Army G-1 Logo
Home | Links | PIK | Search   
Deputy Chief of Staff, Army G-1
spacer
Link to Command Group
Link to Civilian Personnel Policy
Link to Plans and Resources
Link to Military Personnel Policy
Link to ManPrint
Link to Human Resources
Link to Army Well Being Liaison
Link to Retirement Services
Link to Personnel Transformation
Link to Army Library Program
Link to Army  Research Institute
Link to Army Portal
U.S. Army Star Logo
 

Privacy and Security

   
   

The Army G-1 Web site is provided as a public service by the U.S. Army, Deputy Chief of Staff, G-1.

Information presented on the Army G-1 Web site is considered public information and may be distributed or copied for government and commercial purposes. Use of appropriate byline/photo/image credits is requested.


Site Security


For security purposes, and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic, to identify unauthorized attempts to upload or change information, to cause damage, or to deny service to authorized users.

Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Server logs are scheduled for regular destruction in accordance with National Archives and Records Administration General Schedule 20.

Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.


Information Collected


This government computer system uses software programs to create summary statistics, which are used for Web site planning and maintenance, determining technical design specifications, and analyzing system performance.

We do not track, collect, or record information about individuals and their visits.


Links to Other Sites


The appearance of hyperlinks does not constitute an endorsement by the U.S. Army of the Web site or the information, products, or services contained therein. The U.S. Army does not exercise any editorial control over the information you may find at these locations.


DoD Warning


This is a DoD computer system. Before processing classified information, check the security accreditation level of the system. Do not process, store, or transmit information classified above the accreditation level of the system. This computer system, including all related equipment, networks, and network devices (includes internet access), are provided only for authorized U.S. government use. DoD computer systems may be monitored for all lawful purposes, including to ensure that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security.

Monitoring includes, but is not limited to, active attacks by authorized DoD entities to test or verify the security of the system. During monitoring, information may be examined, recorded, copied, and used for authorized purposes. All information, including personal information, placed on or sent over this system may be monitored. Use of this DoD computer system, authorized or unauthorized, constitutes consent to monitoring. Unauthorized use of this DoD computer system may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal, or other adverse action. Use of this system constitutes consent to monitoring for all lawful purposes.

Use of this system constitutes consent to monitoring for all lawful purposes.





Some documents on this site require Adobe Acrobat Reader.