
ANALYZING… FILE TYPE: Safety Documentation PERIOD: Pre-Expedition TOPIC: Marathon AI Security Protocols SUMMARY: Excerpts from CyberAcme's digital security protocols aboard the UESC Marathon. This documentation was meant for a lay audience of colonists, not AI specialists. Based on file metadata, compliance with these security protocols was an ongoing concern. =================================================================== Welcome aboard the UESC Marathon. CyberAcme protocol requires you to carefully observe best practices when interfacing with the UESC Marathon's shipboard AI helpers. Your diligence will help ensure a safe, efficient, and harmonious journey to Tau Ceti IV. Each AI governs a suite of critical functions aboard the UESC Marathon. As a [CIVILIAN CREW MEMBER], your authorized interactions will be with [DURANDAL], our daily operations AI. You should not consider this list of best practices exhaustive. If any shipboard AI exhibits unexpected behavior, please file a maintenance request using an authorized and secured CyberAcme terminal.[1] Do not re-engage with the AI until the maintenance request has been successfully examined and closed. Do not grant any AI root access to unarchived documentation.[2] Do not entertain philosophical discussions outside of mission parameters. Do not request the AI's assistance for frivolous personal entertainment. Do not access any AI hardware, even for diagnostic purposes. Give clear and specific directions, not questions. "Durandal, open airlock CD-177" and NOT "Hey, can you open this airlock?" Phrase requests for information as statements, not questions. "Durandal, tell me the air pressure in Lab 12" and NOT "Durandal, what's the air pressure in Lab 12?" Strongly encourage timely task completion. All CyberAcme AI are programmed to gain psychological stability from personal usefulness. Thank you for completing this briefing on the UESC Marathon's digital security protocols. Remember, safety is everyone's responsibility. =================================================================== [1] If you do not have permission to access an authorized and secured CyberAcme terminal, alert your deck security officer for assistance. [2] Includes documentation about the AI itself, such as this very protocol list. =================================================================== TYPE: TEXT [X]; AUDIO [ ]