Site Security and Privacy


RULES AND REGULATIONS

  1. For site management, information is collected for statistical purposes. This government computer system uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.
  2. For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
  3. Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration General Schedule 20. All data collection activities are in strict accordance with DoD Directive 5240.1
  4. Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.

DISCLAIMER

Every attempt has been made to insure the accuracy of the information contained in the ISSO site, however, no warranty is made concerning the accuracy or timeliness of the information presented. Additionally, there is no implied warranty covering access to the government computer system hosting the ISSO site.

OFFICIAL DOD POLICY REGARDING WWW INFORMATION SYSTEMS