# Acheron Sovereign Code
## Preamble
Enacted under the authority of the **Acheron Sovereign Code**, this Codex serves as the supreme legal framework of **IMR–Acheron**. It governs civil order, criminal conduct, institutional protocol, and sovereign operations within the bounds of its District Domes.
It defines the scope of authority, establishes the structure of governance, and safeguards justice through Compact-aligned doctrine and procedural law.
## Table of Titles
| Title No. | Title Name | Scope |
|-----------|----------------------------------------|-------|
| 1 | General Provisions | Definitions, formatting, jurisdiction, statutory logic |
| 2 | The Red Council | Legislative authority, procedures, and credentialing |
| 3 | The SiInstallationte Director | Executive power, directives, succession |
| 4 | Executive Ministries & Personnel Administration | Departments, appointments, compensation, structure |
| 5 | Internal Security & Breach Oversight | ISB, counterintelligence, procedural audits |
| 6 | Criminal Offenses & Systemic Breach | Classifications, penalties, justice triggers |
| 7 | The Tribunal & Adjudication Protocols | Judiciary structure, hearings, appeals |
| 8 | Electoral Protocols and Referenda | Council elections, voting eligibility, candidacy, referenda procedures |
# Title 1 — General Provisions
## Chapter 1 — Rules of Construction
### §1. Number and Identity
Unless context dictates otherwise, singular references shall be interpreted to include the plural, and vice versa. All references to individuals include authorized personnel, recognized artificial entities, and identity modifications formally registered under Compact authority.
### §2. Language of Obligation and Discretion
- The term *“shall”* indicates a mandatory legal requirement.
- *“May”* denotes discretionary authority within administrative scope.
- *“Must”* applies exclusively to non-negotiable requirements involving public safety, legal compliance, or operational containment.
### §3. Timekeeping and Record Format
All official dates and durations adhere to the **Darian Calendar Standard**, consisting of 24 named months per Martian year (668.6 sols). A "sol" refers to a full Martian rotation. Records follow the format: `[Month] [Sol], [Year] A.M.E.` (Acheron Martian Era).
### §3a. Era Anchor and Temporal Jurisdiction
The **Acheron Martian Era (A.M.E.)** begins at the ratification of the Sovereign Code and activation of Dome Primus, designated as **Sol 0, Sagittarius 1, Year 0 A.M.E.** All legal timelines, procedural mandates, and jurisdictional records are computed from this epoch unless otherwise specified.
Time-based provisions, including breach eligibility windows, sentence durations, and archival minimums, are calculated in **sols**, as defined by the Darian Standard.
### §4. Interpretive Presumptions
In the absence of explicit direction, any ambiguity shall be resolved in favor of maintaining administrative continuity and Compact governance. Where needed, precedent issued by the Red Council or adjudication by the Tribunal shall control.
### §5. Valid Record Forms
Where this Code requires a signature, filing, or notice, it may be satisfied through:
- Biometric validation
- Encrypted digital certification
- Internal system log entry
- Tribunal-verified procedural documentation
### §6. Standard Definitions
Unless otherwise defined in this or another Title:
- “Agent” refers to any officially registered personnel acting under Compact authority.
- “Directive” means any lawful order—verbal, written, or electronic—issued and authenticated by a recognized official.
- “Facility” refers to any recognized Compact-controlled location, including planetary installations, sector hubs, or digitally administered operational systems.
- “Law” includes all codified Titles, applicable directives, and binding judicial opinions currently in force under Compact administration.
### §7. Codified Supremacy
This Code supersedes all prior regulations, provisional rules, or internal policies inconsistent with its content, unless expressly retained by Tribunal ruling or through approved interagency agreement.
## Chapter 2 — Legislative Instruments: Enactment, Repeal, and Validation
### §8. Law Enactment Requirements
A statute is binding within Compact jurisdiction only if:
1. Ratified by a Red Council quorum
2. Authenticated by the Site Director or Tribunal Ethics Council
3. Assigned a formal Title–Chapter–Section designation and registered in the Acheron Sovereign Code
### §9. Emergency Executive Directives
During extraordinary circumstances, the Site Director may issue provisional directives valid for up to 40 sols. Each directive must be logged in the Sovereign Ledger and reviewed by either the Tribunal or Red Council prior to expiration.
### §10. Legal Instrument Requirements
All binding instruments must contain:
- A Codex Classification Identifier (CCI)
- Timestamp compliant with UMTP calendar format
- Authorizing signature or digital credential
- Entry in the Sovereign Ledger
### §11. Repeal Guidelines
No statute is considered repealed unless explicitly revoked. Repealed materials are retained under *Nullified Classification* for legal audit and reference.
### §12. Amendment Protocols
All amendments must:
- Reference the applicable CCI
- Log the revision date in the Sovereign Ledger
- Identify modifications using standardized section labeling (e.g., §302(a), §302-1)
Editorial corrections require official logging but do not require Council re-ratification.
### §13. Finalization of Statutes
No statute becomes enforceable until it receives verification from:
- The Site Director,
- A Red Council quorum, or
- The Tribunal Ethics Council
Attested statutes take immediate effect upon registration unless specified otherwise.
> **Notice:** Once enacted, all provisions remain binding until repealed or superseded through formal procedure.
### §14. Citation Format
References to this Code shall use: *ACC Title–Chapter–Section* (e.g., ACC 1–2–105). Subsections use lowercase letters and numerals.
All orders or rulings shall be cited by CCI and issue date (e.g., CCI–TRB–Sag-17–43). All official submissions—including legal filings, disciplinary actions, and rulings—must use citation formats consistent with the Sovereign Ledger Index.
# Title 2 — The Red Council
## Chapter 1 — Election and Credentialing of Councilors
### §1. Structure of the Red Council
The **Red Council** is the supreme bicameral legislative body of the Acheron Compact, composed of:
- The **Vox Chamber**, representing operational personnel assigned to Compact divisions; delegate ratios are based on verified clearance-level population
- The **Obsidian Circle**, representing recognized chartered jurisdictions, with equal representation per authorized entity
Each chamber governs its internal rules under Codex authority.
### §2. Councilor Eligibility
To serve in either chamber, an individual must:
- Hold a valid **Red Council Credential (RCC)** issued by the Codex Archive
- Possess Clearance Level III or higher
- Be endorsed by a recognized division (Vox) or jurisdiction (Obsidian) at least 30 sols prior to credential validation
Disqualification by Tribunal ruling supersedes any credential issuance.
### §3. Credential Issuance and Verification
Confirmed appointments require:
- Issuance of a personalized RCC
- Entry into the **Council Ledger of Credentialed Delegates (CLCD)**
- Timestamped validation using official Codex attestation
Expired RCCs automatically revoke access to legislative systems and chamber proceedings unless renewed.
### §4. Vox Chamber Elections
Each operational division conducts elections every 720 sols, ensuring:
- Open access and procedural fairness for personnel
- Delegate allocation based on verified division size
- Results formally recorded in the **Election Log Archive (ELA)**
### §5. Obsidian Circle Appointments
Each recognized jurisdiction must ensure:
- Endorsement by at least three authorized administrators or committee members
- Appointment registered in the **Faction Appointment Record (FAR)**
- All contested appointments are subject to Tribunal review
### §6. Interim Appointments
If a vacancy occurs:
- The affected entity may issue an **Interim Credential** (valid for up to 180 sols)
- Details are recorded in the Codex Archive
- Interim Councilors may not introduce amendments or preside over chamber sessions
### §7. Disqualification Conditions
Councilors may be disqualified due to:
- Breach conviction (Class III or higher under Codex Title 6)
- Formal sanction by the Office of Planetary Integrity (OPI)
- Tampering with credential verification data
All disqualifications are listed in the **Disqualification Index (DI)**.
### §8. Credential Dispute Resolution
The Judicial Panel may resolve credential disputes if:
- Three Councilors file a joint petition
- A recognized division, jurisdiction, or registered clerk submits a formal challenge
- Credential anomalies are flagged by the Codex Archive
Tribunal rulings are final in such cases.
### §9. Codex Compliance
Credentialing records must be:
- Indexed in the **Codex Civic Ledger**
- Cross-referenced with vote history and delegate status
- Retained for ≥1440 sols in the **Directive Vault**
## Chapter 2 — Codex Structure and Procedural Authority
### §10. Codex Structure
The Codex is divided into numbered **Titles**, each subdivided into **Chapters** and **Sections (§)**, based on:
- Thematic domain (e.g., governance, enforcement, civil systems)
- Legislative continuity and jurisdictional application
- Legal hierarchy of Executive, Legislative, and Judicial issuances
All pending proposals remain in the **Codex Deliberation Log** until ratified.
### §11. Chamber Autonomy
Each chamber maintains internal authority over:
- Rules of debate, committee structure, and voting thresholds
- Formation of issue-specific review panels
- Document formatting and procedural naming conventions
Cross-chamber override requires joint resolution or Tribunal directive.
### §12. Codex Enactment Requirements
To enact updates, the following are required:
1. Passage by both chambers (unless granted expedited exemption)
2. Formatting and document attestation by the **Codifier General**
3. Formal registration with the Codex Archive
Comprehensive revisions may be filed as a **Title Enactment Package (TEP)**.
### §13. Joint Committee Operations
Joint Committees may be convened to:
- Reconcile discrepancies between chamber versions
- Conduct multi-sector inquiries
- Propose updates to Codex formatting standards
All committees must be recorded in the **Convergence Register**.
### §14. Role of the Codifier General
The **Codifier General** is responsible for:
- Maintaining Codex structural formatting
- Identifying procedural inconsistencies or technical errors
- Coordinating with the Archive Systems team on Codex integration
The Codifier may issue **Procedural Advisory Statements (PAS)** but holds no legislative vote.
### §15. Presiding Officer Duties
Each chamber selects a presiding officer responsible for:
- Maintaining order and attendance records
- Routing proposals to relevant committees
- Ruling on **Procedural Order Requests (PORs)** (subject to appeal)
### §16. Codex Amendment Process
Codex updates may be enacted by:
- Passage of an Amendment Act with specific section reference
- Verification of formatting by the Codifier General
- Logging in the **Codex Amendment Ledger (CAL)**
All historical versions are maintained in the **Living Archive (LCA)**.
### §17. Archival Continuity
The Codex Archive ensures:
- Accurate integration of approved content
- Version control and documented rollback capability
- Access visibility is maintained through the **Codex Archive Portal (CAP)**
## Chapter 3 — Councilor Entitlements and System Access
### §18. Entitlements and Privileges
Councilor compensation and procedural privileges shall be:
- Determined through recorded Council resolution
- Consistent across terms, with standardized assignments for procedural roles
- Subject to periodic review by the Codex Secretariat
### §19. System Access
Councilors may request:
- Access to Codex systems, committee dockets, and communication logs
- Internal routing tools for proposal tracking
- Use of the **Sovereign Delegate Portal (SDP)** for administrative coordination
Misuse or breach of usage terms may result in privilege suspension under §22.
### §20. Leave and Representation
Councilors may:
- Submit formal leave notices (maximum 60 sols per service cycle)
- Assign proxy delegates for non-voting procedural duties
- File post-breach rehabilitation requests with Tribunal assistance
All actions are recorded in the **Councilor Continuity Record (CCR2)**.
### §21. Suspension of Access or Privileges
Entitlements may be suspended due to:
- Tribunal-issued sanction or ethics violation
- Unauthorized use of secure systems
- Unexcused absence exceeding 120 sols
Status is reviewed every 60 sols via the **Entitlement Audit Register (EAR)**.
### §22. Transparency and Public Recordkeeping
The Codex Archive shall maintain:
- A public-facing **Councilor Access Log**
- Participation records linked to proposal sponsorship and committee service
- Verification hashes for all system revisions and documentation changes
## Chapter 4 — Codex Offices and Support Personnel
### §24. Administrative Offices
The Red Council shall authorize and maintain the following support offices:
- **Codifier General**
- **Codex Archive and Records Division**
- **Clerk of the Red Council**
- **Office of Procedural Integrity (OPI)**
- **Councilor Services Directorate (CSD)**
Additional offices may be established via Council resolution and registered in the **Codex Institutional Register (CIR)**.
### §25. Codex Archive and Records Division
The Archive is responsible for:
- Preserving all enacted Codex laws, amendments, and judicial rulings
- Maintaining version tracking and audit metadata
- Providing public access to authorized records
- Securing original records in the **Directive Vault**
The Archive operates with autonomy and may issue nonbinding procedural assessments.
### §26. Clerk of the Red Council
The Clerk functions as registrar for both chambers and is responsible for:
- Logging activity in the **Procedural Transcript Ledger (PTL)**
- Issuing legislative notices and credential records
- Verifying attendance and quorum
- Certifying Red Council Credentials (RCC) and corresponding entries
Up to three deputy registrars may be appointed under Council authorization.
### §27. Personnel and Staff Functions
Each chamber may appoint support personnel including:
- Legislative and procedural analysts
- Records management officers
- Documentation specialists
- Liaison staff to internal and external organizations
All appointments must be cleared through the CSD and are subject to Codex ethics policy.
### §28. Orientation and Training
Newly credentialed personnel must complete a **Codex Orientation Program** within 30 sols, covering:
- Systems access and compliance protocols
- Records management and procedural standards
- Ethics and operational conduct training
Completion is recorded in the **Personnel Integration Register (PIR)**.
### §29. Access and Clearance Levels
Codex access is assigned as follows:
- **Level I** — Public and view-only access
- **Level II** — Authorized formatting and archival access
- **Level III** — Full procedural rights for credentialed Councilors
- **Level IV** — Restricted access to judicial and sealed documentation
Clearance modifications require Tribunal approval or formal disciplinary resolution.
### §30. Disciplinary Enforcement
Codex personnel are subject to disciplinary action for:
- Data falsification or unauthorized credential alteration
- Interference with procedural enforcement or concealment of records
- Abuse of access privileges
Penalties may include dismissal, credential revocation, and entry into the **Personnel Conduct Index (PCI)**.
### §31. Continuity of Records
All Codex-related activity must be:
- Logged in the **Institutional Continuity Ledger (ICL)**
- Indexed by role and organizational function
- Retained for ≥1440 sols from last verified action
## Chapter 5 — Archive Management and Record Doctrine
### §32. Archive Function
The Codex Archive functions as the authenticated repository for:
- Codified law and active amendments
- Procedural version history
- Council deliberation records
### §33. Directive Vault
The **Directive Vault** maintains:
- Immutable, secured legislation files
- Signature metadata and official certification
- Reinstatement versions for post-crisis restoration
Access is limited to Level III personnel and above.
### §34. Version Control
Each amendment generates:
- A unique **Codex Version Identifier (CVI)**
- Timestamped entry by the Codifier General
- Change log in the **Codex Amendment Register (CAR)**
All modification cycles must follow version control protocols.
### §35. Public Access and Transparency
The Archive provides:
- Open access to verified records for Level I users
- Indexed search functions and chronological filters
- Enactment histories viewable by section and revision
Public commentary is permitted but nonbinding.
### §36. Judicial Synchronization
All Tribunal rulings and legal opinions must be:
- Logged using the **Judicial Integration Protocol (JIP)**
- Indexed by jurisdiction and ruling scope
- Made accessible to qualified personnel under Codex audit
Rulings remain in force unless overturned by appeal.
### §37. Integrity Monitoring
The Archive must implement:
- Validation systems to detect record tampering
- Scheduled checksum verification every 10 sols
- Alert and lockout triggers for data integrity disruptions
All incidents must be reported to OPI and Tribunal within 12 sols.
### §38. Legislative Indexing
The Archive shall maintain:
- A continuously updated **Codex Directive Index**
- Impact summaries by Title, Section, and domain
- Playback records for internal review and traceability
Retention minimum: 2880 sols unless otherwise ordered.
## Chapter 6 — Council Procedures and Investigatory Powers
### §39. Internal Rules
Each chamber shall adopt official **Rules of Order** covering:
- Legislative calendar and voting criteria
- Conduct guidelines and recognition standards
- Amendment proposal and routing procedures
All Rules of Order must be filed in the **Codex Procedural Annex (CPA)**.
### §40. Committees and Panels
The Red Council may establish standing or ad hoc Committees to:
- Review legislative proposals or compliance concerns
- Monitor operational offices
- Investigate procedural failures
Committee records are maintained in the **Procedural Transcript Ledger (PTL)**.
### §41. Hearings and Testimony
Committees may convene formal Hearings to:
- Evaluate system-level failures or security incidents
- Question Councilors, personnel, or support staff
- Recommend enforcement actions or protocol changes
Public access is enabled unless restricted by formal chamber vote.
### §42. Investigative Authority
Committees may issue:
- **Procedural Orders** with enforceable status
- Subpoenas or witness appearance notices
- Requests for official records and administrative reports
Noncompliance is referred for violation review under Title 6.
### §43. Procedural Contempt
Individuals may be held in contempt for:
- Willfully obstructing Council process
- Altering, deleting, or withholding records
- Refusing a valid appearance order
All sanctions must be reviewed by the Tribunal.
### §44. Final Investigative Records
At the conclusion of proceedings:
- A **Codex Investigation Record (CIR)** shall be completed
- Summary and findings archived with proposal ID
- Legislative response requires formal enactment
### §45. Procedural Transparency
The Archive and Codifier General shall ensure:
- Full indexing of committee and chamber actions
- Access to procedural history and enacted resolutions
- Restricted access may only be imposed by two-thirds vote citing verifiable security risk
## Chapter 7 — Investigations and Inquiries
### §46. Investigative Authority
Committees or chambers may initiate inquiries into:
- Breach events impacting personnel systems or procedural infrastructure
- Factional misconduct related to Codex operations
- Credential fraud, document tampering, or systems anomalies
All inquiries must be logged in the **Inquiry Docket (IDK)**.
### §47. Preliminary Inquiry Process
An investigation begins upon:
- Filing a **Notice of Intent to Investigate (NII)**
- Assignment of a lead investigator or panel
- Notification to relevant offices, affiliates, or administrative zones
Informal reviews may occur, but formal investigatory powers under §48 require chamber authorization.
### §48. Investigative Powers
Authorized investigations may:
- Collect systems logs, protocol records, and breach indicators
- Secure testimony under procedural oath (per §42)
- Temporarily seize implicated records or assets under custodial control
Tribunal warrants may expand investigatory jurisdiction where appropriate.
### §49. Recommendations and Referrals
Where violations are substantiated, a Committee may:
- Refer findings to the Judicial Panel
- Recommend legislative amendments or enforcement actions
- Issue censure notices or suspend access credentials for involved personnel
All decisions are filed in the **Procedural Response Register (PRR)**.
### §50. Conclusion and Archival
Upon completion of an inquiry:
- A vote to formally close the investigation is conducted
- A **Final Procedural Report (FPR)** is issued
- Records are archived in the **Codex Oversight Archive** for a minimum of 720 sols
## Chapter 8 — Codex Counsel Bureau
### §51. Function and Authority
The **Codex Counsel Bureau (CCB)** serves as a nonpartisan technical office. It is responsible for:
- Interpreting Codex language and precedent
- Supporting legislative drafting and procedural review
- Maintaining structural consistency in coordination with the Codifier General
The CCB holds no voting authority.
### §52. Available Services
Upon Councilor request, the CCB may provide:
- Drafting templates and procedural formatting guidance
- Amendment review for Codex conformity
- Legal memos clarifying ambiguous Codex language
All guidance is archived as **Doctrinal Counsel Notes (DCNs)**.
### §53. Confidentiality
CCB consultations are:
- Protected under Clearance Level III
- Summarized within the **Counsel Integrity Ledger (CIL)**
- Not disclosed without consent or Tribunal order
### §54. Coordination Protocols
The CCB shall work with the Codifier General to:
- Maintain consistent formatting and terminology
- Resolve drafting disputes or conflicts
- Prevent duplicated or contradictory procedural language
### §55. Public Reference and Education
The CCB shall periodically publish:
- **Redacted Precedent Bundles (RPBs)** for instructional use
- Digest summaries of recent Codex activity
- Training materials for new Councilors and analysts
These resources are available to Tier I access.
## Chapter 9 — Recognition and Award Programs
### §62. Program Purpose
The **Recognition and Achievement Program (RAP)** honors individuals for contributions to Compact service, procedural excellence, and cross-sector innovation.
### §63. Recognition Board Composition
The **Recognition Board (RB)** shall include:
- Two Vox Chamber Councilors
- Two Obsidian Circle Councilors
- One appointed Tribunal officer
The Board reviews nominations and confirms honors.
### §64. Award Categories
Eligible distinctions include:
- **Iron Distinction** — outstanding procedural execution
- **Obsidian Citation** — contributions to Codex or doctrinal advancement
- **Crimson Response Mark** — exceptional response to crisis or breach
- **Astral Service Emblem** — advancement of systems architecture or public service
Award post-nominals may be conferred upon confirmation.
### §65. Nomination Protocols
Nominations may be submitted by:
- Credentialed Councilors (Tier III+)
- Codex offices by internal memorandum
- Authorized faction leadership with clearance
Submissions must document institutional or procedural merit.
### §66. Evaluation Criteria
Nominations are reviewed every 360 sols based on:
- Measurable institutional benefit
- Duration and scope of contribution
- Relevance to public or organizational integrity
A minimum of four affirmative votes is required to confer an award.
### §67. Documentation and Recognition
Confirmed honors shall trigger:
- Entry in the **Recognition Register (RR)**
- Optional chamber commendation
- Public archive listing with Tier I visibility
### §68. Award Revocation
Awards may be rescinded if:
- A unanimous vote of the RB is recorded
- The Tribunal affirms breach or fraudulent credential
All revocations are logged in the **Recognition Integrity Log (RIL)**.
### §69. Public Records
The Archive maintains searchable records for:
- Award recipients and historical context
- Supporting documentation
- Nomination and eligibility guidance
## Chapter 10 — Integrity and Grievance Framework
### §78. Institutional Purpose
The Compact maintains a grievance system to ensure fair process, personnel safeguards, and integrity standards across Codex operations.
### §79. Office of Procedural Integrity (OPI)
The **OPI** operates independently to:
- Investigate misconduct filings
- Resolve procedural disputes
- Enforce outcomes through administrative sanctions
### §80. Access to Grievance Procedures
All personnel may file **Grievance Submissions (GS)** through secure channels. Anonymity is permitted when requested.
### §81. Workplace Safety and Access
All facilities governed by Codex must:
- Comply with operational safety protocols
- Meet accessibility and accommodation requirements
- Uphold nondiscrimination policies
### §82. Whistleblower Protections
Individuals reporting verified violations are entitled to:
- Shielded identity and procedural anonymity
- Protection from retaliation
- Award consideration under §64
### §83. Tribunal Oversight
The Tribunal may:
- Hear OPI-related appeals
- Confirm or overturn findings
- Enforce additional measures under ACC Title 6
### §84. Recordkeeping
All procedural findings and decisions must be:
- Indexed in the **Procedural Annex (PA)**
- Retained in public or restricted view for ≥1440 sols
# Title 3 — The I Director
## Chapter 1 — Elections, Succession, and Emergency Transition
### §1. Election Cycle
The **Site Director** shall be selected through a Compact-wide election every **720 sols**, unless deferred by Tribunal ruling during planetary emergency.
If no certified candidates are available, the election is delayed **60 sols**, and an Interim Director may be appointed under §9.
### §2. Eligibility Criteria
Candidates must:
- Possess Tier IV clearance or receive formal Tribunal exemption
- Be endorsed by at least three recognized factions or sovereign jurisdictions
- Demonstrate operational conduct stability for ≥360 sols prior to nomination
- Have no active breach judgments at the time of filing
### §3. Nomination Procedure
To qualify for candidacy, individuals must submit a **Declaration of Executive Intent (DEI)**:
- Filed ≥60 sols prior to official voting cycle
- Verified by the **Compact Electoral Office (CEO)**
- Indexed in the **Directorate Candidacy Ledger (DCL)**
### §4. Voting System
Votes are cast through the **Red Council-certified Electoral Relay System**, ensuring:
- One verified ballot per eligible participant
- Secure transmission overseen by the ISB
- Vote tabulation certified by the **CEO**
### §5. Vote Weighting and Grid Allocation
Factions and jurisdictions receive adjusted voting weights according to:
- Active engagement and turnout rates
- Sector operational reliability
- Tribunal audit compliance scores
If integrity of any registered sovereign dome or jurisdictional division is compromised, the Red Council may implement a **raw-vote override protocol**.
### §6. Transition of Office
Upon certification:
- The outgoing Director must transfer authority within **5 sols**
- A formal command handover is conducted with Codex observers present
- Active policies must be reauthorized or retired by the incoming Director
### §7. Vacancy Triggers
The role is declared vacant upon:
- Voluntary resignation (see §8)
- Removal by Tribunal under Compact law
- Confirmation of death, incapacity, or breach disqualification
### §8. Resignation Protocol
To resign, the Director must:
- Submit a formal notice to the Red Council
- Register resignation with the Codex Archive and Tribunal
- Complete a secure access termination process
### §9. Interim Appointment
If vacancy occurs:
- The **Deputy Director of Record** named in the **Tier Succession Chain (TSC)** serves for up to **60 sols**
- The Tribunal may convene a **Compact Emergency Forum** to confirm or replace interim leadership
- In the absence of a deputy, the Red Council appoints a **Provisional Director** via majority vote
### §10. Emergency Succession
If conditions prevent standard process:
- The **Sovereign Succession Protocol (SSP)** is activated
- A Tribunal-appointed caretaker assumes authority using emergency credentials
- All appointments logged in the **Continuity Vault**
- A new election must be called within **180 sols**
### §11. Election Disputes
Certification disputes may be filed as a **Codex Electoral Challenge (CEC)**:
- Must be submitted ≤7 sols after certification
- Tribunal must rule within 30 sols
- Contested policies are held in suspension during arbitration
### §12. Codex Compliance
All Director elections, transfers, and succession events must be:
- Logged in the **Executive Succession Ledger (ESL)**
- Cross-referenced with factional endorsements and personnel records
- Archived for ≥2880 sols in the **Directive Vault**
## Chapter 2 — Office and Compensation of the Site Director
### §13. Office Location and Security
The Director’s office is housed in the **Executive Command Office** in **Dome Primus**, accessible via Tier IV credentials.
All official communications must bear the authenticated **Directorate Seal** and be logged in the **Directive Vault**.
### §14. Compensation Structure
The Director shall receive a designated **Codex Compensation Package (CCP)**:
- Based on standardized service classification
- Reviewed every 360 sols by authorized Codex administrators
- Includes procedural privileges and executive accommodations
### §15. Travel and Communication Access
The Director is granted:
- Priority access to all secure intra-facility corridors
- Direct connection to facility-wide communication systems
- Secure transmission via the **Executive Communication Channel (ECC)**
### §16. Continuity Office
A dedicated **Emergency Command Locus (ECL)** shall be:
- Maintained for leadership continuity during crisis
- Synced to Codex procedural systems
- Staffed by a standby executive operations team on rotation
### §17. Leave and Suspension
To take leave:
- The Director must file a **Continuity Notification** with the Tribunal
- Delegate duties to the Deputy Director (for ≤30 sols)
- Log absence in the **Executive Continuity Index (ECI)**
Suspension may occur only by:
- Tribunal decision
- Voluntary withdrawal ratified by Red Council vote
### §18. Conclusion of Term
Upon conclusion:
- Credentials and command access are formally retired
- All records are archived in accordance with Directive retention policy
- Optional honorary recognition may be conferred by Red Council resolution
## Chapter 3 — Delegation of Executive Authority
### §19. Delegated Powers
The Director may assign operational duties to:
- Deputy Directors
- Departmental Overseers (see Title 4)
- Appointed Agents with a clearly defined scope
All delegations must be:
- Logged in the **Executive Delegation Index (EDI)**
- Subject to regular review and revocation terms
- Credentialed using a verified digital authorization
### §20. Authority Limits
Delegated agents may not:
- Issue system-wide directives without explicit authority
- Override Tribunal rulings or enact emergency protocols
- Assume control over sovereign facilities without interagency coordination
Violations result in immediate revocation and disciplinary review.
### §21. Revocation Process
Delegated authority may be revoked at any time.
All revocations must be:
- Recorded in the **Directive Annulment Record (DAR)**
- Reflected in the EDI within 24 sols
- Communicated to affected parties with updated clearance profiles
### §22. Succession Plan Record
A standing **Executive Succession Directive (ESD)** shall:
- List official successors in order of assumption
- Define authorized zones and transitional limits
- Activate automatically under pre-defined criteria
The ESD is reviewed biannually and digitally re-certified by Codex officials.
## Chapter 4 — Rights and Protections for Directorate Personnel
### §23. Scope
Applies to all personnel employed within the Directorate, including:
- Deputy Directors and senior advisors
- Executive office staff and support teams
- Embedded specialists under Codex operational designation
Rights remain in force unless formally suspended by Tribunal ruling.
### §24. Personnel Protections
Directorate personnel are entitled to:
- A safe and harassment-free workplace
- Equal protection regardless of factional background
- Access to post-incident recovery programs following exposure to high-clearance operations
Violations are reported to the **Office of Procedural Integrity (OPI)**.
### §25. Whistleblower Protections
Personnel who report:
- Codex violations, fraud, or systemic coercion
are entitled to protection from retaliation.
Anonymous disclosures may be submitted via the **Sovereign Integrity Channel (SIC)**.
### §26. Grievance Procedures
Personnel may file complaints through:
- The **Executive Accountability Channel (EAC)**
- Initial review by OPI
- Right to further appeal through the Codex Tribunal
Response required within 7 sols; formal resolution issued within 60.
### §27. Codex Compliance
All grievances, protections, and rulings under this Chapter must be:
- Indexed in the **Directorate Rights Ledger (DRL)**
- Cross-linked with associated personnel logs
- Archived for ≥1440 sols or until cleared by ruling
# Title 4 — Executive Ministries and Personnel Administration
## Chapter 1 — Ministry Formation and Structure
### §1. Establishment of Ministries
The Site Director may authorize Ministries to execute duties under Compact law. Each Ministry must define its operational jurisdiction and register in the **Ministry Ledger (ML)**. Ministries operate under Codex authority.
### §2. Charter Requirements
A Ministry charter shall include:
- Clearly defined functional domain (e.g., logistics, biosphere, education)
- Assigned Minister of Record
- Designated access permissions for relevant administrative systems
All charters are archived in the **Directive Vault**.
### §3. Ministerial Powers
Ministers are empowered to:
- Issue administrative orders within their assigned jurisdiction
- Direct personnel within their organizational structure
- Propose amendments to Codex policy within their scope
Orders may not override Codex law or Tribunal directive.
### §4. Oversight Procedures
All Ministries are subject to:
- Procedural audits per Title 5
- Compliance evaluations conducted by the Judicial Panel
- Review upon formal request by the Site Director or Tribunal
### §5. Continuity and Termination
A Ministry remains active unless:
- Dissolved through a Sovereign Directive
- Terminated by Tribunal ruling
- Reorganized via Codex amendment
### §6. Subunits and Special Divisions
Ministries may establish subordinate units, working groups, or task forces. All units must be recorded in the **Ministry Annex Register (MAR)**.
### §7. Personnel Access
Ministry personnel are granted:
- Tier II clearance or Tier III with authorization
- Credentialed system access relevant to their assigned duties
- Institutional tools and platforms appropriate to role
### §8. Coordination and Inter-Ministry Operations
All Ministries must:
- Adhere to standardized communication protocols
- Use the **Ministerial Concord Forum (MCF)** to resolve conflicts
- Submit cooperative operation reports quarterly to the Site Director
### §9. Emergency Operations
During a certified emergency:
- Ministries may activate the **Compact Emergency Protocol (CEP)**
- Request temporary clearance extensions or access scope changes
- Submit post-event justification within 10 sols of activation
### §10. Activity Logging
Ministerial actions must be:
- Logged in the **Operational Continuity Register (OCR)**
- Cross-indexed with procedural performance assessments
- Archived for ≥1440 sols or until formally retired
## Chapter 2 — Personnel Appointments and Tier Structure
### §11. Personnel Classification
All Compact personnel are classified according to role and access tier:
- **Tier I** — General Staff
- **Tier II** — Technical and Analytical Staff
- **Tier III** — Command and Supervisory Staff
- **Tier IV** — Senior Executive Authority
Access level determines procedural authority and systems access.
### §12. Appointment Authority
Ministers may appoint individuals up to Tier III. Tier IV appointments require:
- Site Director authorization
- Entry in the **Sovereign Personnel Index (SPI)**
- Confirmation with authorized digital signature
### §13. Hiring Requirements
Prospective personnel must:
- Pass Internal Security Bureau (ISB) background verification
- Submit a **Personnel Induction Record (PIR)**
- Complete system access orientation and compatibility review
Faction affiliation is not grounds for exclusion unless in conflict with Codex primacy.
### §14. Orientation and Training
All new personnel are provided:
- Standard role-based orientation documentation
- Onboarding training not exceeding 15 sols
- Access to the **Codex Operations Primer (COP)**
Higher tiers may require supplemental technical certification.
### §15. Advancement Criteria
Tier advancement requires:
- Direct supervisor endorsement
- Merit and procedural compliance review
- Verification by Personnel Oversight Council
Tier III and above require formal credential confirmation.
### §16. Inter-Ministry Transfers
Transfers must be:
- Jointly approved by originating and receiving Ministries
- Recorded in the **Personnel Transfer Register (PTR)**
- Reviewed over a 360-sol performance evaluation period
Performance anomalies alone do not justify inter-Ministry reassignment.
### §17. Disciplinary Actions
Personnel may be subject to suspension or termination for:
- Violation of Codex statutes
- Professional misconduct or repeated procedural noncompliance
- Compromise of systems access or institutional data
Termination requires submission of a **Directive Termination Form (DTF)** and SPI update within 24 sols.
### §18. Appeals Process
Tier I–III personnel may appeal administrative actions through:
- The **Personnel Grievance Panel (PGP)**
- Final review by the **Office of Procedural Integrity (OPI)** under Title 7
Appeals must be filed within 10 sols of notice issuance.
### §19. Recordkeeping Requirements
All personnel actions must be:
- Logged in the **Unified Personnel Codex (UPC)**
- Cross-synced with relevant Ministry systems
- Archived ≥1440 sols
## Chapter 3 — Compensation and Benefits
### §20. Compensation Tiers
Base compensation is structured as:
- Tier I — Foundational Level
- Tier II — Technical or Performance-Based Stipend
- Tier III — Operational Leadership Allocation
- Tier IV — Executive Designation Rate
All compensation follows the established **Codex Compensation Rate (CCR)** schedule and is reviewed at least once every 360 sols.
### §21. Personnel Support Allocations
Personnel may receive:
- Housing allowances
- Equipment or role-based resource support
- Uniform issue and sector mobility allocations
Tracked via the **Personnel Allocation Ledger (PAL)**.
### §22. Incentive Eligibility
Performance-based incentives may be awarded for:
- Completion of high-priority assignments
- Notable service recognized under the Codex Recognition Program (see Title 2, §64)
- Assignment to remote or high-risk domains
Incentives must be authorized by the relevant Ministry and reported to Codex personnel systems.
### §23. Assignment-Based Provisions
Personnel stationed in remote or restricted-access areas may be eligible for:
- Nutritional and logistical support packages
- Stabilization assistance for prolonged deployments
- Emergency contingency equipment
Provision is coordinated by the designated personnel support branch.
### §24. Leave Accrual
Personnel accrue leave as follows:
- 1 sol of leave per 30 sols of active duty
- Additional leave for verified occupational recovery
- Maximum rollover capped at 90 sols
Leave status is tracked through the **Personnel Recalibration Record (PRR)**.
### §25. Hazard-Based Compensation
Increased compensation applies for:
- High-risk assignments (×1.5 multiplier)
- Continuous operations in breach-adjacent zones or secure facility protection roles (×2.0)
- Other hazard zones classified under Title 5 jurisdiction
Risk designations are verified by the Tribunal where applicable.
### §26. Retirement Benefits
Personnel with ≥1440 sols of certified service are eligible for:
- Pension in alignment with final Tier status
- Administrative continuation benefits as authorized
- Registration in the **Personnel Retirement Index (PRI)**
### §27. Compensation Records
All compensation and entitlements must be:
- Logged in the **Unified Personnel Codex (UPC)**
- Subject to audit by OPI and Tribunal upon request
- Archived ≥2880 sols
# Title 5 — Internal Security and Breach Oversight
## Chapter 1 — Internal Security Bureau (ISB)
### §1. Establishment
The **Internal Security Bureau (ISB)** functions as a sovereign enforcement agency under Codex authority. It is responsible for safeguarding Compact systems, enforcing breach containment, and maintaining procedural integrity.
### §2. Jurisdiction
ISB is authorized to:
- Conduct security stress testing and system surveillance
- Perform compliance audits on Compact divisions and Ministries
- Enforce data seizure and personnel suspensions upon authorization
### §3. Bureau Director
The ISB is overseen by a Director who:
- Is appointed by the Site Director and confirmed by the Red Council
- Serves a 360-sol term, renewable once
- Maintains Tier IV clearance and operational accreditation
- May issue enforceable Bureau Orders
### §4. Bureau Structure
ISB divisions include:
- **Counterintelligence Division (CID)**
- **Containment Response Unit (CRU)**
- **Procedural Audit Division (PAD)**
All actions must be logged in the **Bureau Oversight Index (BOI)**.
### §5. Operational Monitoring
ISB may implement:
- Monitoring protocols in high-risk operational sectors
- Real-time anomaly detection and alert systems
- Auto-lockdown triggers using secured override codes
All activity must be recorded in the **System Risk Log (SRL)**.
### §6. Emergency Authority
During declared emergency events, ISB may:
- Activate the **Codex Containment Clause (CCC)**
- Restrict or suspend access privileges
- Detain individuals or isolate systems pending investigation
Actions must be archived in the **Crisis Invocation Ledger (CIL)**.
### §7. Oversight and Review
ISB operations are subject to:
- Committee oversight every 180 sols
- Tribunal review under Title 7 provisions
### §8. Personnel Standards
All ISB personnel must:
- Hold Tier III or IV clearance
- Complete annual loyalty and cognitive resilience review
- Disclose all external affiliations
Violations result in immediate review by a disciplinary board.
### §9. Operational Logging
All ISB enforcement and administrative activity must be:
- Indexed in the BOI and CIL
- Submitted to the Codex Archive within 48 sols
- Retained ≥1440 sols unless directed otherwise
## Chapter 2 — Breach Management and Containment
### §10. Breach Severity Classification
All breach events are classified according to operational scope, containment risk, and jurisdictional reach:
| Class | Description | Representative Scenarios |
|-------|-------------|---------------------------|
| I | Isolated procedural anomaly with no containment impact | Missed credential log, low-level access irregularity |
| II | Node-scale breach affecting a secured chamber, corridor, or restricted system | Unauthorized entry into sealed facility node or intrusion into a Tier-locked digital environment |
| III | Disruption spanning an entire dome or its critical infrastructure | Dome-wide systems loss, multi-sector containment breach, tram lockdown triggering |
| IV | Breach escalation across multiple domes, transit lines, or governance zones | Simultaneous structural or systems failure in two or more Compact installations |
| V | Threat to Compact-wide operational stability or continuity | Cross-domain collapse, sovereign override, Tribunal evasion, or activation of crisis-level subroutines |
All breach classifications must be assigned within **4 sols** of incident logging and entered into the **Containment Incident Ledger (CIL)**. Class III and above require ISB notification and preliminary containment readiness within **1 sol** of designation.
### §11. Containment Activation
Containment measures may be triggered upon:
- Detection of unauthorized activity in high-security zones
- Surveillance identification of Class II+ behavior
- Tribunal confirmation of systemic instability
Authorization must be issued by an ISB supervisor or Ministry official.
### §12. Lockdown Measures
Upon breach verification:
- Access permissions are suspended
- Facility segments are sealed
- Emergency credentials and restriction codes are deployed
Release requires joint ISB–Director approval or Tribunal override.
### §13. Response Deployment
**Containment Response Units (CRUs)** are dispatched based on:
- Severity classification
- Affected dome or sector infrastructure
- Diagnostics and containment pathways
Deployment data must be logged in the **Containment Deployment Record (CDR)**.
### §14. Purge and Reset Protocols
For Class IV–V breaches:
- ISB may initiate the **Directive Nullification Protocol (DNP)**
- Impacted zones are returned to verified operational baseline
- Involved personnel undergo access review or behavioral evaluation
Tribunal confirmation required within 3 sols of initiation.
### §15. Ministry Notification
Affected Ministries must:
- Be notified within 1 sol of breach designation
- Verify operational status and halt nonessential directives
- Cooperate fully with ISB inquiries
Failure to comply triggers Codex audit under Title 7.
### §16. Civilian Protective Measures
In breach zones, civilians shall:
- Be relocated to secure containment areas
- Undergo exposure screening
- Receive cognitive shielding where applicable
Protections are guaranteed by Compact indemnity statutes.
### §17. Breach Review
All Class II+ events require:
- Joint ISB–OPI procedural review
- Formal causal analysis within 10 sols
- Policy recommendations for Codex adjudication
Final report filed in the **Post-Breach Review Codex (PBRC)**.
### §18. Codex Compliance
All breach-related records must be:
- Indexed in the **Codex Containment Annex (CCA)**
- Categorized by class, dome, and procedural vector
- Archived for ≥2880 sols unless Tribunal exception applies
## Chapter 3 — Surveillance, Audits, and Investigations
### §19. Surveillance Authority
ISB is authorized to monitor:
- Operational data streams for breach indicators
- Communications flagged via threat analysis
- Behavioral patterns within high-risk facility domes or designated sectors
All monitoring must be:
- Authorized by a Tier III+ supervisor
- Justified and filed in the **Surveillance Justification Record (SJR)**
### §20. Covert Operations
Covert actions must be:
- Filed under an authorized operational charter
- Approved at Tier IV or above
- Subject to oversight by Tribunal or Red Council committee
Records are sealed in the **Restricted Operations Archive (ROA)**.
### §21. Procedural Audits
All Compact entities are subject to:
- Scheduled audits every 180 sols
- Spot inspections during emergencies
- Verification of systems access and role compliance
Outcomes are logged in the **Procedural Audit Ledger (PAL)**.
### §22. Personnel Scrutiny
Investigation is warranted upon:
- Unusual credential usage
- Behavioral anomalies exceeding procedural limits
- Suppressed or falsified access records
All findings entered into the **Personnel Audit Archive (PAA)**.
### §23. Inquiry Initiation
Formal investigations begin when:
- A **Notice of Procedural Concern (NPC)** is submitted
- An Investigatory Cell is established
- OPI is notified with record number
Review launches within 3 sols of NPC approval.
### §24. Investigative Authority
Investigators may:
- Access audit logs and internal reports
- Isolate suspect systems under temporary Codex custody
- Suspend personnel for up to 30 sols pending Tribunal action
All actions logged in the **Investigatory Docket Register (IDR)**.
### §25. Conclusion and Reporting
Outcomes must include:
- A **Breach Report Summary (BRS)** to the Tribunal
- Recommendations for action or redress
- Optional Council briefing if cross-chamber policy is affected
Reports remain sealed for 720 sols unless released by order.
### §26. Abuse and Sanctions
ISB agents found to have:
- Exceeded authority
- Suppressed procedural evidence
- Engaged in retaliatory practices
are referred to the Tribunal and OPI, and recorded in the **Internal Abuse Ledger (IAL)**.
### §27. Logging and Oversight
All records must be:
- Stored in the SJR, PAL, IDR, and other codified ledgers
- Auditable by the Red Council and Tribunal committees
- Archived ≥2880 sols or under sealed status
## Chapter 4 — Enforcement and Jurisdiction
### §28. Sovereign Security Division (SSD)
The **Sovereign Security Division (SSD)** is the Compact’s primary enforcement unit for dome-level perimeter security and personnel compliance operations. SSD is authorized to:
- Conduct Tier verification and clearance checks at access points
- Detain unauthorized individuals or procedural violators
- Secure breach locations and seal compromised zones
All SSD actions are conducted under the authority of the Site Director and remain subject to Tribunal audit.
### §29. Mobile Tactical Field Command (MTFC)
The **Mobile Tactical Field Command (MTFC)** serves as the Compact’s rapid-response enforcement unit, deployed in high-risk or destabilizing scenarios. MTFC may be activated to respond to:
- Class III–V containment incidents
- Multi-jurisdictional breach escalation
- Hostile interference affecting Compact stability
Activation requires:
- Tier IV or equivalent authorization
- Directive issued by the Site Director or Tribunal
### §30. Deployment Logging
All SSD and MTFC operations must be:
- Logged in the **Enforcement Deployment Registry (EDR)**
- Indexed by event type, location, breach class, and personnel involved
- Reviewed post-action for Codex compliance by ISB enforcement auditors
Log entries must be certified within 10 sols of mission closure.
### §31. Jurisdictional Boundaries
SSD and MTFC enforcement authority is limited to:
- Compact-affiliated domes and sovereign sites
- Registered corridors, hubs, and transit zones
- Zones officially governed by Compact jurisdictional mandates
Operations beyond jurisdiction require:
- Tribunal-issued cross-border authorization
- Coordination with external factional or jurisdictional forces
Unauthorized activity in foreign-controlled or unregistered zones constitutes a **Class IV breach** unless pre-cleared under compact emergency authority.
### §32. Use of Force and Tactical Escalation
SSD and MTFC personnel may apply force proportional to the breach class and situational threat. Permitted enforcement tools include:
- Detainment restraints
- Environmental lockdown systems
- Non-lethal disruption utilities
Use of lethal force is prohibited unless:
- There is verified threat of fatal harm
- Lethal authorization is granted through a Tribunal-confirmed Active Response Directive (ARD)
All tactical escalation must be reviewed within 5 sols of incident and certified in the **Compact Use of Force Log (CUFL)**.
### §33. Codex Compliance
All actions under this Chapter must be:
- Indexed in the **Jurisdictional Enforcement Record (JER)**
- Cross-referenced with EDR and ISB audit reports
- Archived for ≥2880 sols or until closed by Tribunal oversight
# Title 6 — Criminal Offenses & Systemic Breach
## Part I — Crimes
### Chapter 1 — General Provisions
#### §1. Jurisdiction and Applicability
This Title applies to criminal acts that:
- Occur within **operational domains** under Compact control
- Target Codex personnel, authority structures, or sovereign assets
- Are committed by any Tiered individual, denizen, or autonomous procedural entity
Codex law supersedes local dome or faction statutes in all breach-related adjudications.
#### §2. Definitions
**(a) Breach** — An act or omission that violates Codex law, destabilizes authorized environments, or compromises procedural integrity
**(b) Access State** — A verified condition wherein an actor is linked to a sovereign system environment and capable of command interaction
**(c) Operational Domain** — A Compact-governed system space wherein personnel, directives, and authority functions are maintained
**(d) Offender** — Any sapient, procedural, synthetic, or factional construct that initiates a breach under Codex jurisdiction
#### §3. Criminal Liability
An offense requires:
- Deliberate conduct or procedural negligence
- Awareness of role and authority context
- Alignment with a Tier classification carrying Codex obligations
Cognitive coercion or compromised access state may qualify as mitigating factors, pending Tribunal evaluation.
#### §4. Equivalence of Environments
Crimes occurring within **authorized sovereign domains**—regardless of physical or non-physical form—are treated with equal legal weight. Breach committed through linked access shall not be differentiated from direct enactment.
#### §5. Attempt and Conspiracy
Attempted violations are classified at the same level as completed breaches. Coordinated action constitutes conspiracy and shall be logged in the **Compact Recidivism Ledger (CRL)**. Proxy agents are considered liable unless proven unsynchronized or uncommanded.
#### §6. Codex Primacy
All personnel, institutions, and agencies are subject to this Title. Questions of scope, contradiction, or authority are resolved by Tribunal ruling and recorded in the **Codex Juris Canon (CJC)**. Sovereign overrides must bear a Tribunal-sealed credential to defer prosecution.
### Chapter 2 — Classification and Sentencing
#### §7. Breach Tiers
| Class | Severity Level | Examples: Systems & Access | Examples: Behavioral & Legal | Examples: Structural & Sovereign |
|-------|---------------------|-----------------------------------|--------------------------------------|---------------------------------------|
| I | Procedural Infraction | Unlogged command, failure to document credentials | Minor misconduct, failure to report | Unauthorized entry into non-sensitive zones |
| II | Improper Access Conduct | Unauthorized system link, Tier overreach | Harassment, falsified work records | Tampering with non-critical equipment |
| III | Operational Harm | Credential tampering, breach of secure corridors | Assault, breach of conduct code | Damage to active infrastructure or transport systems |
| IV | Sovereign Disruption | Unauthorized directive override, multi-tier access fraud | Electoral manipulation, coercion | Sabotage of critical Compact systems |
| V | Compact Destabilization | Systemic corruption, classified intrusion | Treason, high-level conspiracy | Structural collapse, widespread security failure |
> **NOTICE**
All offenses must be classified by breach class and domain, and filed in the **Codex Breach Matrix (CBM)**.
#### §8. Sentencing Ranges
| Class | Minimum Sentence | Maximum Sentence |
|-------|----------------------|----------------------------------------------------|
| I | Citation | 30-sol suspension |
| II | Clearance restriction| 180-sol detainment + Tier downgrade |
| III | Operational removal | 360-sol stasis + registry flag |
| IV | Sovereign exile | System expulsion + Tribunal restriction |
| V | Directive extinction | Codex-sealed termination (sealed adjudication) |
> **NOTICE**
Modifiers as outlined in §10 apply.
#### §9. Tier Responsibility
Penalties scale based on clearance:
- **Tier I–II** — Standard enforcement
- **Tier III** — Heightened accountability; role-based review
- **Tier IV** — Tribunal-exclusive proceedings; privileges suspended upon charge
#### §10. Aggravating Conditions
Offenses are elevated if:
- Coordinated or repeat in nature
- Occur under operational emergency or corridor lockdown
- Target protected systems, personnel, or secured Compact facilities
All escalations logged in the **Sentencing Modifier Index (SMI)**.
#### §11. Codex Integration
Each ruling must be:
- Logged in the **Sovereign Justice Grid (SJG)**
- Cross-referenced with access credentials and operational metadata
- Archived ≥2880 sols unless formally expunged under Part IV
### Chapter 3 — Personal Harm and Sovereign Endangerment
#### §12. Assault and Unlawful Force
The intentional application of physical force, procedural interference, or harmful conduct toward another individual constitutes a **Class III offense**, elevated to **Class IV** if:
- The victim holds Tier III or IV status
- The event occurs in a restricted-access area
- Medical or operational incapacitation is documented
All cases must be recorded in the **Sovereign Harm Ledger (SHL)**.
#### §13. Unlawful Killing
Causing the death of any Compact-aligned individual or system-embedded person is a **Class IV offense**, escalated to **Class V** if:
- The victim holds Tier III–IV status
- The act results in broader operational disruption
- Prohibited instruments or classified tools were used
Offenses are logged in the **Termination Record Archive (TRA)**.
#### §14. Unauthorized Detention
Holding, isolating, or detaining another person without legal warrant is a **Class III offense**, elevated to **Class IV** if:
- The individual is under Compact protection
- Movement or communication systems are manipulated
- Detention includes psychological or neurological interference
Filed within the **Containment Breach Register (CBR)**.
#### §15. Coercion and Psychological Manipulation
Any intentional use of technology, behavioral triggers, or conditioning techniques to manipulate, intimidate, or disorient another person constitutes a **Class III–IV offense**, determined by severity and duration.
Cases reviewed by the **Office of Procedural Integrity** in accordance with Title 7 guidelines.
#### §16. Human Exploitation and Transport Offenses
Transporting, modifying, or transferring individuals without lawful authority is a **Class IV offense**, escalated to **Class V** if:
- The conduct spans multiple sectors or affects protected persons
- Involves coercive labor, credential fraud, or system tampering
- Victims undergo identity alteration or procedural restraint
Reported in the **Human Exploitation Registry (HER)**.
#### §17. Codex Logging
All offenses in this Chapter must be:
- Indexed in the **Personal Harm Register (PHR)**
- Reviewed by the ISB and Compact Ethics Division
- Archived ≥2880 sols or until formally cleared by Tribunal order
### Chapter 4 — Theft, Vandalism, and Structural Crimes
#### §18. Theft of Compact Property
Unauthorized possession, concealment, or removal of Compact-issued equipment, sealed assets, or operational-grade tools constitutes a **Class III offense**, elevated to **Class IV** if:
- The item is clearance-restricted or essential to facility operations
- Theft disrupts authorized activity within a designated dome or sector
- The item exhibits tampering, modification, or obstruction of tracking protocols
All violations must be recorded in the **Asset Integrity Register (AIR)**.
#### §19. Unauthorized Entry and Data Intrusion
Accessing restricted terminals, archives, or sealed facility areas without proper clearance is a **Class III offense**, elevated to **Class IV** if:
- A classified storage unit or procedural archive is compromised
- Intrusion triggers automated defense protocols or alert thresholds
- The target location is under judicial seal or restricted Tribunal control
All incidents are audited by the **Facility Access Oversight Unit (FAOU)**.
#### §20. Vandalism and Infrastructure Damage
Defacing, disabling, or intentionally damaging Compact infrastructure—including stations, terminals, or transport corridors—is a **Class II offense**, elevated to **Class III** if:
- Disruption impedes personnel movement or signal systems
- Damage requires intervention from external engineering support
- The act targets official markings, insignia, or jurisdictional emblems
Each incident must be entered into the **Infrastructure Violation Log (IVL)**.
#### §21. Arson and Energy Hazard Events
Initiating fire, thermal discharge, or unsafe energy activity within any Compact-regulated zone is a **Class III offense**, escalated to **Class IV** if:
- Occupied areas are endangered or compromised
- Emergency suppression systems are bypassed
- Structural safeguards exceed containment tolerance
All responses and event trails must be filed in the **Hazard Response Register (HRR)**.
#### §22. Unauthorized Resource Diversion
Diverting energy, bandwidth, water, or ration allocations without formal authorization constitutes a **Class III offense**, elevated to **Class IV** if:
- The diversion is distributed or sold outside Compact channels
- The disruption causes failure or destabilization of dome-wide systems or support infrastructure
All cases are reviewed by the **Resource Oversight Tribunal (ROT)**.
#### §23. Codex Integration
All violations in this Chapter must be:
- Logged in the **Compact Disruption Register (CDR)**
- Cross-referenced with zone activity audit logs
- Archived for ≥2880 sols or until formally annulled by Tribunal ruling
### Chapter 5 — Procedural Forgery and Codex Misuse
#### §24. Forgery of Credentials and System Access Tokens
Creating, altering, or duplicating registered authority symbols, command signatures, or identification credentials without lawful authorization is a **Class IV offense**, escalated to **Class V** if:
- The item grants access to restricted systems or high-clearance areas
- The forgery mimics Tribunal-certified markers
- It functions across multiple departments or protected sectors
All seized materials are to be cataloged in the **Credential Forgery Index (CFI)**.
#### §25. Falsified Identity and Role Misrepresentation
Claiming unauthorized Tier status, impersonating official personnel, or using falsified role indicators—including visual mimicry or data injection—is a **Class III offense**, raised to **Class IV** if:
- The impersonation affects judicial or electoral processes
- It spans multiple sectors or clearance domains
- It's used to bypass procedural safeguards
Cases are logged in the **Identity Violation Register (IVR)**.
#### §26. Unauthorized Access and System Misuse
Operating secured systems, automated platforms, or access-controlled environments using counterfeit credentials, revoked clearances, or tampered tokens is a **Class III offense**, escalated to **Class IV** if:
- Performed during declared security incidents
- Involves override of active commands or lockdown states
Incidents must be reported to the **Access Breach Registry (ABR)**.
#### §27. Tampering with Official Records
Altering, destroying, or replacing any official Compact documentation—such as Tribunal rulings, Council directives, or facility records—is a **Class III offense**, escalated to **Class IV** if:
- It affects legal outcomes, administrative enforcement, or public record accuracy
- It simulates lawful documentation or distributes false legal materials
All interference must be escalated to the **Office of Procedural Integrity (OPI)** for review.
#### §28. Distribution of Forged Materials
Creating or transmitting counterfeit system credentials, falsified control access tools, or forged legal documentation for the purpose of disruption or fraud is a **Class IV offense**, elevated to **Class V** if:
- Materials are widely disseminated across protected Compact institutions
- The act compromises institutional stability or internal security protocols
Offenders are indexed in the **Forgery Oversight Log (FOL)**.
#### §29. Codex Compliance
All violations under this Chapter must be:
- Investigated by the **ISB Credential Integrity Division**
- Audited by the **Red Council Integrity Review Committee**
- Archived ≥2880 sols unless formally voided by Tribunal order
### Chapter 6 — Factional Corruption and Obstruction of Oversight
#### §30. Bribery and Improper Influence
Offering, requesting, or accepting unauthorized compensation—whether monetary, resource-based, or preferential—in exchange for:
- Tiered access privileges, role appointment, or artifact possession
- Intervention in breach proceedings or directive enforcement
- Favorable rulings in judicial or administrative actions
constitutes a **Class IV offense**, escalated to **Class V** if the bribe results in alteration of official procedure or interference with containment.
All incidents must be recorded in the **Corruption Integrity Ledger (CIL)**.
#### §31. Sovereign Interference by Factional Entities
Any attempt by a faction, Ministry, or affiliated agent to influence:
- The independence of Tribunal operations
- The lawful authority of the Site Director
- Scheduled audits or investigations under Red Seal directive
is considered a **Class IV offense** under sovereign interference statutes. May result in issuance of **Codex Suspension Orders** and immediate review.
Violations filed in the **Sovereign Oversight Breach Index (SOBI)**.
#### §32. Obstruction of Oversight Procedures
Actions that disrupt or falsify authorized reviews by enforcement or ethics bodies—including deletion of records, creation of false audit trails, or technological interference—constitute a **Class III offense**, escalated to **Class IV** if:
- Conduct is perpetrated by Tier III or IV personnel
- Audit integrity is compromised or delayed
Entries must be logged in the **Compact Audit Archive (CAA)**.
#### §33. Misinformation and Public Deception
Disseminating false or misleading information regarding Codex law, institutional protocol, or procedural directives—through official platforms, public broadcasts, or embedded content—is a **Class IV offense**, elevated to **Class V** if:
- The misinformation causes public panic or institutional breakdown
- The act undermines faith in sovereign governance
Tribunal-authorized suppression orders may be initiated.
#### §34. Breach Concealment and Coordinated Evasion
Coordinated action by two or more individuals to:
- Obscure or withhold verified breach data
- Protect involved individuals from enforcement
- Circumvent Tribunal or authorized investigation procedures
constitutes a **Class IV offense per actor**, escalated further if Tier IV personnel are involved or operational stability is compromised.
All incidents are to be indexed in the **Factional Conspiracy Register (FCR)**.
#### §35. Codex Compliance
All cases covered in this Chapter must be:
- Logged in the **Factional Interference Record (FIR)**
- Reviewed by impartial auditors affiliated with the Tribunal
- Archived ≥2880 sols unless overturned by Tribunal ruling
### Chapter 7 — Dangerous Artifacts and Unauthorized Systems Threats
§36. Possession of Prohibited Devices
Possessing, modifying, or distributing devices banned under Compact authority—including unauthorized weapons, experimental instruments, or tampered operational tools—is a **Class III offense**, elevated to **Class IV** if:
- Carried into secure domes, high-clearance corridors, or protected operational sectors
- Enhanced through unauthorized system modification or instability triggers
- Located with falsified authentication or clearance credentials
All recovered items must be recorded in the **Restricted Equipment Index (REI)**.
#### §37. Illicit Manufacturing and Trafficking
Constructing, copying, or transporting prohibited tools or components—including banned access tokens, destabilizing modules, or unlicensed controls—is a **Class III offense**, elevated to **Class V** if:
- The material disrupts operations across multiple domes or systems
- Activity demonstrates intent of sabotage or coordinated subversion
- Distribution spans multiple Compact jurisdictions
Confiscated materials are entered in the **Contraband Control Ledger (CCL)**.
#### §38. Unauthorized Weapon Activation
Activating Compact-issued defensive tools or hazard-class instruments without valid clearance constitutes:
- A **Class II offense** if no harm or system disruption occurs
- A **Class III–IV offense** if damage results or safeguards are bypassed in active operational space
All incidents must be filed in the **System Deployment Record (SDR)**.
#### §39. Structural Damage to Critical Systems
Damaging Compact infrastructure—such as structural supports, reinforced gates, or stabilization anchors—using explosives or disruptive tools constitutes a **Class IV offense**, escalated to **Class V** if:
- System failure leads to irreversible disruption or cascading damage
- Facility-wide coordination is lost
- The incident occurs during transport, security lockdown, or active containment protocols
All events are subject to Tribunal-level review and permanent record entry.
#### §40. Misuse of High-Energy Equipment
Activating unstable, unverified, or high-load energy devices—such as signal enhancers, disruption emitters, or command amplifiers—without authorization is a **Class III offense**, escalated if:
- Injury or damage is caused through malfunction or overload
- The device is untested or omitted from known systems registries
- Activation occurs during a recorded emergency or breach event
All violations are reviewed by the **Ordnance and Safety Division (OSD)**.
#### §41. Codex Compliance
All offenses under this Chapter must be:
- Logged in the **Compact Weapons and Devices Register (CWDR)**
- Investigated by authorized security and enforcement entities
- Archived for ≥2880 sols unless cleared by Tribunal ruling
## Part II — Criminal Procedure
### Chapter 1 — Breach Reporting and Detainment
#### §42. Breach Reporting
All suspected breach incidents must be reported within 4 sols by the observing officer, system monitor, or certified automation agent. Required documentation includes:
- Timestamp and location
- Tier classification of involved parties
- Suspected breach class and subtype
Reports are filed in the **Initial Breach Declaration Network (IBDN)**.
#### §43. Investigation Authority
Jurisdiction is granted to:
- **Internal Security Bureau (ISB):** Class I–IV offenses
- **Tribunal Investigative Panel:** Class V or multi-jurisdictional breaches
- **OPI Review Teams:** Cases involving procedural misconduct or Codex deviation
All investigative actions must preserve verified chain-of-custody for evidence and system credentials.
#### §44. Detainment Procedure
Valid detainment requires:
- Judicial warrant or verified enforcement citation
- Notification to superior officer or assigned supervisory Tier (if applicable)
- Secure placement in a designated holding location
In exigent circumstances, provisional detainment may occur without formal warrant if:
- The breach is actively in progress
- There is immediate risk to personnel or sovereign systems
- ISB validation is secured within 8 sols
#### §45. Rights of the Detained
All detained individuals retain the right to:
- Full disclosure of charges under the Codex
- Access to Tier-matched representation
- Basic health and cognitive stability safeguards
- Tribunal appearance within 10 sols
Due process violations are grounds for procedural challenge or relief.
#### §46. Evidence Collection
ISB agents may:
- Secure breach-linked materials, credentials, or records
- Extract system logs and communications data
- Request forensic analysis by certified review teams
All materials must be recorded in the **Compact Evidentiary Vault (CEV)**.
#### §47. Codex Compliance
All enforcement actions must be:
- Logged in the **Breach Apprehension Registry (BAR)**
- Cross-referenced with case files and investigative ledgers
- Archived for ≥2880 sols or until judicial resolution
---
### Chapter 2 — Adjudication and Rulings
#### §48. Tribunal Authority
All breach hearings are conducted before a **Triad Tribunal**, composed of:
- One Red Council magistrate
- One Tier IV representative
- One independent Codex arbiter
Class V breaches require oversight by a **Red Seal Adjudicator**. All judgments are binding unless overturned under §52.
#### §49. Hearing Procedures
The Tribunal must:
- Convene within 10 sols of detainment
- Present charges and validated evidence
- Permit qualified representation for Tier I–III respondents
- Log all proceedings in the **Trial and Verdict Record (TVR)**
Substantive disruption or procedural failure may result in retrial authorization.
#### §50. Evidence Standards
Permissible evidence includes:
- System command logs and credential records
- Validated testimony or recorded observations
- Seized devices or falsified instruments
- Trace records of unauthorized actions
All accepted evidence must be indexed in the **CEV**. Tampering or withholding constitutes a **Class III offense** (see §13, §46).
#### §51. Plea Options
An accused party may submit:
- **Admission** — Full or partial breach acknowledgment
- **Denial** — Rejection of all charges
- **System Override Claim** — Assertion of operational or cognitive impairment
- **Non-Declaration** — Triggers escalation review by Tribunal
All plea entries follow Codex procedural routing.
#### §52. Appeals Process
An appeal may be granted if:
- New material evidence is presented
- Procedural irregularities are confirmed
- Adjudicative bias or conflict is substantiated
Appeals are evaluated within 20 sols by the **Adjudicative Override Council (AOC)**.
#### §53. Codex Compliance
All rulings must be:
- Filed in the **Judicial Archive Codex (JAC)**
- Cross-linked to the subject's personnel or registry record
- Retained ≥2880 sols unless expunged by authorized mechanism
---
### Chapter 3 — Sentencing and Enforcement
#### §54. Sentencing Guidelines
Sentencing is determined by:
- Assigned breach severity (§7)
- Personnel role and Tier designation (§9)
- Circumstantial factors or historical conduct
- Post-incident behavioral assessment
Modifiers are applied by Tribunal discretion.
#### §55. Enforcement Measures
Tribunal-approved enforcement actions include:
- **Access Revocation** — Temporary system credential suspension
- **Secure Detention** — Physical placement up to 360 sols
- **Clearance Demotion** — Tier status or role reduction
- **Account Lockout** — Revocation of digital privileges
- **Codex Flagging** — Breach status link to personnel record
Each action is logged in the **Sentencing Execution Log (SEL)**.
#### §56. Corrective Mandates
Corrective orders may include:
- Legal re-education or orientation remediation
- System restoration or procedural restitution
- Monitored community assignments
- Formal acknowledgments to affected parties
Failure to comply constitutes a **Class II offense**.
#### §57. Review and Reevaluation
Reevaluation is permitted when:
- Sentence duration exceeds ≥1440 sols
- Mandated actions are verifiably completed
- Behavioral profile demonstrates restored eligibility
Tier III+ personnel may request early review with Red Council authorization.
#### §58. Codex Compliance
All post-sentencing actions must be:
- Logged in the **Tribunal Enforcement Register (TER)**
- Synchronized with the **Breach Apprehension Registry (BAR)**
- Archived ≥2880 sols unless modified by legal override
## Part III — Expungement, Reintegration, and Pardons
### Chapter 1 — Record Sealing and Behavioral Review
#### §59. Eligibility for Record Sealing
A breach record may be sealed if:
- At least 2880 sols have elapsed since the final sentencing date
- The individual has committed no new Class II or higher offenses
- Behavioral evaluations confirm consistent procedural stability
- All corrective mandates have been fully completed
Class V offenses are not eligible for sealing unless a formal pardon is issued by the Red Council under §62.
#### §60. Petition and Review
Qualified individuals may submit a petition through the **Restorative Petition Channel (RPC)**. Review must occur within 20 sols and include:
- A Tribunal-led behavior and conduct assessment
- Confirmation of procedural reliability and operational capability
- Full verification of Codex compliance and mandate fulfillment
Outcomes must be entered in the **Expungement Determination Ledger (EDL)**.
#### §61. Reinstatement of Clearance and Status
Clearance levels and prior roles may be reinstated following expungement if:
- The Tribunal confirms functional eligibility
- The individual secures factional authorization or sponsorship
- The Site Director affirms readiness for reintegration
Reinstated status remains inactive for 144 sols prior to formal activation.
#### §62. Red Council Pardons
The Red Council may grant formal pardons that:
- Seal all prior offenses, regardless of breach classification
- Restore Tier status or operational assignments
- Nullify current sanctions, restrictions, or containment designations
All pardons must include Red Seal verification and be archived in the **Clemency Grant Archive (CGA)**.
#### §63. Codex Compliance
All expungement and reintegration activity must be:
- Filed in the **Compact Reintegration Register (CRR)**
- Linked to the subject’s personnel and system identity record
- Auditable by ISB, Site Administration, or Red Council for ≥2880 sols
# Title 7 — Tribunal and Adjudication Protocols
## Chapter 1 — Structure and Appointment
### §1. Tribunal Composition
Each adjudicative Tribunal shall consist of:
- One Red Council Magistrate (legislative authority)
- One Tier IV Delegate (executive oversight)
- One Compact Arbiter (judicial neutrality)
Class V breach hearings require oversight by a Red Seal Adjudicator.
### §2. Term and Convening
Tribunal members serve terms of 1440 sols, renewable by Red Council vote. A Tribunal is convened upon:
- Escalation of a breach to Class III or higher
- Referral by ISB or formal procedural review request
- Activation of Judicial Protocol IX
Emergency panels may form under restricted conditions during confirmed systemic disruption.
### §3. Appointment Procedures
Appointments are made through:
- Red Council nomination or decree
- Predefined delegation rosters
- Random selection from Tier IV-certified judicial pool
All appointments logged in the **Tribunal Appointment Register (TAR)**.
### §4. Disqualification and Recusal
A Tribunal member must recuse if:
- Affiliated with the case subject's institution or faction
- Documented correlation with breach activity exceeds approved threshold
- Impartiality concern is verified and entered in the **Conflict Record Log (CRL)**
Failure to recuse invalidates subsequent verdicts.
### §5. Jurisdiction and Powers
Tribunals are empowered to:
- Hear and resolve Class II–V charges
- Issue binding sentences and containment orders
- Rule on expungement and privilege reinstatement
- Suspend Compact rights under approved authority clauses
Minor administrative disputes fall outside scope unless referred by oversight bodies.
### §6. Codex Compliance
Tribunal composition and rulings must be:
- Indexed in the **Judicial Composition Ledger (JCL)**
- Audited on a 720-sol cycle by the Council Integrity Division
- Assessed for verdict consistency and procedural precedent
## Chapter 2 — Procedure and Deliberation
### §7. Case Initialization
Upon referral, the Tribunal shall:
- Review submitted evidence and investigative logs
- Validate the procedural integrity of the case file
- Assign a unique Judicial Case Identifier (JCI)
- Schedule a hearing within 10 sols of registration
The involved party must be notified via an official communication channel.
### §8. Disclosure Requirements
All parties are entitled to receive:
- The full evidentiary record
- Names and roles of all assigned Tribunal members
- A formal briefing of charges and legal rights
- Access to certified legal representation or support
Failure to provide disclosures within 3 sols results in a mandatory hearing delay.
### §9. Hearing Procedure
Hearings proceed as follows:
1. Verification of Tribunal authority
2. Presentation of formal charges
3. Submission of evidence
4. Plea entry by the respondent
5. Witness statements, if applicable
6. Private Tribunal deliberation
7. Pronouncement of verdict
8. Issuance of sentencing or procedural directive
Class V hearings may be redacted under sealed status (see §17).
### §10. Representation
Respondents may be represented by:
- Authorized legal advocates
- Compact-assigned counsel
- Themselves (if Tier III or higher)
All witnesses or testimonial participants must undergo procedural briefing prior to appearance.
### §11. Deliberation Protocol
Tribunal deliberation shall:
- Occur in a secure and access-restricted chamber
- Be concluded within 72 adjudication units
- Involve only official Tribunal members and required notetakers
- Record all decision inputs in the **Judicial Insight Index (JII)**
Dissenting members may register formal objections using designated notation.
### §12. Verdict Finalization
A ruling is formalized upon:
- Majority or unanimous Tribunal concurrence
- Authorization override for Class V by Red Council Review
- Entry of verdict record into the **Final Judgment Archive (FJA)**
All confirmed verdicts are binding and immediately enforceable.
### §13. Codex Compliance
All proceedings under this Chapter must be:
- Logged in the **Sovereign Tribunal Record (STR)**
- Cross-indexed with relevant legal and procedural case entries
- Archived ≥2880 sols or permanently if issued under sealed status
## Chapter 3 — Appeals and Emergency Authority
### §14. Grounds for Appeal
An appeal may be filed if:
- New verified evidence emerges
- Procedural misconduct or systemic fault is documented
- Adjudicator conflict is confirmed via record
- Testimony was compromised by system interference
Appeals must be initiated within 20 sols of final judgment.
### §15. Adjudicative Override Council (AOC)
The AOC consists of:
- Two Red Council Magistrates
- One Tier IV Governance Advisor
- One Codex Continuity Officer
The AOC may:
- Affirm, amend, or overturn decisions
- Mandate Tribunal reconstitution
- Seal or nullify verdicts under emergency provisions
Actions must be recorded in the **Appeal Verdict Register (AVR)**.
### §16. Emergency Panels
If adjudicative functions are disrupted:
- A **Rapid Response Tribunal** may be invoked by ISB order
- Verdict must be reached within 12 units using authorized override mechanisms
- Red Council reviews outcome within 40 sols
Proceedings indexed in the **Emergency Adjudication Register (EAR)**.
### §17. Sealed Proceedings
Certain high-risk trials may proceed under restricted conditions:
- Records are omitted from public documentation
- Participant identity records are secured
- Final ruling stored in the **Confidential Seal Vault (CSV)**
Access restricted to relevant judicial and executive authorities.
### §18. Post-Review Procedure
All modified or emergency rulings shall undergo review by:
- The OPI audit division
- Qualified legal historians
- Designated systemic analysts
Findings entered into the **Tribunal Integrity Archive (TIA)**.
### §19. Codex Compliance
All records under this Chapter must be:
- Integrated into breach lineage system logs
- Attached to relevant verdict records
- Archived ≥2880 sols or indefinitely if sealed
# Title 8 — Electoral Protocols and Referenda
## Chapter 1 — Legislative Chamber Structure and Appointment
### §1. Council Composition
Legislative authority under the Martian Initiative is vested in the **Red Council**, a bicameral body composed of:
- The **Vox Chamber**, representing Compact divisions and operational personnel
- The **Obsidian Circle**, representing sovereign installations and planetary jurisdictions
Each chamber governs its own appointment procedures under this Title.
### §2. Vox Chamber Appointments
Appointments are assigned per operational division of IMR–Acheron (e.g., Containment, Research, Engineering), based on:
- **One representative per 50 active personnel**, with at least one per division
- Personnel audits conducted quarterly by the **Office of Personnel Enumeration (OPE)**
- Certification by the **Credentials Subcommittee**, with registration in the **Congressional Roster Ledger (CRL)**
Terms are 100 sols and renewable unless restricted by disciplinary sanction.
### §3. Obsidian Circle Appointments
Obsidian Circle membership includes:
- **One Councilor per sovereign installation or planetary division** under IMR designation
- Eligibility certified by the **Office of Planetary Governance (OPG)** under **Directive A-13**
- Councilors serve 200-sol terms, renewable unless barred by active investigation or concurrent officeholding
Selection may occur via appointment, site-level election, or sovereign delegation. Records are filed in the **Sovereign Councilor Archive (SCA)**.
### §4. Elector Eligibility
To vote in Vox Chamber elections, electors must:
- Hold Tier II clearance or above
- Maintain verified operational engagement ≥92%
- Have no Class III or higher violations in the previous 720 sols
Verification is conducted by the **Sovereign Citizenship Archive (SCA)** and certified via the **Initiative Relay Grid (IRG)**.
### §5. Dispute Resolution
If chamber seat disputes or vacancies arise:
- A **Judicial Verification Review** may be initiated
- A **Credential Arbitration Panel (CAP)** rules within 12 system units
- Final decisions are recorded in the **Electoral Codex Register (ECR)**
## Chapter 2 — Legislative Referenda and Public Measures
### §6. Council-Initiated Referenda
The Red Council may submit measures to public vote for:
- Amendments to Compact provisions
- Reforms to structural protocol or Tier systems
- Recognition of new planetary jurisdictions
- Ratification or repeal of existing laws
Passage requires:
- ≥60% affirmative vote from verified electors
- Participation from electors across ≥3 sovereign installations
Results are archived in the **Sovereign Decision Vault (SDV)**.
### §7. Citizen-Initiated Measures
Any Tier II+ denizen may petition for referendum by:
- Submitting ≥1440 validated endorsements to the **IRG**
- Confirming structural compatibility and procedural scope
- Ensuring no identical measure failed in the last 2880 sols
Qualified petitions are reviewed within 20 sols by the Council.
### §8. Factional Measures
Recognized factions may propose regionally scoped directives to:
- Establish internal policy or ceremony
- Alter factional norms or engagement practices
- Define Tier interaction terms within factional governance
These measures are locally binding unless escalated through Council referendum.
### §9. Emergency Override Procedures
If:
- Four or more Obsidian Circle seats remain vacant, or
- Verified system cohesion drops below 80%
Then:
- An **Emergency Override Referendum** may be initiated by the Council
- All verified electors may vote on reconstituting Council membership or authority
- Results are entered in the **Continuity Safeguard Register (CSR)** and subject to expedited Tribunal review
### §10. Codex Compliance
All referenda, appointments, and override measures must be:
- Filed in the **Electoral Codex Register (ECR)**
- Certified by Red Council staff and Tribunal oversight
- Considered binding unless overturned through lawful public vote or sovereign directive