1. This World Wide Web (WWW) site is provided as a public service by the Force Health Protection & Readiness Policy and Programs.

2. Information presented on this WWW site is considered public information and may be distributed or copied. Use of appropriate byline/photo/image credits is requested.

3. For site management, information is collected for statistical purposes. This government computer system uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.

Below is an example of the information collected based on a standard request for a World Wide Web document: - - [28/Jan/1997:00:00:01 -0500]
"GET /sitename/news/nr012797.html HTTP/1.0" 200 16704
Mozilla 3.0/ (or -- this is the host name (or IP address) associated with the requester (you as the visitor). In this case, ( the requester is coming from a commercial address. Depending on the requestor's method of network connection, the host name (or IP address) may or may not identify a specific computer. Connections via many Internet Service Providers assign different IP addresses for each session, so the host name identifies only the ISP. The host name (or IP address) will identify a specific computer if that computer has a fixed IP address.

[28/Jan/1997:00:00:01 -0500] -- this is the date and time of the request

"GET /sitename/news/nr012797.html HTTP/1.0" -- this is the location of the requested file

200 -- this is the status code - 200 is OK - the request was filled

16704 -- this is the size of the requested file in bytes

Mozilla 3.0 -- this identifies the type of browser software used to access the page, which indicates what design parameters to use in constructing the pages -- this indicates the last site the person visited, which indicates how people find this site

Requests for other types of documents use similar information. No other user-identifying information is collected.
4. For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.

This is a DoD computer system. This computer system, which includes all related equipment, networks, and network devices (specifically including access to the Internet), is provided only for official U.S. Government business. The information contained within this system is For Official Use Only and is classified as Sensitive. As an authorized user of this system, you accept responsibility for protecting it from unauthorized access or modification. When using the system, you also accept responsibility for protecting the information you work with from loss or misuse.

DoD computer systems may be monitored by authorized personnel to ensure that their use is authorized, to manage the system, to protect against unauthorized access, and to verify security procedures. Monitoring includes "hacker" attacks to test or verify the security of this system against use by unauthorized persons. During these activities, information stored on this system may be examined, copied, and used for authorized purposes, and data or programs may be placed on this system. Therefore, information you place on this system is not private. Use of this DoD computer system, authorized or unauthorized, constitutes consent to official monitoring of this system. Unauthorized use of a DoD computer system may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be provided to appropriate personnel for administrative, criminal, or other action.

5. Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration General Schedule 20.

6. Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.

7. If you have any questions or comments about the information presented here, please forward them to us using the contact us email.