This Government computer system uses software programs to create summary statistics, which are used to assess what information is of most and least interest, to determine technical design specifications, and to identify system performance or problem areas.
Unauthorized attempts to upload information or change information on this Web site are strictly prohibited and may be in violation of the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
To ensure that the TSP Web site is secure and that this Web site is available to all users, this Government computer system employs software programs to monitor network traffic in order to identify unauthorized attempts to upload or change information, or damage the functioning of the Web site.
Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are routinely destroyed in accordance with National Archives and Records Administration General Schedule 20.