If your PC has a hard disk, you are authorized to copy to computer program from the original disk to
the hard disk for day-to-day use. Once you copy it, you must not use the program on a second PC.
After you copy it, secure the original disk. If you want to use the program on a second PC, you must
first erase the program from the hard disk in the first PC. The program may not be used on two PCs
at the same time.
If your PC has only floppy disk drives, you are authorized to make a backup copy of the original
program disk for day-to-day use. If you have several PCs In the office, you may use the copy on any
of those PCs. However, you may not make two copies and use the program on two PCs at the same
time. After you make your backup copy, secure the original disk.
If you transfer (give) the program to another party (a person, office, or unit), they must also comply
with the software license agreement. You must give that party all copies of the program and all
documentation. Any copies you do not transfer must be destroyed. If you copied the program onto
your PCs hard disk, you must erase it.
NOTE
The above software license agreement is an example of a typical license agreement, and
does not apply to all Army-provided software. Each Army-provided computer program will
be covered by a unique agreement, so before you copy any program, read the agreement.
If you cannot understand the agreement, check with your ISSO. Software piracy is a
violation of the Copyright Act, the license agreement, and Army policy ... "proprietary
software will not be copied or duplicated unless permitted by the terms of the contract.
(paragraph 5-3e, AR 25-1).
Part K: Malicious Software
In the last couple of years, stores about computer viruses have ripped through the computer
community like a prairie fire. Reports of data-killing and program-killing viruses have made for some
sensational reading, but a virus is only one type of destructive computer program.
Part L: Destructive Programs
Virus: A virus is a program which, unknown to the user, performs a destructive act and can
reproduce Itself. If you use an infected floppy disk on your PC, the virus will copy itself to the hard
disk. Once the hard disk is infected, any floppy you use on the PC gets infected as the virus
replicates Itself from the hard disk to the floppy. If you use that inflected floppy on a second PC, the
virus spreads to it. A virus can be a logic bomb or a Trojan home.
Logic bomb: Also known as a "time bomb," this is a computer program which performs a destructive
act, like erasing computer programs or data, when triggered by a particular date or event. The
"Columbus Day" virus is the one which has received the most publicity.
Trojan horse: This type of computer program is named after the Trojan Horse in Greek mythology
which looked harmless, but held destruction within. A Trojan Horse contains code which appears
IT0772
6-8