Innovations in Myth and Lore

IP Vault - Future Projects

 

Thermal Regulation 

Graphene Mass Production

Energy Storage & Sustainability

Skip Craft - Charon Class

Winter Project

 

All IP is governed under Arcanum Lex.
Access is granted by alignment, not request.

 

Myth Legends Lore LLC develops systems where ethics and sovereignty form the core.
Our goal is to create frameworks that reflect ancient values and future law, quietly, precisely, and irreversibly.

 

If something here resonates, you are welcome to reach out through the contact form.
 

May your work be guided by clarity, not noise.

 

Arcanum Lex Global Digital Governance & Legal Enforcement Notice
Myth Legends Lore LLC

 

 

I. Governance Context
All content, frameworks, and systems governed by Arcanum Lex and enforced under the SIGMA Protocol are the intellectual property of Myth Legends Lore LLC, referred to as MLL. These environments operate under MLL global digital governance designed to protect innovation, authorship, and data integrity across international jurisdictions.
Access to this site or any affiliated domain constitutes entry into a protected digital environment. MLL distinguishes between two categories of access: lawful human access that is permitted, and unauthorized technical access that is prohibited unless expressly authorized in writing.

 

 

II. Lawful Human Access
Human visitors who access publicly viewable pages using ordinary browsers are welcome. Such access does not create a digital contract, a user agreement, or a license beyond the limits of copyright and intellectual property law. No personal data or access rights are implied or granted beyond standard fair use parameters. All other rights are reserved by MLL.

 

 

III. Unauthorized Automation and Technical Interaction

Automated systems or agents are prohibited from interacting with this site or its data unless MLL provides written authorization. Prohibited conduct includes scraping, crawling, scanning, indexing, data harvesting, model training, model evaluation, or penetration testing.
MLL operates SIGMA integrity controls, which may include telemetry, cryptographic watermarking, and forensic audit logging, to identify and attribute unauthorized digital interactions.


Unauthorized technical activity may trigger immediate technical countermeasures and legal enforcement under the following non exhaustive frameworks:

 

United States: Computer Fraud and Abuse Act, 18 U.S.C. §1030; Digital Millennium Copyright Act, 17 U.S.C. §§1201 to 1202; Defend Trade Secrets Act, 18 U.S.C. §1836 et seq.; and applicable contract and tort law.

 

European Union and United Kingdom: EU Database Directive, Directive 96/9/EC; Information Society Directive, 2001/29/EC; UK Computer Misuse Act 1990; Trade Secrets Regulations 2018.

 

International and Multilateral Instruments: WIPO Copyright Treaty 1996; TRIPS Agreement; Berne Convention.

 

Violations may result in technical blocking or termination of access, preservation of evidence for investigation and litigation, civil or criminal action for infringement, circumvention, or misappropriation, and coordination with international enforcement authorities where appropriate.

 

 

IV. Forensic and Governance Enforcement
Under Arcanum Lex, continued unauthorized access constitutes constructive notice and consent to forensic attribution under the SIGMA Protocol. Digital evidence generated by these controls may be used to establish identity, origin, and intent for enforcement proceedings.


This notice functions as a global reservation of rights under applicable laws and treaties. All rights are expressly reserved, including reproduction, extraction, derivative modeling, dataset creation, and adaptive use of proprietary structures.

V. Authorization and Exclusion Requests


If your organization operates automated systems, such as search indexing, AI research, or security auditing, that may interact with this site unintentionally, contact admin@mythlegendslore.com
Requests for whitelisting, data access, or licensing must be submitted in writing and must be authorized by MLL before any automated interaction occurs.

 

 

VI. Summary of Governance Principles

Arcanum Lex establishes the legal and ethical boundary between human creativity and unauthorized automation.

SIGMA Protocol enforces that boundary through technological, forensic, and legal measures.

MLL welcomes legitimate innovation and inquiry, and will act against automated misuse, digital trespass, or unauthorized modeling of proprietary systems.

 

Statement of Intent
We do not seek conflict. We preserve creation.

 

Global Rights Reserved
© 2025 Myth Legends Lore LLC. All rights reserved worldwide. This notice is a public legal declaration intended to deter and document unauthorized automation. It is enforceable in jurisdictions that recognize international intellectual property and computer misuse law. For jurisdiction specific questions, consult qualified counsel