There are times when
your message is forwarded, as e-mail, to other Marine Corps Base
Hawaii employees who may be better able to provide a response to
you. Except for authorized law enforcement investigations,
we do not share e-mail or your personal information with any other
outside organizations. While your information is on our
computer system it is protected from unauthorized release through
the use of strong password authentication, firewalls, and other
appropriate access controls, on both the web server and computer
network, which prevent access by unauthorized personnel or
computer systems. Your emails, comments, and personal information are deleted
from our computer system when no longer needed.
This web site does not use
persistent cookies, i.e., tokens that pass information back and
forth from your machine to the server and remain after you close
your browser. This web site does use a session cookie, i.e.,
tokens that remain active only until you close your browser, to
track Marine Corps Base Hawaii users who log into our Outlook web
server. The Outlook Web Access link is intended for our Base
users only. If you inadvertently click on this link and you
are not a Base user, you will still be sent a session cookie but,
you will not be able to access the Outlook web server. No
database of information obtained from this cookie is kept and when
you close your browser, the cookie is deleted from your computer.
If you inadvertently click on the Outlook Web Access link, you can
choose not to accept the cookie and leave the Outlook Web Access
page. The help information in your browser software should
provide you with instruction on how to disable cookies.
For site security purposes and to
ensure that this service remains available to all users, this
government computer system employs software programs to monitor
network traffic to identify unauthorized attempts to upload or
change information, or otherwise cause damage.
Except for authorized law
enforcement investigations, no other attempts are made to identify
individual users or their usage habits. Raw data logs are used for
no other purposes and are scheduled for regular destruction in
accordance with National Archives and Records Administration Records
Schedules.
Unauthorized attempts to upload
information or change information on this service are strictly
prohibited and may be punishable under the Computer Fraud and
Abuse Act of 1986 and the National Information Infrastructure
Protection Act.
|