Make your own free website on

The Bigfoot Research Network Policies

As in any functional group, some policies are required. The goal here was to minimize the number. The basis of these remaining policies is to allow the Network to function smoothly and achieve its long-term goals. The policies may be updated as required.

1) This is a network of dedicated researchers, and some activity over a six-month period is required to maintain membership.

2) No member may take ownership of Network data for self-promotion.

3) Members participating in a group activity are required to share their information in a timely fashion.

4) Reports are required for all activities participated in; forms to expedite this process are used.

5) Members need to inform the Network of their activities and also if their plans change. This is to maintain organization and avoid duplication of efforts.

6) All members agree to uphold the Network's directives and policies.

7) Your security level is based on the quality of your research and not who you are.

8) No public misinformation is permitted by members using the Bigfoot Research Network name.

9) If Network information is used during media contacts, the Bigfoot Research Network should receive credit where due. Clear distinction should be made that the individual represents part of the collective Network effort, and that the individual's theories may not agree with that of the Network. BRN media contact should normally be referred to those within the Network which are approved to represent the BRN in media relations.

10) Members are not to disclose open case or confidential information to members with lower security levels or anyone outside the Network. This policy is also for your own protection, because disclosing some information can create legal problems for the member at fault. See more about the security polices below.

11) Members are always welcome and expected to voice their opinions.

12) Members should accept that their evidence and research may be challenged, and second opinions are generally required. This is in accordance with the methods of science, and shouldn't be thought of as a personal attack.

13) Network members involved with solicitation for incident reports should use the Network report processing system, in order to maintain data consistency.

14) Always avoid evidence tampering, unless required for sampling or casting; obtain photo/video documentation first.

15) All witnesses are to be treated with respect and courtesy.

16) Members should be aware of and respect private property.

17) Field activities should be conducted with minimal impact on the environment. Areas are to be left as they were found and no excessive noise or bonfires are approved.

18) Currently, the Network supports a no-hunting-to-kill policy in regards to the creature.

19) Profanity and frivolous communication are not proper email conduct in the Network.

20) All members are responsible for their own actions and conduct.

21) Closed case data will be publicly releasable in a limited form yet to be stated.

22) Any equipment loaned to other members should be returned to the owner within the agreed time frame and in the same condition as it was received. The person borrowing the equipment is responsible for the repair or replacement of any equipment that is damaged, lost or stolen. 


Security Policies

Due to the numerous problems associated with an unsecured system, the following security system is used. The system is based on a five-level tier of privileges. Each level will have different degrees of access to report details, database info, voting privileges, member personal information, and network communications. Member security clearance will be increased or decreased using a fair evaluation system based on the member's honesty, quality of work, dedication, and sincerity. The lower levels have all the limitations of the levels above them, plus the limits described for their level. The divisions are as follows: Level one: unlimited. Level two: unlimited except for modification of the database and web site, and some member/applicant/witness personal info. Level three: no witness names or exact locations on reports unless involved, and no confidential member/applicant personal information access. Level four: more limited details on reports, no voting privileges, no access to databases, can't see or make comments on public questions or comments, may volunteer for cases/projects and then be fully briefed. Level five: no access to member web site, no open case details, limited details on closed cases, network will notify members in this category to join a project/case. Most favorable new applicants would start at level four. Problem individuals or unknown members accepted, would start in a probationary level 5 category.  Each level will have a separate email list for higher-to-lower level information flow; all information would flow upwards. All levels are able to communicate with each other.

Copyright 2000-2002 Bigfoot Research Network.  All rights reserved.