Permalink
Cannot retrieve contributors at this time
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
52 lines (41 sloc)
1.9 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN"> | |
| <html> | |
| <head> | |
| <meta name="GENERATOR" content="Microsoft FrontPage 2.0"> | |
| <title>Computer System</title> | |
| </head> | |
| <body bgcolor="#FFFFFF"> | |
| <p>This is a Government Computer System<br> | |
| <br> | |
| The Army Records Management Division Home Page is provided as a | |
| public service by the Office of the The Adjutant General, Total | |
| Army Personnel Command, Deputy Chief of Staff for Personnel.. It | |
| is intended to be used by the public for viewing and retrieving | |
| information only. Unauthorized attempts to upload information or | |
| change information on this service are strictly prohibited and | |
| may be punishable under the Computer Fraud and Abuse Act of 1986. | |
| All information on this computer system is considered public | |
| information and may be distributed or copied.</p> | |
| <p>For site management, information is collected. </p> | |
| <p>This government computer system uses software programs to | |
| create summary statistics, which are used for website planning | |
| and maintenance, determining technical design specifications, and | |
| analyzing system performance. </p> | |
| <p>For security purposes, and to ensure that this service remains | |
| available to all users, this government computer system employs | |
| software programs to monitor network traffic, to identify | |
| unauthorized attempts to upload or change information, to cause | |
| damage, or to deny service to authorized users. </p> | |
| <p>Except for authorized law enforcement investigations, no other | |
| attempts are made to identify individual users or their usage | |
| habits. Server logs are scheduled for regular destruction in | |
| accordance with National Archives and Records Administration | |
| General Schedule 20. </p> | |
| <p>Unauthorized attempts to upload information or change | |
| information on this service are strictly prohibited and may be | |
| punishable under the Computer Fraud and Abuse Act of 1986 and the | |
| National Information Infrastructure Protection Act. <br> | |
| </p> | |
| <p> </p> | |
| </body> | |
| </html> |