Privacy and Security
This World Wide Web site is provided as a public service by the Defense Health Information Management System .
Information presented on this WWW site is considered public information and may be distributed or copied. Use of appropriate byline/photo/image credits is requested.
For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
This is a Department of Defense computer system. This computer system, which includes all related equipment, networks, and network devices (specifically including access to the Internet), is provided only for official U.S. Government business. The information contained within this system is For Official Use Only and is classified as Sensitive. As an authorized user of this system, you accept responsibility for protecting it from unauthorized access or modification. When using the system, you also accept responsibility for protecting the information you work with from loss or misuse.
DOD computer systems may be monitored by authorized personnel to ensure that their use is authorized, to manage the system, to protect against unauthorized access, and to verify security procedures. Monitoring includes "hacker" attacks to test or verify the security of this system against use by unauthorized persons. During these activities, information stored on this system may be examined, copied, and used for authorized purposes, and data or programs may be placed on this system. Therefore, information you place on this system is not private. Use of this DOD computer system, authorized or unauthorized, constitutes consent to official monitoring of this system. Unauthorized use of a DOD computer system may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be provided to appropriate personnel for administrative, criminal, or other action.
Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration General Schedule 20.
Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.