In ten pages this paper considers the Athena Rules of Use and other issues as they pertain to organizational security approaches. Ten sources are listed in the bibliography.