Skip to content
Permalink
main
Switch branches/tags
Go to file
 
 
Cannot retrieve contributors at this time
<html>
<head>
<title>About MCAS Iwakuni </title>
<meta name="Microsoft Border" content="tl, default"></head>
<body><!--msnavigation--><table border="0" cellpadding="0" cellspacing="0" width="100%"><tr><td>
<p><a name="top"></a></p>
</td></tr><!--msnavigation--></table><!--msnavigation--><table border="0" cellpadding="0" cellspacing="0" width="100%"><tr><td valign="top" width="1%">
<p>&nbsp;</p>
</td><td valign="top" width="24"></td><!--msnavigation--><td valign="top">
<table>
<tr>
<td WIDTH="80%" ALIGN="CENTER"><p align="center"><font face="Times New Roman"><big><big><big><big><strong><font COLOR="#FF3000">MCAS IWAKUNI</font><br>
</strong></big></big></big></big></font></td>
</tr>
<tr>
<td WIDTH="80%" ALIGN="CENTER">&nbsp;<p><font SIZE="5" COLOR="#003068">PRIVACY AND SECURITY
NOTICE</font> <br>
</p>
<p align="left">1. This official MCAS Iwakuni website is provided as a public service by
the MCAS Iwakuni Office of Public Affairs. <br>
<br>
2. Information presented on the MCAS Iwakuni website is considered public information and
may be distributed or copied. Use of appropriate byline/photo/image credits is requested. <br>
<br>
3. For site management, web server usage and referrer logs are collected for statistical
purposes. This government computer system uses software programs to create summary
statistics, which are used for such purposes as assessing what information is of most and
least interest, determining technical design specifications, and identifying system
performance or problem areas. <br>
<br>
4. For site security purposes and to ensure that this service remains available to all
users, this government computer system employs software programs to monitor network
traffic to identify unauthorized attempts to upload or change information, or otherwise
cause damage. <br>
<br>
5. Except for authorized law enforcement investigations, no other attempts are made to
identify individual users or their usage habits. Raw data logs are used for no other
purposes and are scheduled for regular destruction in accordance with National Archives
and Records Administration General Schedule 20. <br>
<br>
6. Unauthorized attempts to upload information or change information on this service are
strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986
and the National Information Infrastructure Protection Act. <br>
<br>
7. If you have any questions or comments about the information presented here, please
forward them to <a href="mailto:keefet@iwakuni.usmc.mil">KEEFET@IWAKUNI.USMC.MIL</a> in
the MCAS Iwakuni Office of Public Affairs. </td>
</tr>
</table>
<table width="760">
<tr>
<td height="21" width="756"><p align="center"><a href="Index3.htm"><small>Back to Home
Page</small></a></td>
</tr>
</table>
<!--msnavigation--></td></tr><!--msnavigation--></table></body>
</html>