The Army G-1 Web site is provided as a
public service by the U.S. Army, Deputy Chief of Staff, G-1.
Information presented on the Army G-1 Web
site is considered public information and may be distributed
or copied for government and commercial purposes. Use of appropriate
byline/photo/image credits is requested.
Site Security
For
security purposes, and to ensure that this service remains
available to all users, this government computer system employs
software programs to monitor network traffic, to identify
unauthorized attempts to upload or change information, to
cause damage, or to deny service to authorized users.
Except for authorized law enforcement investigations,
no other attempts are made to identify individual users or
their usage habits. Server logs are scheduled for regular
destruction in accordance with National Archives and Records
Administration General Schedule 20.
Unauthorized attempts to upload information
or change information on this service are strictly prohibited
and may be punishable under the Computer Fraud and Abuse Act
of 1986 and the National Information Infrastructure Protection
Act.
Information Collected
This
government computer system uses software programs to create
summary statistics, which are used for Web site planning and
maintenance, determining technical design specifications,
and analyzing system performance.
We do not track, collect, or record information
about individuals and their visits.
Links to Other Sites
The
appearance of hyperlinks does not constitute an endorsement
by the U.S. Army of the Web site or the information, products,
or services contained therein. The U.S. Army does not exercise
any editorial control over the information you may find at
these locations.
DoD Warning
This is a DoD computer system. Before processing classified
information, check the security accreditation level of the
system. Do not process, store, or transmit information classified
above the accreditation level of the system. This computer
system, including all related equipment, networks, and network
devices (includes internet access), are provided only for
authorized U.S. government use. DoD computer systems may be
monitored for all lawful purposes, including to ensure that
their use is authorized, for management of the system, to
facilitate protection against unauthorized access, and to
verify security procedures, survivability, and operational
security.
Monitoring includes, but is not limited to,
active attacks by authorized DoD entities to test or verify
the security of the system. During monitoring, information
may be examined, recorded, copied, and used for authorized
purposes. All information, including personal information,
placed on or sent over this system may be monitored. Use of
this DoD computer system, authorized or unauthorized, constitutes
consent to monitoring. Unauthorized use of this DoD computer
system may subject you to criminal prosecution. Evidence of
unauthorized use collected during monitoring may be used for
administrative, criminal, or other adverse action. Use of
this system constitutes consent to monitoring for all lawful
purposes.
Use of this system constitutes consent to
monitoring for all lawful purposes. |