CONSENT TO MONITORING: This is a Department of Defense
computer system. This computer system, including all related equipment, networks
and network devices (specifically including Internet access), are provided only
for authorized U.S. Government use. DOD computer systems may be monitored for
all lawful purposes, including to ensure that their use is authorized, for
management of the system, to facilitate protection against unauthorized access,
and to verify security procedures, survivability, and operational security.
Monitoring includes active attacks by authorized DOD entities to test or verify
the security of this system. During monitoring, information may be examined,
recorded, copied, and used for authorized purposes. All information, including
personal information, placed on or sent over this system may be monitored. Use
of this DOD computer system, authorized or unauthorized, constitutes consent to
monitoring of this system. Unauthorized use may subject you to criminal
prosecution. Evidence of unauthorized use collected during monitoring may be
used for administrative, criminal, or other adverse action. Use of this system
constitutes consent to monitoring for these purposes.
Website last updated: May 18,
2011