b'A Guide for Authors of Software2017OverviewWhat is considered software writing What is technology transfer? or data set compilation? For the purposes of this guide, technology transfer is the evalu-INL employees write many various software codes and data sets.ation, protection, marketing, and licensing of software and data This includes nontrivial spreadsheets, scientific or mathematicalsets to various entities, including open source and proprietary models, experiments designed to study data sets, or nontriviallicensing. Technology transfer can occur through publication, customizations to existing software. This guide applies to alleducation and employment, participation in scientific meet-software and data collections that are not specifically exempted. ings, and collaboration with industry through the licensing of innovations.Defining technology transfer: the transfer of knowledge, Key takeaways from this guide: ideas, discoveries and innovations to the public. Always file a Software Disclosure Record (SDR) for any software you write for INL unless it is exempt.Do this early in the development process to avoid costly delays. This includes all software, whether ornot it is intended to be released for an internal or external customer. Note: Some software is exempt from reporting. If any Never give INL software to anyone outside INLof the following apply, do not disclose the software in unless the laboratory has the rights to distributeaccordance with this guide.the code and the transfer is made under a contractThe software is classified, deals with classified information, with intellectual property (IP) terms that supportor disclosure of its existence may be used to infer INLs deployment strategy. This includes projectclassified information, or would create an identifiable risk collaborators from other DOE labs. Technologyto the detriment of national security, the confidentiality Deployment (TD) will assist in getting the properof government information, individual privacy, agency agreement in place. mission, programs or operations. If unsure, please speak Never put third party software, images, fonts orto a classification analyst from Security Programs and other assets into INL software without recording itsServices before disclosing.purpose and origination. The software is for a National Security System. This does Software written for INL belongs to the laboratory.not imply that the software cannot be disclosed, but the This guide outlines the process to make INLsauthor should speak with a security representative to software legally available outside of INL. determine if disclosure is appropriate.Ownership of software funded by other entitiesThe software is truly exploratory or disposable in nature, follows rules established in the contracting mechanism.such as that written by a developer experimenting with a TD can help authors navigate what INL owns andnew language or library.what is owned by somebody else. The software is simple configuration for existing software, trivial in nature and part of the normal configuration of that software.1'