By signing this document, you acknowledge and consent that when you access Department of Defense (DoD) information systems:
-
You are accessing a U.S. Government information system (as defined in CNSSI 4009) that is provided for U.S. Government-authorized use only.
-
You consent to the following conditions:
-
The government routinely monitors communications occurring on
this information system, and any device attached to this information
system, for purposes including, but not limited to, penetration testing,
communications security (COMSEC) monitoring, network defense, quality
control, employee misconduct investigations, law enforcement
investigations, and counterintelligence investigations.
-
At any time, the government may inspect and/or seize data
stored on this information system and any device attached to this
information system.
-
Communications occurring on or data stored on this information
system, or any device attached to this information system, are not
private. They are subject to routine monitoring and search.
-
Any communications occurring on or data stored on this
information system, or any device attached to this information system,
may be disclosed or used for any U.S. Government-authorized purpose.
-
Security protections may be utilized on this information
system to protect certain interests that are important to the
government. For example, passwords, access cards, encryption or
biometric access controls provide security for the benefit of the
government. These protections are not provided for your benefit or
privacy and may be modified or eliminated at the government's
discretion.
|