| 8 |   |  * Volunteers are typically members of the general public who own Internet-connected PCs. Organizations such as schools and businesses may also volunteer the use of their computers. | 
                      
                        | 9 |   |  * Projects are typically academic (university-based) and do scientific research. But there are exceptions; for example, [http://www.mersenne.org/ GIMPS] and [http://www.distributed.net/ distributed.net] (two major projects) are not academic. | 
                      
                      
                        |   | 9 |  * Volunteers are typically members of the general public who own Internet-connected PCs. | 
                      
                        |   | 10 |   Organizations such as schools and businesses may also volunteer the use of their computers. | 
                      
                        |   | 11 |  * Projects are typically academic (university-based) and do scientific research. | 
                      
                        |   | 12 |   But there are exceptions; for example, [http://www.mersenne.org/ GIMPS] | 
                      
                        |   | 13 |   and [http://www.distributed.net/ distributed.net] (two major projects) are not academic. | 
                      
            
                      
                        | 13 |   |  * Volunteers are effectively anonymous; although they may be required to register and supply email address or other information, they are not linked to a real-world identity. | 
                      
                        | 14 |   |  * Because of their anonymity, volunteers are not '''accountable''' to projects. If a volunteer misbehaves in some way (for example, by intentionally returning incorrect computational results) the project cannot prosecute or discipline the volunteer. | 
                      
                      
                        |   | 17 |  * Volunteers are effectively anonymous; although they may be required to register | 
                      
                        |   | 18 |    and supply email address or other information, they are not linked to a real-world identity. | 
                      
                        |   | 19 |  * Because of their anonymity, volunteers are not '''accountable''' to projects. | 
                      
                        |   | 20 |    If a volunteer misbehaves in some way (for example, by intentionally returning | 
                      
                        |   | 21 |    incorrect computational results) the project cannot prosecute or discipline the volunteer. | 
                      
            
                      
                        | 16 |   |   * The volunteer trusts the project to provide applications that don't damage their computer or invade their privacy. | 
                      
                        | 17 |   |   * The volunteer trusts that the project is truthful about what work is being done by its applications, and how the resulting intellectual property will be used. | 
                      
                        | 18 |   |   * The volunteer trusts the project to follow proper security practices, so that hackers cannot use the project as a vehicle for malicious activities. | 
                      
                      
                        |   | 23 |   * The volunteer trusts the project to provide applications | 
                      
                        |   | 24 |     that don't damage their computer or invade their privacy. | 
                      
                        |   | 25 |   * The volunteer trusts that the project is truthful about what work is being done by its applications, | 
                      
                        |   | 26 |     and how the resulting intellectual property will be used. | 
                      
                        |   | 27 |   * The volunteer trusts the project to follow proper security practices, | 
                      
                        |   | 28 |     so that hackers cannot use the project as a vehicle for malicious activities. |