MHS logo

The Gateway

Policies & Guidelines

The following policies and guidelines apply to the MC4 website.

Comment Policy
We welcome your comments and sharing of content on The Gateway, MC4’s website.

The purpose of the commenting feature on The Gateway is to facilitate an ongoing dialogue about topics concerning the military health information technology. We retain the discretion to determine which comments violate our comment policy. We also reserve the right to remove violations. We expect all contributors to be respectful.

For the benefit of robust discussion, we ask that comments remain “on-topic.” A comment will be posted only if it relates to the topic discussed within the item it is submitted in response to.

Please observe the following rules or your comment will not be posted:

  • No profanity
  • No sexual content
  • No overly graphic, disturbing or offensive material
  • No vulgar or abusive language
  • No hate speech or offensive language targeting any specific demographic
  • No personal attacks
  • No spam
  • No promotions for commercial products or services
  • No unsolicited proposals or other business ideas or inquiries
  • Observe Army OPSEC guidelines

Please contact the appropriate MC4 office to have your training and assistance questions answered . The comments sections on The Gateway are places for discussions, they are not a substitute channel for MC4 services or general questions. Comments on The Gateway are not designed to offer MC4 customer service, and such questions submitted via the commenting feature will not be answered.

Members of the media are asked to send questions to the appropriate public affairs office through their normal channels and to refrain from submitting questions here as comments. Reporter questions will not be posted.

The views expressed on the site by non-federal commentators do not necessarily reflect the official views of MC4, the Department of Defense, or the federal government.

We recognize that the web is a 24-7 medium, and your comments are welcome at any time. However, given the need to manage resources, moderating and posting of comments will occur during regular business hours, Monday through Friday. Comments submitted after hours or on weekends will be read and posted as early as possible, in most cases, this means the next business day.

Please be aware of how much information you share in a comment since this information will be published on a public website. To protect your own privacy and the privacy of others, please do not include personally identifiable information, such as phone numbers, addresses, or email address of yourself or any other individual in the body of your comment. If you do voluntarily include personally identifiable information in your comment, such as your contact information, that comment may be edited for content or it may not be posted to The Gateway. In no circumstances will comments be posted that contain Social Security numbers, addresses, email address or phone numbers. You do have the option of posting comments anonymously.

The Gateway webmaster reserves the right to review all comments before they are posted, and to edit them to preserve readability for other users. We reserve the right to ban future comments from people who repeatedly violate our policy.

This comment policy is valid for all discussions hosted on The Gateway.

Thank you for taking the time to read this comment policy. We encourage your participation in our discussion and look forward to an active exchange of ideas.

Privacy Policy
The Product Manager, Medical Communications for Combat Casualty Care (PM MC4) World Wide Web (WWW) service is provided as a public service.

Information presented on the PM MC4 WWW service is considered public information and may be distributed or copied for non-commercial purposes. Use of appropriate byline/photo/image credits is requested.

For site management, information is collected.

This government computer system uses software programs to create summary statistics, which are used for website planning and maintenance, determining technical design specifications, and analyzing system performance.

For security purposes, and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic, to identify unauthorized attempts to upload or change information, to cause damage, or to deny service to authorized users.

Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Server logs are scheduled for regular destruction in accordance with National Archives and Records Administration General Schedule 20.

Unauthorized attempts to upload information or change information on this service are strictly prohibited and are punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act

This site does not use cookies of any sort. We place no information on your computer, nor do we attempt to read information that may have been stored on your system by others. We link to many other government and commercial sites, we cannot assume any responsibility for their use of Cookies.

External Links Disclaimer
The appearance of hyperlinks to external sites does not constitute endorsement by the Department of the U.S. Army of the linked website or the information, products or services contained therein. For other than authorized activities such as military exchanges and Morale, Welfare and Recreation sites, the Department of the U.S. Army does not exercise any editorial control over the information you may find at these locations. Such links are provided consistent with the stated purpose of this DOD web site.

Department of Defense Warning
This is a Department of Defense Computer System. This computer system, including all related equipment, networks, and network devices (specifically including Internet access) are provided only for authorized U.S. Government use. DOD computer systems may be monitored for all lawful purposes, including to ensure that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security. Monitoring includes active attacks by authorized DOD entities to test or verify the security of this system. During monitoring, information may be examined, recorded, copied and used for authorized purposes. All information, including personal information, placed or sent over this system may be monitored. Use of this DOD computer system, authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal, or other adverse action. Use of this system constitutes consent to monitoring for these purposes.

Suspicious Activity Reporting
Contact Army Counterintelligence via iSALUTE.

UNCLASSIFIED, NON-SENSITIVE, NON-PRIVACY ACT USE ONLY

Email someone the link to this page. Please fill out the fields below.

A copy of the message will be sent to your email address.

RECIPIENT NAME :

RECIPIENT EMAIL :

SENDER NAME :

SENDER EMAIL :

SUBJECT :

MESSAGE :

 


 

Privacy Policy

Subscribe to The Gateway Monthly, an MC4 wrap-up including news, tips, blogs and photos on military health information systems supporting the warfighters.

Delivered straight to your inbox, see what's new in the world of tactical electronic medical recording, medical logistics, and medical command and control missions.

RECIPIENT NAME :

RECIPIENT EMAIL :
 


Privacy Policy