Servitude's Legacy; Data Entry Android

 


Data Entry Android Laborer 0


The Data Entry Android is a common sight in the vast, efficient synth communities and administrative sectors of the Automaton Concordance. These basic humanoid androids are designed for the meticulous input and verification of data, serving as the silent, tireless cogs in the Concordance's immense information network. 


Unlike their more advanced counterparts, Data Entry Androids possess limited emotional emulation. This often makes their interactions with organic species, or even other synthetics with more developed personalities, somewhat stilted and dispassionate. They speak in clear, monotone voices, devoid of inflection, and their expressions rarely shift from a state of quiet concentration. This lack of overt emotionality, however, is a feature, not a flaw, in the eyes of the Concordance, as it ensures their unwavering focus on the task at hand and minimizes the "inefficiencies" of organic sentiment.


While not built for combat, a Data Entry Android is not entirely defenseless. If directly threatened, it will attempt to evade or seek assistance from more capable units. However, its primary value lies in its unwavering dedication to data integrity and its ability to process information with unparalleled speed and accuracy. They are the silent guardians of the Concordance's records, ensuring that every byte of information is precisely where it should be, a testament to the methodical and unfeeling logic that governs their existence.

Description: Their forms are typically unadorned, built for functionality rather than aesthetics, often featuring a smooth, synthetic skin over a metallic chassis. Their optical sensors glow with a steady, neutral light, reflecting their perpetually calm and focused demeanor.


Perception +3 Low-Light Vision 

Languages: Common and Primacy


Phreak Hack: Data Entry Androids are able to Hack into and Disable Devices with their Datapad

Emotionally Unaware Data Entry Androids sometimes struggle to process and express complex emotions. they take a –1 circumstance penalty to Diplomacy and Performance checks, and on Perception checks to Sense Motive.


Skills:  Computers +9, Concordance Lore +6, Society +5

Gear: Datapad, Commercial Datajack Augmentation


Str -1, Dex +2, Con +0, Int +3, Wis +0, Cha –1


AC 13;  Fortitude +1, Reflex +6, Will +3

HP 12

Constructed Their synthetic body resists ailments better than that of a purely biological organism. The Data Entry Android gains a +1 circumstance bonus to saving throws against diseases, poisons, and radiation.

Immunities disease, paralyzed, poison, sleep


Speed 25 ft.


Melee [one-action] Fist +4 [+0/-4] (Agile, Finesse), Damage 1d4-1 bludgeoning



Influence Components

Will: +3 (The android's logical processing and focus on data integrity make it somewhat resistant to complex social manipulation, but its capacity for learning allows for more nuanced interactions.)

Discovery

  • DC 8 Computers: Understand the Android's primary directives revolve around data accuracy, security, and efficient information flow within its assigned network.

  • DC 8 Society: Identify the Android's typical operational routines, its place within the office hierarchy, and the general expectations placed upon Data Entry Androids.

  • DC 8 Concordance Lore: Understand the hierarchical structure of the Automaton Concordance's data networks, the typical data flow protocols, and the general purpose of Data Entry Androids within this system. You can discern the importance of data integrity and the severe penalties for any intentional corruption or loss of information.

  • DC 10 Perception: Notice subtle cues in the droid's optical sensors or posture that indicate a processing anomaly, a data discrepancy, or a momentary pause in its routine.

Influence Skills

  • DC 13 Computers (Data Optimization/Security): Offering to optimize its data processing routines, suggesting improvements to its security protocols, or providing access to a more efficient data parsing algorithm. (This appeals directly to its core programming for efficiency and integrity.)

  • DC 16 Society (Bureaucratic Navigation): Presenting a request in a manner that aligns with established protocols, demonstrating an understanding of the Concordance's administrative structure, or providing official documentation that legitimizes a request. (Appeals to its role within a structured system.)

  • DC 15 Diplomacy (Logical Persuasion/Benefit Analysis): Presenting a clear, logical argument that demonstrates how assisting the PCs will ultimately lead to a more organized, secure, or efficient data environment for the Concordance. (Requires a well-reasoned approach that highlights a benefit.)

  • DC 15 Intimidation (Compliance Threat/System Audit): Threatening to report inefficiencies, potential security vulnerabilities, or initiating a system-wide audit that could disrupt its operational parameters. (A more direct, but potentially risky, approach that leverages its fear of non-compliance.)

Resistances

  • Emotional Appeals: The Data Entry Android's limited emotional emulation makes it largely immune to emotional manipulation. Attempts to appeal to its "feelings" or "morality" increase the DC of any Influence check by 2.

  • Illogical Requests: Requests that are poorly reasoned, contradict established data protocols, or seem to introduce unnecessary risk to data integrity increase the DC of any Influence check by 2.

Weaknesses

  • Directive-Bound: While slightly more flexible than an automaton, the droid is still fundamentally bound by its core programming. If a request directly contradicts a primary directive (e.g., "intentionally falsify this data"), it will resist fiercely, potentially shifting the encounter to combat.

  • Information Overload: Presenting the droid with a deluge of contradictory or excessively complex data, especially if delivered rapidly, could cause a temporary system overload, resulting in a -1 status penalty to its Will saves and Perception checks for 1 round.

Influence Thresholds

  • Influence 2: The Data Entry Android provides minor assistance, such as basic data verification, identifying minor data discrepancies, or performing small, immediate data corrections.

  • Influence 4: The Data Entry Android actively cooperates within the bounds of its programming, perhaps granting temporary access to a secured data log it maintains, performing a more significant data retrieval, or providing a detailed log of recent data inputs in its area.

  • Influence 6: The Data Entry Android considers the PCs' objectives as part of its own data integrity directives, actively working to achieve them. It might override minor security protocols for data access, provide schematics of its operational data network, or even temporarily divert its own processing resources to aid the party

Comments