DOD Acceptable Use Policy

 

You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions:

  • The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.
  • The USG may inspect and seize data stored on this IS at any time.
  • Communications or data stored on this IS are not private and are subject to routine monitoring, interception, search, and may be disclosed or used for any USG authorized purpose.
  • This IS includes security measures (e.g., authentication and access controls) to protect USG interests, not for your personal benefit or privacy.

Warning: 18 U.S.C. ยง 1030 prohibits unauthorized or fraudulent access to government computer systems. If the credentials you enter are not your own, you are in violation of this law and should exit this system immediately. Completing this action may subject you to a fine of up to $5,000 or double the value of anything obtained via this unauthorized access, plus up to five years imprisonment.

Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal, or other adverse action. Use of this DOD computer system constitutes consent to monitoring for these and other purposes.