Thank you for visiting the Picatinny Website and reviewing our privacy policy. Our privacy policy is clear:
We will collect no personal information about you when you visit our website unless you choose to provide
that information to us.
Here is how we handle information about your visit to our website:
Picatinny Internet Security Policy
For site security purposes and to ensure that this service remains available to all users, this government computer
system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change
information, or otherwise cause damage.
Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be
punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
Information Collected and Stored Automatically
If you do nothing during your visit but browse through the website, read pages, or download information, we will
gather and store certain information about your visit automatically. This information does not identify you personally.
We automatically collect and store only the following information about your visit:
- The Internet domain (for example, "xcompany.com" if you use a private Internet access account, or "yourschool.edu"
if you connect from a university's domain) and IP address (an IP address is a number that is automatically assigned
to your computer whenever you are surfing the Web) from which you access our website;
- The type of browser and operating system used to access our site;
- The date and time you access our site;
- The pages you visit; and
- If you linked to the Picatinny website from another website, the address of that website.
We use this information to help us make our site more useful to visitors -- to learn about the number of visitors to
our site and the types of technology our visitors use. We do not track or record information about individuals and their visits.
If You Send Us Personal Information
If you choose to provide us with personal information by sending an e-mail to someone in the Picatinny, or by filling
out a form with your personal information and submitting it through our website, we use that information to respond to
your message and to help us provide you with information that you request. If you submit your resume through our website,
we use your personal identification information only in considering your application for employment. We do not collect
personal information for any other purposes. The information you provide is not given to any private organizations or private
persons. The Picatinny does not collect or use information for commercial marketing.
Links to Other Sites
Our website has links to the websites of many other federal agencies. In a few cases, we link to private organizations, with
their permission. Before leaving the Picatinny website, a page will appear informing you that you are leaving our server. Once
you link to another site, you are subject to the privacy policy of the new site.
This is a Department of Defense (DoD) Computer System
This computer system, including all related equipment, networks, and
network devices (specifically including Internet Access), are provided only for
authorized U. S. government use. DoD computer systems may be monitored for all
lawful purposes, including ensuring that their use is authorized, for management
of the system, to facilitate protection against unauthorized access, and to
verify security procedures, survivability, and operational security. Monitoring
includes active attacks by authorized
DoD entities to test or verify the
security of the system. During monitoring, information may be examined,
recorded, copied and used for authorized purposes. All information, including
personal information placed on or sent over this system may be monitored. Use of
this DoD Computer system, authorized or unauthorized, constitutes consent to
monitoring of this system. Unauthorized use collected during monitoring may be
used for administrative, criminal, or adverse action. Use of this system
constitutes consent to monitoring for these purposes.
|