19. Appropriate steps will be taken to prevent the unauthorized duplication or publication of Contestants' entries. However, neither the Institute for Mimetic Sciences nor any of its agents can guarantee absolute security. Contestants, by entering this Competition, confirm their understanding of this and agree to hold the Institute for Mimetic Sciences and its agents harmless should there be any unauthorized duplication or publication of Computer Entries. Contestants who require absolute security will be allowed to operate their Computer Entries and/or provide their own hardware on-site. Computer Entries may be used by the Institute for Mimetic Sciences for demonstration or publicity purposes after the contest in a temporary exhibition lasting no more than one month.

20. Computer Entries will be required to record the conversations as text files on magnetic media. The recordings will remain the property of the Institute for Mimetic Sciences, which will also retain the copyright on transcripts or other representations, magnetic or otherwise, of the recordings. By entering the contest the Contestants shall assign copyright in the conversations recorded by the Computer Entries and in the contribution to those conversations made by the Computer Entries during the Competition and during the period of temporary display at the Institute for Mimetic Sciences.

21. The Contestants will retain copyright in their Entries and will grant to the Institute for Mimetic Sciences a license to use the Computer Entries for the judging and promotion of the Competition and/or the temporary exhibition but for no other purpose.

22. Unless the Contestants agree otherwise, the Institute for Mimetic Sciences will wipe all Competition Entries from the Competition hardware after the Competition and the temporary exhibition.

23. Applications must be accompanied by e-mail transcripts recording actual interactions between the system to be entered and one or more human beings. The protocols may not exceed 2,500 words.

24. The names "Loebner Prize" and "Loebner Prize Competition" may be used by contestants in advertising only by advance written permission of the Institute for Mimetic Sciences. Advertising is subject to approval by representatives of the Institute for Mimetic Sciences. Improper or misleading advertising may result in revocation of the Prize and/or other actions.

25. To avoid giving Judges clues as to the nature of the Computer Entries, Computer Entries run from a shell should use the default I/O (stdin/stdout). Computer Entries run in a windowed environment should use black on white in a 25x80 window or full screen mode, using the standard font, and should seek to mimic the Confederate communications program (download or screendump possible): it displays a menu bar with Connection Font TTY View Help. Providing a View menu option to set the title (for the title bar of the window) is desirable but not obligatory. Since ideally all Computer Entries will be connected to the communications program over serial lines or (preferably) via a network, like the Human Confederates, Computer Entries are advised to provide a command line or Communication menu option to communicate via a serial line or TCP socket, but are again not obliged to do so.

26. If in the opinion of the Judges a Computer Entry is not compliant with the Rules, the Computer Entry will be disqualified.

27. The Judges' decision will be final. Neither the Institute for Mimetic Sciences nor its agents accept liability in connection with the Prize.