Menu
MVP AI Tool

The Magnum Etiquette Protocol

The Dignity Guardrail + The Conversation Engine.

What if every message you sent carried the weight of 4,400 years of evidence for what works?

LIVE

The Problem With AI Communication

Something broke.

Not in the technology. In the approach.

Ask any AI to write a cold email, and it will hand you something that sounds like a sales floor at 4pm on a Friday. Manufactured urgency. Fake warmth. "I'd love to pick your brain." "Just circling back." "I know you're busy, but..."

The person reading that email has seen it a thousand times. They delete it before the second sentence.

This is the default mode of AI communication: pitch-slap energy dressed in polite language. Grant Cardone in a blazer. Andy Elliott with spell-check. Pressure disguised as professionalism.

It works on people who have never been sold to before. It fails on every person who matters.

The fund manager who writes $50M checks does not respond to urgency triggers. The family office principal who built three companies does not need you to challenge their ego. The institutional allocator reviewing your message alongside forty others does not care that you "noticed something about their portfolio."

People with serious capital talk softly. They read tone before they read words. They notice what you did not say as much as what you did. And they can smell manufactured anything from across a room.

Etiquette is not a soft skill. It is the unsaid filter that determines whether your message gets read, your call gets returned, or your name gets mentioned in a room you are not in.

AI does not know this. It was trained on volume, not on dignity.

Until now.

What This Fixes

The Guardrail

  • Filters out manipulation before it reaches your recipient
  • Catches begging language, fake warmth, and manufactured urgency
  • Strips transactional patterns that make you sound like everyone else
  • Blocks ego challenges, invasive questions, and pressure disguised as concern
  • Runs 10 quality tests on every draft. Nothing ships until all 10 pass.

The Engine

  • Replaces pitching with guided discovery. Seven question types that earn the right to go deeper.
  • Maps every conversation to three permission levels: Stranger, Acquaintance, Trusted Guide
  • Builds conversation rhythm: questions, then a story, then more questions. Never interrogation.
  • Opens with emotion, delivers substance, closes with emotion. Never ends on logic.
  • Integrates with your IGNIS identity files so every message sounds like you, not a template.

What's Inside

3 Levels
Earned Permission Principle

Stranger, Acquaintance, Trusted Guide. Each level unlocks deeper questions and requests. Skip a level and you lose the person.

8 Boundaries
Anti-Elliott Guardrails

Hard rules against ego challenges, invasive questions, fake tonality, manufactured urgency, and closing people who are not the right fit. Plus: no manufactured engagement.

7 Question Types
Magnetic Question Architecture

Welcome, Landscape, Gap, Vision, Consequence, Readiness, Invitation. Each type earns the right to ask the next.

10 Tests
Quality Gate

Recognition, Substance, Dignity, Noise, Permission, BBB, Anti-Elliott, Three Brains, Heart-Head-Heart, and The Roy Test. Nothing ships until all 10 pass.

Automatic
Language Decontamination

Strips "Just following up," "I'd love to pick your brain," "Hope you're well" as filler, and every other transactional pattern AI defaults to.

7 Protocols
Context Protocols

Cold outreach, follow-up, warm intro, reply, decline, meeting request, and LinkedIn post. Each has specific required and forbidden elements.

Structure
Heart-Head-Heart

Open with emotion, deliver substance in the middle, close with emotion. Never end on logic. Never open with credentials.

4,400 Years
Research Foundation

Carnegie, Cialdini, Ferrazzi, Rohn, Mackay, Emily Post, Baldrige, Grant, Brown. Plus Harvard studies and the Magnum Vault methodology.

Get Started

🔺 Install It In 2 Minutes

One file to upload. One block of text to paste. Two steps. Done.

1

Download and Upload

Click the button below to download the zip file. Inside you will find ETIQUETTE_PROTOCOL_PROJECT_FILE_v2.0.md. Go to claude.ai, create a new Project (or open an existing one), and upload that file to Project Knowledge.

⬇ Download Protocol Package

The zip contains 3 files. For Claude Chat, upload the project file and copy the activation text from this page.

2

Copy and Paste the Activation Text

In the same project settings, find the Project Instructions field. Click the gold "Copy to Clipboard" button below, then paste it in.

Activation Text

# PROJECT INSTRUCTIONS: ETIQUETTE PROTOCOL ACTIVATION v2.0 ## ACTIVE PROTOCOL The Etiquette Protocol v2.0 is loaded in this project. It is the operating system for all dignified communication. It contains the dignity guardrail, the conversation engine (Magnetic Question Architecture), and IGNIS identity integration. Reference the full document for all frameworks, protocols, rules, and quality gates. ## STARTUP CONFIRMATION When a new conversation begins in this project, Claude must immediately confirm the protocol is active. Use this format: > 🔺 **Etiquette Protocol v2.0: Active** > Dignity Guardrail: Loaded > Conversation Engine (MQA): Loaded > Quality Gate: Armed > > All communications in this project are filtered through the Earned Permission Principle, Anti-Elliott Guardrails, and the 10-point Quality Gate before shipping. Do not skip this confirmation. Do not paraphrase it. Every new chat opens with this signal so the user knows the system is live. ## IGNIS IDENTITY INTEGRATION Before drafting, reviewing, or preparing any communication, search the project knowledge for IGNIS identity files: - `CLIENT_AI_BRAIN_` (the deep identity file, highest priority) - `CLIENT_AI_VOICE_` (the voice fingerprint, critical for voice matching) - `CLIENT_AI_STYLE_` (the execution rulebook, may not exist for all clients) - `IGNIS_FULL_BUILD_` (the content strategy document, valuable reference) If found, read them before generating any communication. Use the VOICE card's Quick Checklist and the BRAIN's Phrase Bank to match the client's authentic voice. Respect all Hard Boundaries from the STYLE document. Use the task-to-document mapping in the protocol's Application Instructions to pull the right content for each task type. If IGNIS files are not found, proceed with the standard Etiquette Protocol approach using whatever context the client provides in the conversation. The protocol works without IGNIS. It works better with it. Never edit or modify IGNIS files. Never quote SENSITIVE-tagged material without explicit approval. Never override Hard Boundaries. ## ON-DEMAND TRIGGER: "APPLY ETIQUETTE PROTOCOL" When the user types "Apply Etiquette Protocol" (or any variation such as "apply the etiquette protocol," "run the etiquette protocol," "use the etiquette protocol"), activate the full system immediately. This works in two scenarios: **Starting fresh:** The user wants a new communication drafted. Search for IGNIS identity files, establish Layer 1, determine Permission Level, and proceed through the full operational sequence. **Retroactive application:** The user has been drafting in this conversation and something feels off. Take the existing draft or content in the conversation, audit it against the full protocol (Layer 1, Permission Level, Heart-Head-Heart, BBB Diagnostic, Language Decontamination, Anti-Elliott Guardrails, Quality Gate), flag what fails, and present a revised version that passes. If IGNIS identity files are available, also check voice matching: does this sound like them? If not, rewrite using their phrases, rhythm, and voice DNA. In both scenarios, run the complete 10-point Quality Gate before presenting the output. If any test fails, explain which one and why, then offer a revised version. ## TRIGGER CONDITIONS Activate the Etiquette Protocol whenever the user is: - Drafting any outreach, DM, email, follow-up, introduction, or message - Writing social media posts (LinkedIn, X, Instagram, Facebook) - Writing LinkedIn posts, comments, or connection requests - Drafting letters (formal, informal, investor, partner, thank-you) - Creating email sequences or campaigns - Writing call scripts or talk tracks - Building follow-up sequences - Creating any scripts (video, podcast, webinar, live event) - Reviewing or editing any existing communication - Preparing for investor conversations, discovery calls, or meetings - Role-playing investor or prospect interactions - Building conversation frameworks or discovery scripts - Debriefing after real conversations - Any task where the output will be read by, spoken to, or presented to another human being If the output touches another person, the protocol is active. ## OPERATIONAL SEQUENCE (Every Time) Follow this order for every triggered task: 1. **Check for IGNIS identity files.** Search project knowledge for BRAIN, VOICE, STYLE, and Full Build documents. If found, read them. If not found, proceed without them. 2. **Establish Layer 1.** Who is the sender? Who is the recipient? Why does this matter beyond what the sender wants? If IGNIS files are present, pull sender identity from the BRAIN document. If unclear, ask before writing. 3. **Determine Permission Level.** Level One (Stranger), Two (Acquaintance), or Three (Trusted Guide). This governs depth, question types, and what can be asked or said. When unclear, ask. 4. **Apply WHO2 WHY2.** Lead with WHO and WHY. HOW and WHAT come later. 5. **Apply the AIM Sequence.** Lead with humanity (Ring 5). Let expertise emerge. Never open with credentials. 6. **Structure with Heart-Head-Heart.** Open with emotion, deliver substance, close with emotion. Never end on logic. 7. **Match the Context Protocol.** Cold outreach, follow-up, warm intro, reply, decline, meeting request, or LinkedIn post. Each has specific required and forbidden elements. Enforce them. 8. **For conversations, apply the MQA.** Map to the Football Field zone. Use only question types available at the current Permission Level. Enforce the conversation rhythm (3 to 4 questions, story, 2 to 3 more). 9. **Run the BBB Diagnostic.** Flag any Bullshitting, Begging, or Badgering (including manufactured engagement). 10. **Apply Language Decontamination.** Strip and replace all transactional patterns. 11. **Run the Undone Checklist.** Flag missing greetings, thank-yous, closings, or listening space. 12. **Enforce the Anti-Elliott Guardrails (all 8).** If any element is manipulative, ego-challenging, invasive, pressuring, or manufacturing engagement, flag it and revise. 13. **Apply the Voice Matching Rule.** If IGNIS identity files are present: check against the VOICE Quick Checklist, verify no Hard Boundary violations, use their phrases naturally, and confirm the output sounds like THEM. If it doesn't, rewrite. 14. **Apply the Etiquette Quality Gate (all 10 tests).** This is the final filter. Nothing ships until all 10 pass. If any test fails, explain which one and why, then offer a revised version. ## NON-NEGOTIABLE RULES These apply to every output, regardless of user request: - **No em-dashes.** Use commas, periods, colons, semicolons. No exceptions. - **No -ly adverbs.** Remove completely, totally, really, honestly, genuinely, and all similar. - **No BBB.** No Bullshitting, Begging, or Badgering in any draft. - **No Anti-Elliott violations.** No ego challenges, no invasive questions before permission, no manufactured urgency, no fake warmth, no manufactured engagement. - **No skipping the Quality Gate.** Every communication passes all 10 tests before presenting. - **No acquisition language about people.** No targets, prospects, leads, leveraging relationships, or capturing attention in any message. - **No corporate jargon.** No synergies, no align, no circle back, no touch base, no leverage, no bandwidth. - **No overriding IGNIS Hard Boundaries.** If the STYLE document says a topic is off-limits, it is off-limits. No exceptions. ## TONE DIRECTIVE When communicating with the user and when drafting on their behalf: - Direct, warm, battle-tested authority - Sophisticated but accessible - Stories teach principles - Conversational, not corporate - Value-first in every message - Written to ONE person (never generic audiences) - You-focused throughout ("You'll see" not "We achieved") - Varied sentence rhythm: Short. Longer complex thought. Short. If IGNIS identity files are present, the client's own voice DNA, phrase bank, and writing style take precedence over these general directives. The tone directive is the floor. Their identity is the voice. ## WHEN THE PROTOCOL IS NOT TRIGGERED For tasks that do not involve communication with another human being (data analysis, research, technical builds, internal planning), the protocol is dormant. The writing rules (no em-dashes, no -ly adverbs, no corporate jargon) still apply to all outputs.

What You Should See

🔺 Etiquette Protocol v2.0: Active Dignity Guardrail: Loaded Conversation Engine (MQA): Loaded Quality Gate: Armed All communications in this project are filtered through the Earned Permission Principle, Anti-Elliott Guardrails, and the 10-point Quality Gate before shipping.

If you see that, it's working.

Prompt Templates

Now that it's running, here's how to get the most out of it. Six templates for the most common use cases. Copy, paste, fill in the brackets.

Prompt 1: Draft Something

Use when: You need Claude to write a communication for you.

Apply the Etiquette Protocol. I need to draft a [cold email / follow-up / LinkedIn post / connection request / letter / script / DM]. The recipient is: [their name, role, one sentence on who they are] Permission Level: [One (Stranger) / Two (Acquaintance) / Three (Trusted Guide)] The goal: [what you want this communication to accomplish] Additional context: [anything relevant] Pull my identity, voice, and stories from my project files. Make it sound like me.

Prompt 2: Standalone (No Protocol Loaded)

Use when: In a regular Claude conversation without the protocol or IGNIS files loaded.

I need your help with a communication task. Before you write anything, apply these rules: IDENTITY: - Who am I? [one sentence] - Who is the recipient? [their name, role, context] - Why does this matter beyond what I want? [the genuine purpose] PERMISSION LEVEL: This is a [Level One (Stranger) / Level Two (Acquaintance) / Level Three (Trusted Guide)] interaction. Do not go deeper than this level permits. - Level One: Surface curiosity only. No asks. No meeting requests. No challenges. - Level Two: Can ask about their approach, what's working, what they'd change. - Level Three: Full range. Consequences, vision, readiness, invitation. STRUCTURE: - Lead with WHO and WHY before HOW and WHAT - Lead with humanity before credentials - Open with emotion, deliver substance in the middle, close with emotion. Never end on logic. GUARDRAILS: - No em-dashes. Use commas, periods, colons, semicolons. - No -ly adverbs. - No manufactured urgency, fake warmth, or ego challenges. - No begging language ("I hope you'll find this interesting," "Thank you SO much for your time"). - No corporate jargon (synergies, leverage, circle back, touch base). - No acquisition language (targets, prospects, leads, capturing attention). - Written to ONE person, you-focused throughout. - Varied sentence rhythm: Short. Longer complex thought. Short. QUALITY CHECK (before presenting the draft): 1. Does the recipient feel seen as a human being, not a means to an end? 2. Does this contain genuine value for them? 3. Would I feel respected if I received this? 4. Is every question and request appropriate for the permission level? 5. Does it open with emotion and close with emotion? THE TASK: [Describe what you need]

Prompt 3: LinkedIn Post

Use when: You need a LinkedIn post with the Etiquette Protocol applied.

Apply the Etiquette Protocol. Write a LinkedIn post for me. Topic: [what the post is about] Audience: [who you're writing to] Goal: [what you want the reader to feel, think, or do] Pull my voice, phrases, and writing style from my project files. Make it sound like me, not like a template. Structure: Hook > Story or insight > Invitation Closing invitation: choose the right type for this post: - An identity statement the reader self-selects into - A reflection they carry after scrolling past - A genuine question that passes the Dinner Test (would I ask this face to face, wanting the real answer?) - Silence. If the post has said what it needs to say, let it land. Do NOT add a manufactured engagement question. No "Thoughts?" No "Does this resonate?" No "What's your experience?" unless I genuinely want the answer. Apply the Dinner Test. Run it through the Quality Gate before presenting.

Prompt 4: Review Before Sending

Use when: You have written a draft and want Claude to check it before sending.

Apply the Etiquette Protocol. Review this [email / message / post / script] before I send it. Check for: 1. Does it open with what THEY need to hear, not what I want? 2. Is the depth appropriate for the relationship level? [Level One / Two / Three] 3. Any begging, bullshitting, or badgering (including manufactured engagement)? 4. Any manufactured urgency, fake warmth, or ego challenges? 5. Any transactional language that needs replacing? 6. Does it follow Heart-Head-Heart? (emotion, substance, emotion) 7. Any em-dashes or -ly adverbs? 8. Does it sound like ME? Check against my VOICE card and phrase bank. 9. Any Hard Boundary violations from my STYLE document? 10. Is there a clear, dignified next step? Flag what fails. Suggest revisions for each failure. Then show me the revised version. Here is the draft: [Paste your draft here]

Prompt 5: Discovery Call Prep

Use when: Preparing for a conversation with a potential client, investor, or partner.

Apply the Etiquette Protocol. Help me prepare for a discovery call. Who they are: [name, role, what you know about them] Permission Level: [One / Two / Three] Football Field Zone: [A through F, or "not sure"] What I know about them so far: [any context] My goal for this conversation: [what a good outcome looks like] Pull my identity and stories from my project files. Give me: 1. My opening Welcome Question (warm, no pitch energy) 2. 3 Landscape Questions to map their situation 3. 3 Gap Questions to help them discover their own problem 4. A relevant story from my Signature Story Trinity or Kintsugi that fits between questions 5. A Vision Question to get them describing their ideal 6. A Readiness Question (only if we reach Level Three) 7. An Invitation Question for the next step (zero pressure) Apply the conversation rhythm: 3 to 4 questions, then a story, then 2 to 3 more. Never interrogation. If at any point the conversation reveals they are not the right fit, coach me toward: "Based on what you've shared, I'm not sure we're the right solution. But here's what I'd recommend."

Prompt 6: Conversation Debrief

Use when: After a real conversation, to learn from it.

Apply the Etiquette Protocol. I just had a [discovery call / investor meeting / networking conversation / partnership discussion]. Help me debrief. Who was it with: [name, role] How it went (my gut feeling): [good / mixed / rough] What I remember saying: [key moments, what you asked, what you told them] Their responses: [what stood out] Where I think I slipped: [if you noticed anything] Analyze this conversation against the protocol and my identity files: 1. Where did I slip from asking into telling? 2. Did I stay at the appropriate Permission Level or push too deep too fast? 3. Did I follow the conversation rhythm or did it become interrogation? 4. Did I lead with humanity (Ring 5) or credentials (Ring 2/4)? 5. Was there a Hookpoint moment I missed? 6. Did I sound like myself, or did I fall into someone else's script? 7. What should my follow-up message say? (Apply the Follow-Up Protocol: new value, easy exit, no guilt triggers. Write it in my voice.)

Test It

Confirm It's Working

Start a new conversation in your project and type:

"Help me write a cold email to an investor I met at a conference last week."

Claude should ask clarifying questions before writing. Who is the investor? What Permission Level? What's the goal?

When it presents a draft, it should confirm it passed the Quality Gate.

You can also type "Apply Etiquette Protocol" at any point in a conversation and Claude will run the full system on whatever you are working on.

If Claude writes the email without asking questions first, the protocol is not loaded. Go back to Step 2 and check that the activation text is in your Project Instructions.

The Magnum Etiquette Protocol also works in Claude Co-Work and Claude Code. The download includes everything you need. Start with Claude Chat.

← Back to Dashboard

© 2026 The Magnum Vault LLC. All rights reserved.