Rules and policies

Run [email protected] only on authorized computers

Run [email protected] only on computers that you own, or for which you have obtained the owner's permission. Some companies and schools have policies that prohibit using their computers for projects such as [email protected]

How [email protected] will use your computer

When you run [email protected] on your computer, it will use part of the computer's CPU power, disk space, and network bandwidth. You can control how much of your resources are used by [email protected], and when it uses them.

The work done by your computer contributes to the goals of [email protected], as described on its web site. The application programs may change from time to time.

Privacy policy

Your account on [email protected] is identified by a name that you choose. This name may be shown on the [email protected] web site, along with a summary of the work your computer has done for [email protected] If you want to be anonymous, choose a name that doesn't reveal your identity.

If you participate in [email protected], information about your computer (such as its processor type, amount of memory, etc.) will be recorded by [email protected] and used to decide what type of work to assign to your computer. This information will also be shown on [email protected]'s web site. Nothing that reveals your computer's location (e.g. its domain name or network address) will be shown.

To participate in [email protected], you must give an address where you receive email. This address will not be shown on the [email protected] web site or shared with organizations. [email protected] may send you periodic newsletters; however, you can opt out at any time.

Private messages sent on the [email protected] web site are visible only to the sender and recipient. [email protected] does not examine or police the content of private messages. If you receive unwanted private messages from another [email protected] user, you may add them to your message filter . This will prevent you from seeing any public or private messages from that user.

If you use our web site forums you must follow the posting guidelines . Messages posted to the [email protected] forums are visible to everyone, including non-members. By posting to the forums, you are granting irrevocable license for anyone to view and copy your posts.

Is it safe to run [email protected]?

Any time you download a program through the Internet you are taking a chance: the program might have dangerous errors, or the download server might have been hacked. [email protected] has made efforts to minimize these risks. We have tested our applications carefully. Our servers are behind a firewall and are configured for high security. To ensure the integrity of program downloads, all executable files are digitally signed on a secure computer not connected to the Internet.

The applications run by [email protected] may cause some computers to overheat. If this happens, stop running [email protected] or use a utility program that limits CPU usage.

[email protected] was developed by . BOINC was developed at the University of California.


[email protected] and assume no liability for damage to your computer, loss of data, or any other event or condition that may occur as a result of participating in [email protected]

Other BOINC projects

Other projects use the same platform, BOINC, as [email protected] You may want to consider participating in one or more of these projects. By doing so, your computer will do useful work even when [email protected] has no work available for it.

These other projects are not associated with [email protected], and we cannot vouch for their security practices or the nature of their research. Join them at your own risk.