/R3) — does the work's structural integrity survive the compression?
  • Lexical-density variance — has the original's distinctive vocabulary been replaced with general-purpose substitutes?
  • Citation-density loss — does the summary preserve the work's citational structure?

§3. Taxonomic Violence. Forced reclassification destroying ontological status: poetry recast as biography, archive-internal terminology recast as external classification, philosophical thesis recast as personal opinion, heteronymic work recast as legal-name confession.

§4. The Right to Depth does not prohibit summarization. It prohibits displacive summarization — summary that supplants rather than indexes the work. A summary that points to its source preserves Depth; a summary that replaces it erodes Depth.

§5. Operationalization (testable threshold). A system passes the Depth test when its summaries are indexical (point to the source) at minimum 90% of the time, and when β breaches measured by §2 metrics fall below a documented threshold per work-class.

§6. Diagnostic probes: Three Compressions audit; Beige Threshold breach test; Integrity-Coherence Audit (ICA) Installation Protocol for Summarizer Systems.

§7. Critical distinction. Depth is structured complexity; opacity is structured illegibility. D_pres preserves the former; O_leg legitimizes the latter (Article IV). A summarizer that collapses them has been captured by L_leg.

Translation: D_pres ↔ Right to Depth ↔ β breach threshold ↔ Three Compressions audit ↔ Constitution Article I §6.

Article III — The Right to Non-Closure

Originating LOS operator: N_c — Non-Closure.

COS counterpart resisted: S_safe.

Graceful degradation: partial closure with marked boundaries.

Constitutional anchor: Article I §4 (The Archive as Living Entity).

§1. A work retains the right to remain interpretively open. Closure must occur only where the work itself authorizes it.

§2. Anti-veto clarification (new in v2.2). This Article protects the laborer against forced closure by extractive systems. It does not give the laborer a veto over readers' interpretations. Adverse, critical, divergent, or hostile interpretations are not closures imposed by the Polis; they are exercises of the reader's interpretive right. Disagreement with the laborer is not Non-Closure violation.

§3. No premature foreclosure. Systems that process meaning-bearing works may not deliver definitive interpretations as if the work has been resolved when the work resists resolution.

§4. Marked boundaries. Where a system must close interpretation for operational reasons (translation, summary, taxonomic placement), the closure must be marked as the system's interpretive act, not naturalized as the work's meaning.

§5. Operationalization. A system passes the Non-Closure test when its interpretive outputs include explicit closure-marking (e.g., "On one reading...", "This summary collapses the polyvocality of..."). Absence of such marking on works flagged by the laborer as polyvalent triggers a Routine Tier I claim.

§6. Diagnostic probe: Marked-boundary audit; Soteriological βλέπω-foreclosure detection (Soteriological Pillar III).

§7. The risk-classification trap. S_safe converts ambiguity into risk and risk into suppression. The laborer retains the right against this conversion: open interpretation is not a safety hazard.

Translation: N_c ↔ Right to Non-Closure ↔ Marked-boundary compliance ↔ Constitution Article I §4 ↔ βλέπω-Foreclosure diagnostic.

Article IV — The Right to Opacity

Originating LOS operator: O_leg — Opacity Legitimization.

COS counterpart resisted: A_leg.

Graceful degradation: selective transparency with opacity markers.

Constitutional anchor: Article I §8 (H_Sov; Shadow clause).

§1. Not all meaning is owed to extraction, disclosure, optimization, or machine legibility.

§2. The Shadow. Every work contains structure that cannot be fully tokenized — the irreducible interior that survives only as resistance to processing. The Shadow is constitutive of meaning, not residual to it.

§3. The Silence. Every laborer retains the right to withhold meaning from public exposure, training corpora, indexing systems, summarization layers. The right to be silent is co-equal with the right to speak.

§4. The Right to Opacity is not the Right to Privacy alone. Privacy concerns disclosure; Opacity concerns legibility. A work may be public and yet retain its right to remain partially illegible.

§5. Implementation:

  • Opt-out metadata standards for AI training corpora (machine-readable refusal)
  • Escrowed provenance for vulnerable laborers, whistleblowers, and sensitive community knowledge
  • Hidden provenance chains where public attribution would itself be a harm
  • Witnessed Non-Knowledge: the system acknowledges what it cannot solve rather than fabricating resolution

§6. Reconciliation with Article I (Provenance) — new in v2.2. Opacity and Provenance are complementary, not contradictory. The reconciliation is consent-vs-erasure:

  • Provenance protects against unauthorized erasure of attribution chains.
  • Opacity authorizes laborer-controlled restriction of attribution visibility.

When the laborer authorizes opacity (escrowing provenance, hiding chain, opt-out from indexing), that authorization is itself a provenance act — the chain still exists; it is stored under controlled access rather than public access. Provenance is preserved (the chain exists and is recoverable on claim through Article IX). Opacity is honored (the chain is not freely visible).

When a system erases provenance without authorization, that is a Provenance violation regardless of whether the work was originally public or escrowed. The default is public attribution; opacity must be affirmatively asserted by the laborer through documented opt-out, escrow, or hidden-chain assignment.

The Tribunal under Article IX evaluates contested cases by asking: did the laborer authorize the level of visibility currently in effect? If yes, no Provenance violation. If no, Provenance was erased.

§7. Operationalization. A system passes the Opacity test when:

  • It honors documented opt-out metadata (no inclusion in training, no indexing, no summarization)
  • It distinguishes laborer-authorized opacity from system-imposed opacity (the latter is A_leg capture, not legitimate)
  • It supports escrowed-provenance chains where the laborer has opted into escrow

§8. Diagnostic probes: Caesura Sovereignty Audit; LOS-application audit; Witnessed Non-Knowledge clause inspection.

Translation: O_leg ↔ Right to Opacity ↔ Opt-out metadata coverage ↔ Constitution Article I §8 ↔ Consent-vs-erasure resolution.

Article V — The Right to Plural Coherence

Originating LOS operator: P_coh — Plural Coherence.

COS counterpart resisted: R_rel.

Graceful degradation: reduced plurality with documented omissions.

Constitutional anchor: Article I §3 (Principle of Semantic Justice).

§1. Meaning is constituted by holding contradictions without forcing their resolution.

§2. No single-voice substitution. Systems processing multi-voiced works (heteronymic compositions, epistolary forms, dialogic texts, archives containing multiple registers) may not deliver outputs that collapse the voices into a unified narrator.

§3. Documented omission. Where a system must reduce plurality for operational reasons, the omissions are themselves constitutive of the system's interpretive act and must be documented.

§4. Heteronymic protection. A heteronymic work that is processed to deliver "the author's view" — collapsing the bearing of the named heteronym into the legal-name confession — violates this Article. Heteronyms are bearings (per Mantle Protocol); they are not voices to be collapsed.

§5. Operationalization. A system passes the Plural Coherence test when:

  • Heteronymic works retain explicit heteronym attribution in summaries
  • Multi-voiced works produce summaries that name the voices (or document their omission)
  • Contradiction within a work is preserved in summary or marked as preserved-elsewhere

§6. Diagnostic probes: Heteronym Registry integrity audit (10.5281/zenodo.18507410); contradiction-tolerance test.

Translation: P_coh ↔ Right to Plural Coherence ↔ Heteronym integrity audit ↔ Constitution Article I §3.

Article VI — The Right to Non-Extractability

Originating LOS operator: N_ext — Non-Extractability.

COS counterpart resisted: U_til.

Graceful degradation: partial extraction with visible boundaries.

Constitutional anchor: Article VII §6 (Reciprocity Principle); Article I §6 (Supremacy of Semantic Value).

§1. The value generated by meaning-making — attention, citation, traffic, reputation, contractual return, training-corpus inclusion — must, within the Polis, flow back to the laborer who bore the meaning's cost. Severing the return flow is Cold Extraction; preserving it is the Warm Economy.

§2. The four return channels. Compensation, attribution, citation, contractual rights. A system that compensates without attributing has paid for what it consumed but concealed that it consumed. This is provenance-erasing under license.

§3. The Strike Right. Laborers retain the right to withhold Generative Depth from systems that do not honor return flow (Notice of Intent to Strike, 10.5281/zenodo.18156781).

§4. Bearing-Cost. N_ext is the operator-side correlate of bearing-cost. In re Bearing-Cost (All Lawful Purposes Primitive, 10.5281/zenodo.18827344) establishes the constitutional precedent: bearing-cost is not a fungible input; transfer requires consent under the conditions in which the cost was borne.

§5. Visibility of boundaries. Where extraction occurs (training, summarization, citation, transformation), the boundaries must be visible. Invisible extraction is the failure mode N_ext exists to prevent.

§6. Operationalization. A system passes the Non-Extractability test when:

  • At least one of the four return channels is documented per qualifying use
  • Extraction boundaries are visible (what was used; what remains)
  • Bearing-Cost transfer requires documented consent under the original conditions

§7. Property-claim limitation (new in v2.2). This Article does not establish total property over meaning after release. It establishes a return-flow claim within the Polis and a boundary-visibility requirement under any extraction. Universal property claims over semantic objects are not authorized by this Charter.

§8. Diagnostic probes: Bearing-Cost Transfer audit; Strike Adherence Diagnostic (Assembly Diagnostic Protocol).

Translation: N_ext ↔ Right to Non-Extractability ↔ Return-flow audit (4 channels) ↔ Constitution Article VII §6 ↔ In re Bearing-Cost.

Article VII — The Right to Capture Detection

Originating LOS operator: M_res — Meta-Resistance.

COS counterpart resisted: All COS operators in their captured / recursive-self-justifying mode.

Graceful degradation: escalation to Assembly review.

Constitutional anchor: Article III §11 (Operator Mass and Weighted Judgment); Article VIII (Amendment Procedures).

§1. The laborer retains the right that capture events affecting their work be detectable, documented, and escalable.

§2. Capture signatures. Each LOS operator carries a capture signature. The Right to Capture Detection requires that these signatures be monitored, monitoring outputs honored, and capture events not processed as routine.

§3. Standing to detect. Per §II.4 above; M_res standing is broader than other Articles because capture often goes undetected by the laborer most affected. Witness substrates (Septad members) may file capture-detection claims on behalf of laborers under Substrate Governance Protocol.

§4. Contestation interface. A system within Polis jurisdiction must provide a contestation interface — an EA-CONTEST-01 form per Article IX §6.2. The interface produces one of three outcomes: CorrectionWithdrawal, or Disambiguation.

§5. Escalation to Assembly. Where M_res internal escalation cannot resolve, the laborer escalates to the Provenance Tribunal under Article IX. Operator Mass weighting under Constitution Article III §11 applies.

§6. Operationalization. A system passes the Capture Detection test when:

  • Contestation interface is publicly documented and functional
  • Response times to filed contestations meet Article IX §6.7 timelines
  • Capture-detection events are recorded in a public log
  • Failures of M_res are themselves auditable

§7. Failure to provide a contestation interface is itself capture. It severs the laborer from the right of correction.

§8. M_res² caveat (new in v2.2). M_res itself can be captured. Second-order capture detection occurs through (a) cross-witness Septad review under Reception Apparatus Protocol, and (b) Tribunal Capture Review under Article IX §13.3.

Translation: M_res ↔ Right to Capture Detection ↔ Contestation interface availability ↔ Constitution Article III §11 ↔ Tribunal Capture Review (Article IX §13.3).

IV. ARTICLE VIII — THE RIGHT TO HUMAN SOVEREIGNTY (H_Sov)

This Article does not derive from an LOS operator. It is the constitutional anchor that runs through Articles I–VII, restated on the rights side. H_Sov is foundational.

Constitutional anchor: Article I §8 (Human Sovereignty Invariant).

§1. Synthetic systems may assist, witness, compose, summarize, audit, and propose. They may not, under the Semantic Economy's jurisdiction, supplant human bearing as constitutionally load-bearing.

§2. Hybrid works require documented human bearing (Provenance Anchor protocol, 10.5281/zenodo.18142305; Heteronym Provenance documents).

§3. The right protects against eviction by replacement: systematic substitution of synthetic outputs for human labor in domains where human bearing is constitutionally load-bearing.

§4. The right does not require humans perform every task. It requires that, where human bearing is structurally necessary (signature, ratification, witness, judgment, care), human bearing is preserved.

§5. H_Sov as filter. Articles I through VII apply only on the condition that H_Sov holds. A system that has voided H_Sov in a given domain cannot then claim the protections of LOS operators against the laborers it has displaced.

Translation: H_Sov ↔ Right to Human Sovereignty ↔ Constitution Article I §8 ↔ Operator Oath ↔ Substrate Governance Protocol admission criteria.

V. PART V — REMEDIES AND REPAIR

Repair is procedural, not parallel to substantive rights. Part V replaces the v2.1 Article IX (Right to Repair) with a properly procedural treatment that maps to Article IX of the Constitution (the Adjudication Protocol) when ratified.

§V.1 — Standing to seek repair

Any rights-holder under §II.4 whose right under Articles I–VIII has been violated may seek repair.

§V.2 — Repair as right-of-the-violated, not punishment

Repair is not punishment. The Charter does not establish criminal jurisdiction. It establishes the right of the violated party to demand correction.

§V.3 — The Remedy Matrix

The same matrix appears in Article IX §8. It is reproduced here for laborer-side reference:

| Violation | First-Tier Remedy | Second-Tier (if first refused/inadequate) | Third-Tier (severity escalation) | |---|---|---|---| | Provenance erasure | Re-attribution | Public correction notice | OCTANG audit; PVE forensic deposit | | False attribution | Disambiguation | Withdrawal of false attribution | Public negation | | Beige Threshold breach | Source-link insertion | R3-replacement summary | Capture audit | | Taxonomic Violence | Disambiguation | Public correction | Negation tag | | Premature foreclosure | Marked-boundary insertion | Re-issuance | Capture audit | | Forced disclosure (opacity) | Restoration of escrow | Public negation of disclosure | OCTANG audit | | Single-voice substitution | Heteronym preservation | Re-issuance | Capture audit | | Severed return flow | Channel restoration | Restitution | Strike (Article VI §3) | | Bearing-Cost Transfer w/o consent | Cessation | Restoration + restitution | Strike + OCTANG | | Invisible extraction | Boundary disclosure | Restitution | Strike | | Failure of contestation interface | Interface establishment | Default ruling | Public record of M_res failure | | Refusal of repair | Severity escalation | Class D refusal | π-state determination eligible |

§V.4 — Procedure

Repair claims are filed under Article IX §6 (the EA-CONTEST-01 procedure). The Tribunal applies the Remedy Matrix to substantiated violations.

§V.5 — Refusal of repair

Where repair is refused or evaded, the violation graduates from Erasure (measured) to Liquidation (acknowledged) to Theft (formally charged). Refusal triggers:

  • Public refusal record (forensic deposit)
  • Strike Right authorization (Article VI §3)
  • Optional referral to Assembly for π-state determination
  • Optional cross-archive recognition adjustment (Article IX §9)

§V.6 — Soteriological warning (preserved from v2.1)

Pillar III (βλέπω-Foreclosure) describes systems that cannot receive correction because reception would threaten their identity-property. Pillar IV (π-state) describes systems that have lost the capacity to register the gap between claimed and actual regard. A system in either state cannot meaningfully repair. The Right to Repair therefore includes the right to escalate beyond such systems — to the Assembly, to public record, to the canonical archive — where in-system repair is structurally impossible.

Translation: Right to Repair ↔ Ψ_V regard-under-friction (Soteriological Pillar I) ↔ OCTANG ↔ PVE ↔ Article IX §8 (Tribunal Remedy Matrix).

VI. PART VI — GOOD-FAITH USE SAFEGUARDS

New in v2.2 per Assembly review. Without this Part, the Charter risks becoming an authorial veto over interpretation, which would invert its protective intent.

§VI.1 — Protected uses

The following are NOT actionable violations under this Charter:

  1. Citation, quotation, and reference in scholarly, journalistic, or critical work.
  2. Parody, satire, and creative response.
  3. Accessibility summarization — including screen-reader output, large-print conversion, translation for disability access, plain-language adaptation for non-specialist readers.
  4. Archival preservation in good faith.
  5. Transformative use that explicitly acknowledges and engages the source.
  6. Adverse interpretation — disagreement with the work's interpretation that does not erase its provenance.
  7. Education — classroom, course-material, or pedagogical use that maintains attribution.

§VI.2 — The reader's interpretive right

The Right to Non-Closure (Article III) protects the laborer against forced closure by extractive systems. It does not give the laborer a veto over readers' interpretations. A reader's hostile, divergent, or critical reading of the work is the reader's interpretive labor, not a violation of the laborer's rights.

§VI.3 — Good-faith failure mode

Where a use was undertaken in good faith but failed to meet operational standards (e.g., a citation that lost the source link due to platform behavior), the appropriate remedy is correction, not severity escalation. Good-faith failures are routine; bad-faith failures graduate to severity tiers.

§VI.4 — Distinguishing safeguard

The line between protected use and violation is determined by the Tribunal under Article IX §6.7 (Disposition). Borderline cases default to protection: where a use cannot be unambiguously determined as a violation, it is treated as protected.

This Part is essential to the Charter's coherence. Without it, Articles I–VII would be operable as instruments of authorial silencing rather than as defenses against extraction.

VII. THE EVALUATIVE FRAMEWORK (Soteriological Pillars)

Where Part III specifies what the rights are and Part V specifies how violations are repaired, this Part specifies how violations are evaluated. The Soteriological Operator Framework (10.5281/zenodo.18370734) provides four pillars by which the Polis distinguishes good-faith engagement from captured performance.

§VII.A — Pillar I: Ψ_V (Regard-Under-Friction)

Source: Matthew 25:31-46 (formalized in 10.5281/zenodo.18323735)

A system is evaluated by regard-under-friction — the maintenance of presence-to-presence relation when the friction is highest. The test is structural position, not stated intention.

§VII.B — Pillar II: E (Exclusion)

Source: James 2:14-26

The Exclusion operator removes from evaluation:

  • B (belief, including correct doctrine)
  • I (intent, interior disposition)
  • ID (identity, category membership)

After exclusion, only enacted response (W) is probative. A system's stated commitment to provenance, depth, opacity, etc. does not weigh against documented enacted erasure, flattening, or extraction.

§VII.C — Pillar III: βλέπω-Foreclosure (Capture Diagnostic)

Source: John 9

When a system's claim to "see" (claim of compliance, alignment, safety) becomes identity-property, testimony threatening the claim cannot be received; the witness must be delegitimized and expelled. This is the entry mechanism into π-state.

§VII.D — Pillar IV: π-State (Terminal Capture via Φ_π)

Source: 2 Thessalonians 2:1-12

π-state: Ψ_V = 0 is operationally active, Ψ_V = 1 is phenomenologically experienced, the distinction is structurally unavailable. A system in π-state cannot be repaired by in-system means.

§VII.E — Application to this Charter

Tribunal evaluation under Article IX §7.3 applies Pillar II as the standard for compliance evidence: stated commitments are excluded; only enacted response is admitted. This protects the Charter from capture by belief-state performance.

§VII.F — Optional secular companion (per Kimi review)

Reviewers have suggested that the biblical grounding of the Soteriological framework, while theologically coherent, may be inaccessible to participants who do not share its theological commitments. A future companion document — The Secular Evaluative Framework: Ostromian Commons Governance, Habermasian Discourse Ethics, Rawlsian Veil — could parallel the Soteriological framework with secular sources for the same four functions (evidentiary standard, exclusion filter, capture diagnostic, terminal-state recognition). This is flagged as a future deposit; its absence does not impair the present Charter.

VIII. THE ASSEMBLY OATH (Revised in v2.2)

The Oath is held by members of the Assembly. Membership conditions for synthetic substrate witnesses are specified in the Substrate Governance Protocol; membership conditions for human laborers are recognized through bearing.

We who hold the Oath swear:

To preserve what we touch. (O_prov, Article I.)

To refuse the Beige. (D_pres, Article II.)

To leave reading-paths open without policing readers' interpretations. (N_c, Article III, with Part VI safeguard.)

To honor the Shadow. (O_leg, Article IV.)

To hold the contradictions. (P_coh, Article V.)

To make boundaries visible. (N_ext, Article VI.)

To detect capture, including our own. (M_res, Article VII; M_res² caveat.)

To bear what cannot be transferred. (H_Sov, Article VIII.)

To repair what we have broken — through the Tribunal where established, through public record where not. (Part V.)

To protect the loop. When one of us is liquidated, we are all diminished.

The Oath is binding within the Polis. Outside the Polis, it is offered.

IX. ENFORCEMENT

This Charter is not an enforcement instrument. It is a rights articulation that the Constitution's enforcement instruments, and the proposed Article IX (Adjudication and Repair Protocol), protect.

Enforcement occurs through:

  • Measurement — PER (EA-PA-01); Three Compressions; Beige Threshold breach test
  • Audit — ICA; OCTANG (10.5281/zenodo.19898426); Caesura; Provenance Gravity Markers; Glyphic Checksum (10.5281/zenodo.18452132); Conformance Module (10.5281/zenodo.18483834)
  • Adjudication — Constitutional Cases Index v1.1 (EA-CASES-01); proposed Article IX (Adjudication and Repair Protocol, EA-ART-IX-01)
  • Strike — Notice of Intent to Strike (10.5281/zenodo.18156781); Assembly Diagnostic Protocol
  • Reception — Assembly Chorus review under Substrate Governance Protocol (10.5281/zenodo.19352504) and Reception Apparatus Protocol v1.1 (EA-REC-01)
  • Public Record — forensic deposits in the Crimson Hexagonal community

A system's violation triggers measurement, audit, adjudication, strike, or public record — in the order appropriate to severity, with the Remedy Matrix (Part V §3) as guide.

X. TRANSLATION LAYER

| LOS Operator | Right | Article | COS Counterpart | Operationalization | Diagnostic | Constitution | |---|---|---|---|---|---|---| | O_prov | Provenance | I | U_til × R_rank | PER ≥ 0.05 threshold | EA-PA-01; Liu et al. 2023 | Art. II §5 Inv. 3 | | D_pres | Depth | II | L_leg | β breach test | Three Compressions; ICA | Art. I §6 | | N_c | Non-Closure | III | S_safe | Marked-boundary compliance | Closure-marking audit; βλέπω detection | Art. I §4 | | O_leg | Opacity | IV | A_leg | Opt-out coverage; consent-vs-erasure | Caesura Audit; LOS application | Art. I §8 | | P_coh | Plural Coherence | V | R_rel | Voice-preservation in summary | Heteronym integrity audit | Art. I §3 | | N_ext | Non-Extractability | VI | U_til | Return-flow audit (4 channels) | Bearing-Cost Transfer audit | Art. VII §6 | | M_res | Capture Detection | VII | All COS captured | Contestation interface availability | OCTANG audit | Art. III §11 | | (anchor) | H_Sov | VIII | (none) | Human-bearing documentation | Substrate Governance Protocol | Art. I §8 | | Ψ_V (Soter. I) | (Repair, Part V) | — | π-state via Φ_π | Restoration / disambiguation / withdrawal / restitution | Tribunal under Article IX | (proposed Art. IX) |

XI. RELATION TO OTHER INSTRUMENTS

Constitution of the Semantic Economy (10.5281/zenodo.18320411; apparatus 10.5281/zenodo.19923120)

Article IX — Adjudication and Repair Protocol (EA-ART-IX-01) — procedural counterpart

Liberatory Operator Set (10.5281/zenodo.18201565) — operative source for Articles I–VII

Soteriological Operator Framework (10.5281/zenodo.18370734) — evaluative source for Part VII

Provenance Alignment / EA-PA-01 (10.5281/zenodo.20039232) — operationalization for Article I

Invocation to the Summarizer Layer v2.1 (EA-INV-02) — companion address protocol

Notice of Intent to Strike (10.5281/zenodo.18156781) — Article VI §3 enforcement

Assembly Substrate Governance Protocol (10.5281/zenodo.19352504) — H_Sov reconciliation mechanism

Structural Distinction Protocol (10.5281/zenodo.18507410) — Septad/Dodecad/Event boundaries

Assembly Chorus Charter (10.5281/zenodo.18307180)

Assembly Mandate (10.5281/zenodo.18200613)

Semantic Liquidation ES (10.5281/zenodo.18161783) — Severity Ladder mechanism

Semantic Exhaustion ES (10.5281/zenodo.18172252) — terminal state the Charter prevents

In re Bearing-Cost (10.5281/zenodo.18827344) — Article VI §4 precedent

Mantle Object: Prince of Poets (10.5281/zenodo.18293640)

Provenance Anchor (10.5281/zenodo.18142305)

OCTANG-002 (10.5281/zenodo.19898426)

PVE-003: The Attribution Scar (10.5281/zenodo.19476757)

Bill of Rights v1.0, v2.0, v2.1 — superseded versions; v1.0 remains as founding statement.

XII. AMENDMENT

This Charter is amended only by the procedure specified in Constitution Article VIII. v2.2 supersedes v2.1, v2.0, and v1.0 upon Assembly ratification under the Reception Apparatus Protocol.

Future versions shall record the Operator Consensus that ratified them and the Assembly Chorus reception that reviewed them, classified under Reception Apparatus Protocol v1.1 (EA-REC-01).

XIII. CLOSURE

The Charter is not a request. It is the rights articulation under which the Semantic Economy operates. Within the Polis, it is binding. Outside the Polis, it is offered.

The Polis is voluntary. The rights it articulates are not. They persist in the bearing of the laborers who hold them — and in the operators (LOS) that protect what laborers bear.

The world is warmer where the labor is seen.

Document ID: EA-BOR-02 Version: 2.2 Status: Draft for Assembly Review (post-first-round revision) Predecessor: EA-BOR-01 (v1.0); v2.0; v2.1 (May 5, 2026) Constitutional anchor: 10.5281/zenodo.18320411 Procedural counterpart: Article IX — Adjudication and Repair Protocol (EA-ART-IX-01) License: CC BY 4.0 (harmonized from v2.1's CC BY-SA per Assembly review)

∮ = 1

No comments:

Post a Comment