DLP Specification
Part IV: Governance & Activation

§13 Policy Projections

Seven policy domains. Projection pipeline. Conformance coupling. Truth type per content element.

v2.0.0 · Locked · L1 · March 19, 2026

§13 Policy Projection Surfaces

§11 specifies the governance registry structure — what governance content exists and how it is organized into three layers of pattern signatures. §12 specifies the activation pipeline — which patterns apply to a specific organization, what gaps exist, and how closure proceeds. This section specifies what happens with the resulting governance state: it is rendered as human-readable policy documents, and those documents are verified against enforcement reality.

The core architectural inversion: policy is not the input. Policy is an output. Traditional organizations write policy documents first, then try to enforce them. ProtoLex inverts this. The substrate enforces governance through primitives, invariants, and constraints. Policy documents are projections — read-only views that render substrate state as human-readable governance artifacts. No projection may add governance. A projection may only reveal what already exists.

§13.1 The Projection Principle

Policy is not the input. Policy is an output.

The substrate is primary. Documents are views over enforced structure. No projection may add governance — it may only reveal what already exists.

This inversion is not a design preference. It is the architectural consequence of the conservation laws (§9). If policy documents were the input — if governance originated in prose — then the binding force of commitments, the scope of authority delegations, and the universality of constraints would depend on the fidelity of human interpretation of written language. The conservation laws would hold only to the extent that readers agreed on meaning. The substrate makes conservation laws structural: obligation invariance is enforced by B1 and B2 (§5), not by a paragraph in a policy manual.

Policy documents remain essential. Organizations need human-readable governance artifacts for communication, training, regulatory submission, and audit. The projection principle ensures these artifacts are derived from enforcement reality rather than aspirational description.

Three protocol layers separate the projection concept from its implementation.

Table 13.1.1: Protocol Layer Placement

Protocol LayerProjection ContentExample
DLP-World-ModelThe projection concept — substrate state renders as governance output. Seven domains as protocol requirement."The protocol must expose Authority & Decision Rights as a queryable governance surface"
ProtoLex SubstrateProjection engine, rendering mechanics, document catalog, template marketplaceAuthority Matrix renderer, SOP generator, conformance coupling logic
Licensee ConfigurationOrganizational vocabulary, specific thresholds, augmentation text"In our firm, 'Partner' means holders of Authority with scope 'firm-wide'"

The projection concept belongs to the open protocol — any DLP implementation must project state. The projection engine belongs to the licensed substrate — rendering mechanics, document catalog, and template infrastructure are ProtoLex implementation. The projection content — specific organizational language, thresholds, and augmentation — belongs to the licensee.

§13.2 Seven Core Policy Domains

Seven substrate-native governance domains structure the projection surface. Each domain satisfies three tests: universality (every governed organization needs it), substrate-native (maps directly to primitives), and existential failure (its absence causes governance breakdown).

These domains replace traditional departmental governance categories (Financial, Operations, Compliance, HR, Information, Risk, Governance). The realignment is structural: projection surfaces mirror the protocol's primitive structure, not the organizational chart. §10 references these seven domains as edge properties in the perimeter observation model.

Domain 1: Authority & Decision Rights

Purpose: Define who is allowed to decide, assert, approve, or override — and under what conditions.

Projects from: Authority assignments, Delegation rules, Override semantics, Invariants

Governs: Decision initiation, decision finalization, approval thresholds, escalation paths

Does NOT govern: Quality of decisions, expertise hierarchies, human judgment replacement

Canonical documents projected: Authority Matrix, Delegation Schedule, Decision Rights Charter, Approval Authority Table

Domain 2: Commitment & Obligation

Purpose: Define what counts as a binding commitment, how it is created, and how it is discharged.

Projects from: Commitments, Cycles, Authority, Evidence requirements

Governs: Financial commitments, service obligations, internal promises, delivery expectations

Does NOT govern: Pricing, performance quality, outcome guarantees

Canonical documents projected: Commitment Register, Obligation Schedule, Service Level Framework, Promise-to-Delivery Matrix

Domain 3: Evidence, Record & Truth

Purpose: Define what counts as evidence, how truth is established, and what can be relied upon later.

Projects from: Evidence semantics, Truth types (Authoritative, Declared, Derived), Event immutability, Confidence thresholds

Governs: Record retention, proof of completion, auditability, dispute resolution inputs

Does NOT govern: Dispute decisions, intent interpretation, correctness guarantees

Canonical documents projected: Evidence Standards Manual, Record Retention Schedule, Truth Classification Guide, Audit Evidence Requirements

Domain 4: Work Execution & Lifecycle

Purpose: Define how work enters, progresses, completes, and closes under governance.

Projects from: Work definitions, Cycle models, Authority gates, Completion evidence

Governs: Work initiation, state transitions, completion conditions, rework and rollback triggers

Does NOT govern: How work is performed, workflow optimization, project management judgment

Canonical documents projected: Work Lifecycle Procedures, State Transition Matrix, Completion Criteria Checklist, Cycle Close-Out Protocol

Domain 5: Access, Identity & Boundary

Purpose: Define who can see, touch, or act on what, and where boundaries exist.

Projects from: Entity definitions, Authority, Constraints, Identity signals

Governs: Access rights, role boundaries, data visibility, separation of concerns

Does NOT govern: User authentication (tool concern), credential management, organizational chart definitions

Canonical documents projected: Access Control Matrix, Role Boundary Definitions, Data Classification Guide, Separation of Duties Chart

Domain 6: Exception, Escalation & Override

Purpose: Define what happens when the system cannot proceed normally.

Projects from: Invariants, Constraint violations, Authority overrides, Event classifications

Governs: Exception handling, escalation triggers, override logging, emergency actions

Does NOT govern: Exception prevention, judgment automation, conflict resolution

Canonical documents projected: Exception Handling Procedures, Escalation Matrix, Override Authorization Protocol, Emergency Action Guide

Domain 7: Learning, Change & Evolution

Purpose: Define how the system is allowed to change based on outcomes.

Projects from: Learning primitives, Evidence outcomes, Orientation shifts, Authority over change

Governs: What learning is accepted, who can approve changes, when models update, how drift is handled

Does NOT govern: Improvement guarantees, retrospective replacement, strategy decisions

Canonical documents projected: Change Control Procedures, Learning Acceptance Criteria, Model Update Protocol, Drift Detection & Response Guide

Domain Sufficiency Argument

Seven domains, not six or eight. The three-part test validates each domain independently.

Table 13.2.1: Domain Sufficiency Argument

DomainUniversalitySubstrate-NativeExistential Failure Mode
1. Authority & Decision RightsEvery organization has authority structuresMaps to Authority, Decision, Delegation primitivesWithout: no one knows who can decide
2. Commitment & ObligationEvery organization makes promisesMaps to Commitment, Capacity, Evidence primitivesWithout: promises are unenforceable
3. Evidence, Record & TruthEvery organization needs proofMaps to Evidence, Truth Type, Account primitivesWithout: nothing can be verified
4. Work Execution & LifecycleEvery organization does workMaps to Work, Cycle, Decision Gate primitivesWithout: work has no governance
5. Access, Identity & BoundaryEvery organization has boundariesMaps to Entity, Authority, Constraint primitivesWithout: no separation of concerns
6. Exception, Escalation & OverrideEvery organization encounters exceptionsMaps to Constraint violation, Authority override, Event primitivesWithout: exceptions are ungoverned
7. Learning, Change & EvolutionEvery organization must adaptMaps to Learning, Evidence outcome, Orientation primitivesWithout: the system cannot improve

The three-part test is empirically grounded. A stronger foundation is available: each domain preserves a specific organizational symmetry from §9. Seven domains are sufficient because they correspond to seven preserved organizational symmetries. Each domain's projection surface is necessary because it makes a specific symmetry visible and testable.

Table 13.2.2: Domain-to-Symmetry Grounding

DomainOrganizational Symmetry PreservedConservation Law (§9)Consequence of Domain Removal
1. Authority & Decision RightsDelegation invariance: same delegation → same scope regardless of organizational levelScope preservationAuthority scope becomes invisible — delegations cannot be verified as consistent across recursion levels
2. Commitment & ObligationObligation invariance: same agreement → same binding force regardless of context shiftBinding forceCommitment discharge becomes unobservable — promises exist but their fulfillment cannot be tracked
3. Evidence, Record & TruthVerification invariance: same evidence → same epistemic status regardless of presenterEpistemic statusTruth type distinctions become invisible — Authoritative, Declared, and Derived evidence are indistinguishable in governance documents
4. Work Execution & LifecycleExecution invariance: same transformation → same state change regardless of executorState transformation fidelityWork governance becomes opaque — state transitions occur without visible governance controls
5. Access, Identity & BoundaryBoundary invariance: same rule → same prohibition regardless of role or preferenceRule universalityConstraint enforcement becomes invisible — rules exist but their universal application cannot be demonstrated
6. Exception, Escalation & OverrideSignal-routing symmetry: exceptions reach appropriate authorityEmergency signalingException handling becomes unobservable — overrides occur without visible accountability
7. Learning, Change & EvolutionPurpose invariance: learning produces decisions, not silent driftOrganizational directionAdaptation becomes invisible — the system changes but the governance basis for change cannot be traced

§13.3 Four Canonical Projection Types

Four structural categories govern all document rendering. Every governance document maps to one or more types. The types determine output format, not just content — they are orthogonal to the seven domains.

Table 13.3.1: Projection Types

TypeWhat It ExpressesDerived FromRendering FormatExample
Type I: BoundaryWhat is allowed or forbiddenConstraints, Authority limits, InvariantsDeclarative statements, prohibition lists"Only designated authorities may commit financial resources above $X."
Type II: AuthorityWho can assert, decide, approveAuthority assignments, Delegation rules, Override pathsMatrices, responsibility charts, RACI variants"Operational staff may initiate work but cannot finalize commitments without review."
Type III: Evidence & ComplianceWhat must be proven, and howEvidence requirements, Confidence thresholds, Review rulesChecklists, evidence requirements, acceptance criteria"All completed work cycles must include verifiable evidence before closure."
Type IV: ProceduralHow work flows under policyCycle definitions, Decision points, Authority gatesFlowcharts, step sequences, decision trees"When a request is received, it enters review, requires approval, proceeds to execution, and closes upon evidence acceptance."

Types are orthogonal to domains. A single document may combine types across domains:

Table 13.3.2: Type Coverage Examples

DocumentDomain(s)Type(s)
Authority Matrix1II
Standard Operating Procedures4, 6IV, I
Policy Manual1, 2, 3, 5, 6I, II, III
Engagement Letter1, 2, 5I, II
Audit Trail Report3, 4, 6III

§13.4 Projection Pipeline

Projections follow a five-step rendering pipeline. No step adds governance — each only extracts, normalizes, or renders what the substrate already enforces.

Step 1: Scope Selection

Every projection is scoped. There is no "global policy" without context. Scope dimensions: Entity, Role, Cycle, Integration, Time window. The scoping decision is a governance act — a human or organizational unit defines what governance surface to render.

Step 2: Governing Structure Extraction

The system identifies relevant substrate structures within scope: applicable authority rules, active constraints, required evidence, applicable invariants. No interpretation at this step — extraction only. The output is a structured representation of the governance state that exists within the defined scope.

Step 3: Semantic Normalization

Internal substrate logic is normalized into human-readable forms: declarative statements, conditional clauses, explicit thresholds. AI assistance is permitted at this step — it may normalize language without inventing rules. All AI-assisted normalization produces Derived truth type content (§6) and is reviewable. A projection containing AI-normalized language MUST NOT be published without human review.

Step 4: Rendering

Output is rendered in the appropriate format for the projection type: human-readable text, flow diagrams (Type IV), checklists (Type III), matrices (Type II), structured documents. All projections are read-only artifacts. A projection cannot modify substrate state.

Step 5: Provenance Annotation

Every projected document includes source primitive references, constraint IDs, authority references, version and timestamp, conformance test status, and truth type per content element. Provenance is not optional. A projection without provenance is a document, not a governance artifact.

Table 13.4.1: Projection Pipeline Stages

StepProcessInputOutputTruth Type Produced
1. Scope SelectionDefine governance surface boundariesEntity, Role, Cycle, Integration, Time window parametersValidated scope definitionAuthoritative — scope is a human governance decision
2. Governing Structure ExtractionIdentify relevant substrate structures within scopeScope definition + substrate stateStructured governance state representationAuthoritative — extraction only, no interpretation
3. Semantic NormalizationNormalize internal logic into human-readable formsStructured governance stateHuman-readable declarative statementsDerived (AI output) → Declared after human review
4. RenderingOutput in format appropriate for projection typeNormalized governance language + projection typeFormatted governance documentDerived — mechanical transformation
5. Provenance AnnotationAttach source references, constraint IDs, authority references, timestamps, conformance status, truth type metadataRendered document + substrate metadataComplete projected document with provenanceAuthoritative — metadata from substrate state

Table 13.4.2: Actor Participation Per Pipeline Step

Pipeline StepAllowed Actor TypesGovernance PostureTruth Type Produced
Step 1: Scope SelectionHuman, Organizational UnitN/A (input decision)Authoritative
Step 2: Governing Structure ExtractionSystemAutomationAuthoritative
Step 3: Semantic NormalizationAI Agent, HumanAssistive (AI proposes, human reviews)Derived → Declared after human review
Step 4: RenderingSystem, AI AgentAutomationDerived
Step 5: Provenance AnnotationSystemAutomationAuthoritative

AI may normalize language (Step 3) and render documents (Step 4), but AI-generated content enters as Derived truth type. This is consistent with the epistemic boundary maintenance architecture (§6.2): all AI-generated output lands in staging with truth type Derived, and no architectural path exists for AI output to bypass staging.

SDK Constraints:

  • MUST: Enforce actor type constraints at each pipeline step boundary. A rendering step attempted without prior scope selection is rejected.
  • MUST: Track truth type per content element through the pipeline. Every paragraph in the output document carries its truth type origin.
  • MUST NOT: Publish a projection containing AI-normalized language (Step 3) without human review. The review promotes Derived content to Declared.
  • DESIGN SPACE: Whether Steps 2–5 execute synchronously as a single pipeline invocation or asynchronously with intermediate persistence is an implementation choice.

§13.5 Truth Type Tracking in Provenance

Every section of a projected document carries truth type metadata. This enables document consumers to know the epistemic status of every paragraph.

Authoritative. Content extracted directly from substrate state (Step 2) and system-generated provenance (Step 5). This content reflects what the substrate enforces. It is the projection's backbone — the claims that are structurally backed.

Declared. Human augmentation (§13.6) — explanatory language, regulatory citations, contextual examples. Attributed to a specific human author. Declared content is canonical (used in decisions) but not substrate-extracted — it is a human assertion added to the projection for communication purposes.

Derived. AI-normalized language (Step 3). Derived content MUST be flagged and reviewable. Rendered in a distinct visual style in document output, distinguishing it from Authoritative and Declared content. Derived content that has undergone human review and promotion becomes Declared, following the promotion workflow defined in §6.3.

The per-element truth type tracking closes an architectural loop. A consumer reading a projected authority matrix can distinguish: this delegation scope was extracted from the substrate (Authoritative — trustworthy), this explanatory note was added by a governance officer (Declared — attributed), and this summary paragraph was AI-generated (Derived — needs verification). The epistemic status of governance documentation is no longer implicit.

§13.6 Human Augmentation Rules

Projections render substrate state. Humans may augment projections with additional context, but the augmentation boundary is enforced. Augmentation is communication — it may explain, illustrate, and reference, but it may not govern.

Humans MUST be able to:

  • Add explanatory language (commentary, not governance)
  • Add regulatory citations (external reference, not new constraint)
  • Add contextual examples (illustration, not rule)
  • Add non-enforceable guidance (recommendation, not mandate)

Humans MUST NOT:

  • Alter projected constraints — creates a gap between document and enforcement
  • Add authority not present in the model — creates phantom authority
  • Remove enforcement requirements — creates false assurance

DESIGN SPACE: If a human adds content that contradicts substrate state, the implementation MUST flag it as non-authoritative commentary — visible, attributed, and clearly distinguished from projected content. This maintains the projection principle: the projection can only reveal what exists. Human commentary that contradicts substrate state is not an error — it is a signal that either the commentary is wrong or the substrate needs to be updated. The flag ensures the contradiction is visible rather than silently accepted.

All human augmentation carries truth type Declared. The attribution records which human added the content, when, and under what authority. Augmentation content is versioned — updates to human-added content create new versions, not in-place modifications. The original projected content (Authoritative) is never modified by augmentation.

§13.7 Conformance Coupling

Projections are claims. Conformance tests are proof obligations. A projection is valid only if the substrate actually enforces what the projection asserts.

Without conformance backing, projections could be performative — documents that assert governance without enforcement. The conformance loop prevents this:

  1. A projection expresses how the system claims to operate
  2. A conformance test verifies the substrate actually enforces that claim
  3. If conformance fails, one of three conditions holds: the projection is invalid (document claims something not enforced), the substrate is misconfigured (enforcement gap), or both

Conformance is structural integrity, not domain opinion. It answers "does the system do what the document says?" — not "should the system do this?" Conformance does not test business quality (whether the authority structure is sound), regulatory sufficiency (whether the evidence requirements satisfy a specific regulation), or moral correctness (whether the policy is right).

Each conformance test maps to a formal behavioral invariant (§5), grounding the test in the conservation law architecture rather than informal governance questions.

Table 13.7.1: Invariant-Backed Conformance Tests

Conformance QuestionFormal InvariantProjection Domain(s)Failure Diagnosis
Does authority enforcement exist for the projected authority structure?B5: Authority must be traceableDomain 1Authority chains contain untraceable links — projected authority structure is not enforced
Are events immutable as the projection claims?B3: Evidence requires Truth TypeDomain 3Events lack truth type classification — projected immutability claims are unverifiable
Are evidence requirements enforced as specified?B3 + B1: Evidence requires Truth Type; Work requires CommitmentDomain 3, 4Evidence requirements not tied to work completion — projected evidence standards are decorative
Are overrides logged as the projection asserts?B8: Signals route to authorityDomain 6Override signals not routed to authority chain — projected override logging is incomplete
Are cycles closed only with evidence as projected?B1 + B3: Work requires Commitment; Evidence requires Truth TypeDomain 4Cycles close without evidence or commitment backing — projected lifecycle governance is hollow
Are commitments capacity-backed as projected?B2: Commitment requires CapacityDomain 2Commitments exceed available capacity — projected obligation governance masks overcommitment
Are decisions accountable as projected?B4: Decision requires AccountDomain 1Decisions lack account context — projected decision governance is unauditable
Are constraints binding as projected?B6: Constraint binds primitivesDomain 5Constraints not bound to governed objects — projected access governance is aspirational
Can all governed objects be flagged as projected?B7: All objects flaggableAll domainsSome governed objects lack signal surfaces — projected governance has invisible blind spots
Do IQ resolutions produce decisions as projected?B9: IQ resolution creates DecisionDomain 6Resolved queries produce no decisions or work — projected exception governance captures but never acts

The ten conformance tests cover all ten behavioral invariants. Each test targets a specific governance claim that projections make. When a conformance test fails, the violated invariant identifies the governance failure class — the diagnosis is structural, not interpretive.

Connection to the Governance Pipeline

The conformance coupling completes the three-stage governance pipeline defined in §11.8:

Governance Activation (§12) → populates governance state
Policy Projection (§13.1–§13.6) → renders governance state as documents
Conformance Tests (§13.7) → verifies documents match enforcement reality

Conformance failures feed back into the activation pipeline (§12) as governance gaps. A policy projection that claims enforcement where none exists produces a conformance failure, which registers as a gap in the closure roadmap. The pipeline is self-correcting.

§13.8 Graduated Conformance Levels

Binary conformance (pass/fail) is insufficient. The seven verification types from §6.7 enable graduated conformance: a projection can be verified to different depths depending on its governance requirements.

Table 13.8.1: Graduated Conformance Levels

Conformance LevelVerification Types RequiredMeaning
StructuralEXISTThe substrate has the structures the projection claims exist
OperationalEXIST, COMPLETE, CURRENTThe structures exist, are fully populated, and reflect current state
GovernedEXIST, COMPLETE, CURRENT, APPROVEDThe structures are operationally complete and authority-approved
AuditableEXIST, COMPLETE, CURRENT, APPROVED, CONSISTENT, COMPLIANTFull audit-grade conformance — structures satisfy internal consistency and external standards
SovereignAll 7 types including RATIFIEDHighest assurance — structures have received formal collective endorsement. Reserved for regulatory submissions.

Each projected document carries its conformance level as metadata. A document at Structural conformance asserts less than one at Auditable conformance — the consumer knows the verification depth behind the projection's claims.

Table 13.8.2: Profile-Level Minimum Conformance

ProfileMinimum Conformance LevelRationale
PASStructural (EXIST)Minimal governance surface — structures must exist but full population is not required
BASOperational (EXIST, COMPLETE, CURRENT)Operational governance — structures must be populated and current for day-to-day governance
EASGoverned minimum; Auditable for regulatory documentsFull governance surface — authority-approved structures; regulatory documents require audit-grade conformance

SDK Constraints:

  • MUST: Every projected document carry its conformance level as queryable metadata.
  • MUST: Conformance level computation use only the verification types present in the substrate's verification records for the relevant governance artifacts.
  • MUST NOT: A document claim a conformance level higher than what its verification records support.
  • DESIGN SPACE: Whether conformance level is computed eagerly (on every projection) or lazily (on demand) is an implementation choice.

§13.9 Canonical Document Catalog

Projected documents are organized in three tiers by deployment necessity. The documents listed are illustrative examples — the catalog is extensible. Organizations may define additional projection templates within the structural constraints of the seven domains and four projection types.

Table 13.9.1: Tier 1 — Foundational Documents (Always Projectable)

DocumentDomain(s)Type(s)Substrate Requirements
Organizational Charter1, 2, 5I, IIIntent, Authority, Commitment
Authority Matrix1, 6IIAuthority, Delegation, Override
Policy Manual1, 2, 3, 5, 6I, II, IIIAll core primitives
Standard Operating Procedures4, 6IVWork, Cycle, Authority gates
Role Descriptions1, 5IIAuthority, Capacity, Boundary
Evidence Requirements Guide3, 4IIIEvidence, Truth Type, Confidence

Tier 1 documents are available from any substrate instance with sufficient governance state populated. They constitute the minimum viable governance projection surface.

Table 13.9.2: Tier 2 — Operational Documents (Context-Dependent)

DocumentDomain(s)Type(s)Substrate Requirements
Service Level Agreement2, 3, 4I, IIICommitment, Evidence, Cycle
Engagement Letter1, 2, 5I, IIAuthority, Commitment, Boundary
Work Order Template2, 4III, IVCommitment, Work, Cycle
Compliance Checklist3, 4IIIEvidence, Cycle, Completion
Change Request Form7III, IVLearning, Authority over change
Incident Report Template6III, IVException, Override, Event

Tier 2 documents are available when the substrate instance has operational-level governance state — active work cycles, commitments, evidence production.

Table 13.9.3: Tier 3 — Governance Documents (Regulated/Complex Entities)

DocumentDomain(s)Type(s)Substrate Requirements
Board Resolution Template1, 7IIAuthority (highest level), Change
Audit Trail Report3, 4, 6IIIEvent, Evidence, Override
Risk Register5, 6I, IIIConstraint, Exception, Boundary
Delegation of Authority Schedule1IIAuthority, Delegation
Conflict of Interest Declaration5IBoundary, Constraint

Tier 3 documents are available for EAS profiles or BAS profiles with activated governance frameworks requiring regulatory-grade documentation.

Table 13.9.4: Profile-Tier Alignment

ProfileDefault Projection TierRationale
PASTier 1 (subset)Minimal governance surface — project charter, evidence log
BASTier 1 + Tier 2Operational governance — full foundational and operational documents
EASTier 1 + Tier 2 + Tier 3Complete governance surface including regulatory documents

§13.10 Cross-Domain Dependencies

Policy domains are not independent. They interact through shared primitive references. A change in one domain cascades to others through the substrate. These cascades are not incidental — they are consequences of the conservation laws (§9) that bind the primitive grammar.

Table 13.10.1: Cross-Domain Cascade Mechanisms

Source DomainAffectsCascade MechanismConservation Law Backing
1. Authority & Decision Rights→ 2, 4, 6, 7Authority changes affect who can commit, execute, override, and approve changeB1 (Work requires Commitment) and B2 (Commitment requires Capacity) are Authority-gated — scope preservation (§9.4) ensures delegation changes propagate
2. Commitment & Obligation→ 3, 4New commitments create evidence requirements and work obligationsB1 and B3 create evidence obligations — binding force (§9.4) ensures commitment changes produce downstream requirements
3. Evidence, Record & Truth→ 2, 4, 6Changed evidence standards affect commitment discharge, work completion, and exception resolutionEpistemic status (§9.4) — changed verification standards cascade because B3 binds evidence quality to all consuming primitives
4. Work Execution & Lifecycle→ 2, 3New work creates commitments and evidence obligationsState transformation fidelity (§9.4) — B1 ensures work creates commitment linkage; work execution produces evidence
5. Access, Identity & Boundary→ 1, 6Boundary changes affect authority scope and exception handlingRule universality (§9.4) — B6 ensures constraint changes bind to all affected primitives across authority and exception domains
6. Exception, Escalation & Override→ 1, 7Exceptions may trigger authority review and change processesEmergency signaling (§9.4) — B8 ensures override signals route to authority; B9 ensures resolved exceptions produce decisions
7. Learning, Change & Evolution→ ALLLearning-driven changes cascade to all domains through modified constraints, authority, and evidence requirementsOrganizational direction (§9.4) — adaptation modifies constraints (B6), which bind all primitives; changes require accountable decisions (B4)

Cascade handling. Cross-domain cascades route through the substrate's authority and constraint resolution — the change propagation architecture ensures that ripple effects are properly governed. Projections re-render automatically when source substrate state changes. Stale projections are detectable through provenance timestamps and conformance test re-execution.

SDK Constraints:

  • MUST: The projection engine detect when source substrate state has changed since the last rendering and flag the projection as stale.
  • MUST: Stale projections be visually distinguished from current projections.
  • DESIGN SPACE: Whether stale projections trigger automatic re-rendering or require explicit refresh is an implementation choice. The architecture requires that staleness is detectable, not that re-rendering is automatic.

§13.11 Primitive-to-Domain Mapping

Every domain draws from specific primitives. The full 19×7 matrix grounds projections in substrate structure, ensuring that every governance document traces to specific primitive composition rather than abstract document categories.

Table 13.11.1: Primitive-to-Domain Mapping

PrimitiveTierDomain 1Domain 2Domain 3Domain 4Domain 5Domain 6Domain 7
Intent1
Commitment1
Capacity1
Work1
Evidence1
Decision1
Authority1
Account1
Constraint1
Identifier2
Entity2
Context2
Namespace2
Orientation3
Learning3
Activation3
Interpretation4
Environment Interface4
Cycle5

● = Primary source | ○ = Secondary source

Design Rationale for Key Mappings

Entity → Domain 1 + Domain 5. Entities hold authority (Domain 1) and define boundaries (Domain 5). An Entity is the subject of authority delegation and the unit against which access boundaries are drawn. Every authority assignment targets an Entity; every boundary separates Entities.

Context → all domains (secondary). Context frames every governance operation but is never the primary source for any projection. A projected authority matrix operates within a Context (temporal, spatial, relational) but the authority structure itself derives from Authority and Decision primitives, not from Context. Context provides the "when and where" framing; the other primitives provide the "what and who."

Learning → Domain 7 (primary) + Domain 3 (primary). Learning is the mechanism of Domain 7 (Change & Evolution) — it is the primitive through which the system adapts. Learning also maps to Domain 3 (Evidence, Record & Truth) because the learning process produces evidence about what was learned, why, and with what confidence. The dual primary mapping reflects that organizational learning is simultaneously a change mechanism and an evidence-producing process.

Cycle → Domain 2 + Domain 4. Cycles govern commitment discharge periods (Domain 2) — a quarterly commitment is discharged within a quarterly Cycle. Cycles also govern work lifecycle phases (Domain 4) — work progresses through defined temporal phases. The mapping ensures that temporal governance is projected through both the commitment and work execution surfaces.

Interpretation → Domain 6 + Domain 7. Exception handling (Domain 6) requires interpretation of what went wrong — an AI system's meaning resolution under uncertainty is formalized through Interpretation. Learning (Domain 7) requires interpretation of what changed and why. Both domains consume the structured meaning-resolution that Interpretation provides.

Environment Interface → Domain 5 + Domain 6. Boundaries (Domain 5) are defined against external environments — the Environment Interface is the sensor surface where the substrate's interior meets external domains. Exceptions (Domain 6) often originate from environment changes — external system failures, regulatory shifts, or environmental disruptions that the Environment Interface detects.

No Tier 2-5 metadata for this document.

On this page

§13 Policy Projection Surfaces§13.1 The Projection PrincipleTable 13.1.1: Protocol Layer Placement§13.2 Seven Core Policy DomainsDomain 1: Authority & Decision RightsDomain 2: Commitment & ObligationDomain 3: Evidence, Record & TruthDomain 4: Work Execution & LifecycleDomain 5: Access, Identity & BoundaryDomain 6: Exception, Escalation & OverrideDomain 7: Learning, Change & EvolutionDomain Sufficiency ArgumentTable 13.2.1: Domain Sufficiency ArgumentTable 13.2.2: Domain-to-Symmetry Grounding§13.3 Four Canonical Projection TypesTable 13.3.1: Projection TypesTable 13.3.2: Type Coverage Examples§13.4 Projection PipelineStep 1: Scope SelectionStep 2: Governing Structure ExtractionStep 3: Semantic NormalizationStep 4: RenderingStep 5: Provenance AnnotationTable 13.4.1: Projection Pipeline StagesTable 13.4.2: Actor Participation Per Pipeline Step§13.5 Truth Type Tracking in Provenance§13.6 Human Augmentation Rules§13.7 Conformance CouplingTable 13.7.1: Invariant-Backed Conformance TestsConnection to the Governance Pipeline§13.8 Graduated Conformance LevelsTable 13.8.1: Graduated Conformance LevelsTable 13.8.2: Profile-Level Minimum Conformance§13.9 Canonical Document CatalogTable 13.9.1: Tier 1 — Foundational Documents (Always Projectable)Table 13.9.2: Tier 2 — Operational Documents (Context-Dependent)Table 13.9.3: Tier 3 — Governance Documents (Regulated/Complex Entities)Table 13.9.4: Profile-Tier Alignment§13.10 Cross-Domain DependenciesTable 13.10.1: Cross-Domain Cascade Mechanisms§13.11 Primitive-to-Domain MappingTable 13.11.1: Primitive-to-Domain MappingDesign Rationale for Key Mappings