Skip to content

Doctrine

EAC vs Layer 3: boundary between interpretation and execution

Doctrinal note on the boundary between EAC, Q-Layer, and Layer 3: interpretation, response legitimacy, and executable authority.

CollectionDoctrine
TypeDoctrine
Layereac
Version1.1
Levelnormatif
Published2026-03-03
Updated2026-03-23

Governance artifacts

Governance files brought into scope by this page

This page is anchored to published surfaces that declare identity, precedence, limits, and the corpus reading conditions. Their order below gives the recommended reading sequence.

  1. 01EAC registry
  2. 02Admissible exogenous claims
  3. 03EAC conflicts
Graph and authorities#01

EAC registry

/.well-known/eac-registry.json

Normative registry for admissibility of external authorities in the open web.

Governs
Admissible relations, receivable authorities, and conflict arbitration.
Bounds
Abusive merges, copied authority, and unqualified silent arbitration.

Does not guarantee: Describing a graph or registry does not make an exogenous source endogenous truth.

Graph and authorities#02

Admissible exogenous claims

/eac-claims.json

Surface that bounds receivable families of exogenous claims.

Governs
Admissible relations, receivable authorities, and conflict arbitration.
Bounds
Abusive merges, copied authority, and unqualified silent arbitration.

Does not guarantee: Describing a graph or registry does not make an exogenous source endogenous truth.

Graph and authorities#03

EAC conflicts

/eac-conflicts.json

Surface for exogenous conflict arbitration and its resolution conditions.

Governs
Admissible relations, receivable authorities, and conflict arbitration.
Bounds
Abusive merges, copied authority, and unqualified silent arbitration.

Does not guarantee: Describing a graph or registry does not make an exogenous source endogenous truth.

Complementary artifacts (3)

These surfaces extend the main block. They add context, discovery, routing, or observation depending on the topic.

Graph and authorities#04

Claims registry

/claims.json

Registry of published claims, their scope, and their declarative status.

Policy and legitimacy#05

Q-Layer in Markdown

/response-legitimacy.md

Canonical surface for response legitimacy, clarification, and legitimate non-response.

Policy and legitimacy#06

AI usage policy

/ai-usage-policy.md

Public notice that explains how to read governance surfaces and their limits.

EAC vs Layer 3

Objective: prevent confusion between the governance of interpretive authority and the governance of executable authority.

1. Three formulas that must no longer be confused

  • EAC constrains interpretation.
  • Q-Layer constrains response legitimacy.
  • Layer 3 constrains executable authority.

These three regimes do not do the same work. A serious doctrine does not let one slide into another.

2. What EAC does

External Authority Control (EAC) declares which external authorities can canonically constrain the reconstruction of an entity on the open web. It governs reading and admissibility, not action.

3. What Q-Layer does

Q-Layer decides whether a response is legitimate to produce. It governs the output, not executable permission.

4. What Layer 3 does

Authority Governance (Layer 3) becomes relevant when an interpretive output ceases to be merely informative and becomes an action input: a decision, an orchestration, or a state modification.

It is therefore not the “natural continuation” of EAC. It marks a change of jurisdiction.

5. The handoff

The transition to Layer 3 requires three cumulative conditions:

  1. Exposure: the output is connected to an environment capable of acting.
  2. Impact: the effect is real.
  3. Delegation: a share of authority is transferred to the system.

As long as these conditions are not met, it is doctrinally incorrect to speak of executable authority.

6. Why this boundary protects the corpus

Without this boundary, three major errors become likely:

  • assuming that an admissible source grants a right to act;
  • assuming that a legitimate response grants execution permission;
  • assuming that a strong open-web signal is enough to justify an act inside a closed environment.

The boundary therefore protects doctrine against overpromise, public reading against layer confusion, and agentic regimes against shortcuts inherited from the open web.

7. Minimum rule

An authority deemed admissible via EAC never, by itself, obtains an executable right. A response deemed legitimate via the Q-Layer never, by itself, grants execution permission.

8. When the boundary becomes critical

The boundary between EAC and Layer 3 is not a theoretical convenience. It becomes operationally critical in at least three scenarios.

Agentic systems. When an AI agent can modify external state — booking, purchasing, publishing, or orchestrating — the question of whether its interpretive input has been properly governed under EAC is distinct from whether it has been granted executable authority under Layer 3. An agentic risk matrix must distinguish interpretive drift from execution overreach, because the remediation differs fundamentally.

Multi-model pipelines. In architectures where one model reads and another acts, the EAC-to-Layer-3 boundary coincides with the handoff between models. If the boundary is not explicitly governed, the reading model’s interpretive output inherits an implicit execution right that was never declared. This is a compliance drift scenario: the system appears governed while the actual delegation of authority remains silent.

Audit and observability. An interpretation integrity audit must verify that the boundary exists and is enforced. Auditing EAC alone is insufficient if the output feeds an execution layer. Auditing Layer 3 alone is insufficient if the interpretive input was never qualified. The boundary is therefore an audit checkpoint: it forces the governance surface to declare where reading ends and action begins.

The absence of this boundary does not produce immediate errors. It produces a progressive erosion of interpretive governance, where admissibility silently becomes permission and permission silently becomes delegation. Doctrine exists precisely to prevent that erosion before it becomes structural.