Community Outreach


Acceptable Use Policy (AUP)

By accepting this document, you acknowledge
and consent that when you access Department of Defense (DoD) information
systems:

  1. You are accessing a U.S. Government
    (USG) information system (IS) (which includes any device attached to this
    information system) that is provided for U.S. Government authorized use only.
  2. You consent to the following
    conditions:

    1. The U.S.
      Government routinely intercepts and monitors communications on this information
      system for purposes including, but not limited to, penetration testing,
      communications security (COMSEC) monitoring, network operations and defense,
      personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI)
      investigations.
    2. At any time,
      the U.S. Government may inspect and seize data stored on this information
      system.
    3. Communications using, or data stored on, this information system are not
      private, are subject to routine monitoring, interception, and search, and may
      be disclosed or used for any U.S. Government-authorized purpose.
    4. This
      information system includes security measures (e.g., authentication and access
      controls) to protect U.S. Government interests–not for your personal benefit
      or privacy.
  3. Notwithstanding the above, using an
    information system does not constitute consent to personnel misconduct, law
    enforcement, or counterintelligence investigative searching or monitoring of
    the content of privileged communications or data (including work product) that
    are related to personal representation or services by attorneys,
    psychotherapists, or clergy, and their assistants. Under these circumstances,
    such communications and work product are private and confidential, as further
    explained below:
  4. Nothing in this User Agreement shall
    be interpreted to limit the user’s consent to, or in any other way restrict or
    affect, any U.S. Government actions for purposes of network administration,
    operation, protection, or defense, or for communications security. This
    includes all communications and data on an information system, regardless of
    any applicable privilege or confidentiality.
  5. The user consents to
    interception/capture and seizure of ALL communications and data for any
    authorized purpose (including personnel misconduct, law enforcement, or
    counterintelligence investigation).В However, consent to interception/capture
    or seizure of communications and data is not consent to the use of privileged
    communications or data for personnel misconduct, law enforcement, or
    counterintelligence investigation against any party and does not negate any
    applicable privilege or confidentiality that otherwise applies.
  6. Whether any particular communication
    or data qualifies for the protection of a privilege, or is covered by a duty of
    confidentiality, is determined in accordance with established legal standards
    and DoD policy. Users are strongly encouraged to seek personal legal counsel on
    such matters prior to using an information system if the user intends to rely
    on the protections of a privilege or confidentiality.
  7. Users should take reasonable steps
    to identify such communications or data that the user asserts are protected by
    any such privilege or confidentiality. However, the user’s identification or
    assertion of a privilege or confidentiality is not sufficient to create such
    protection where none exists under established legal standards and DoD policy.
  8. A user’s failure to take reasonable
    steps to identify such communications or data as privileged or confidential
    does not waive the privilege or confidentiality if such protections otherwise
    exist under established legal standards and DoD policy. However, in such cases
    the U.S. Government is authorized to take reasonable actions to identify such
    communication or data as being subject to a privilege or confidentiality, and
    such actions do not negate any applicable privilege or confidentiality.
  9. These conditions preserve the
    confidentiality of the communication or data, and the legal protections
    regarding the use and disclosure of privileged information, and thus such
    communications and data are private and confidential. Further, the U.S.
    Government shall take all reasonable measures to protect the content of
    captured/seized privileged communications and data to ensure they are
    appropriately protected.

    1. In cases
      when the user has consented to content searching or monitoring of
      communications or data for personnel misconduct, law enforcement, or
      counterintelligence investigative searching, (i.e., for all communications and
      data other than privileged communications or data that are related to personal
      representation or services by attorneys, psychotherapists, or clergy, and their
      assistants), the U.S. Government may, solely at its discretion and in
      accordance with DoD policy, elect to apply a privilege or other restriction on
      the U.S. Government’s otherwise-authorized use or disclosure of such
      information.
    2. All of the
      above conditions apply regardless of whether the access or use of an
      information system includes the display of a Notice and Consent Banner
      ("banner"). When a banner is used, the banner functions to remind the
      user of the conditions that are set forth in this User Agreement, regardless of
      whether the banner describes these conditions in full detail or provides a
      summary of such conditions, and regardless of whether the banner expressly
      references this User Agreement.

As a user of
an information system, I will adhere to the following security rules

  1. I will use Army information systems
    (computers, systems, and networks) only for authorized purposes.
  2. I will not try to access data or use operating systems or programs,
    except as specifically authorized.
  3. I know I will be issued a user identifier (user ID) and a password to
    authenticate my JSS account. After receiving
    them—
  4. I will not allow anyone else to have or use my password. If I know that
    my password is compromised, I will report to my JSS
    Webmaster for a new one.
  5. I will not run “sniffers” (utilities used to monitor network traffic,
    commonly used to Spy on other network users and attempt to collect their
    passwords) or any hacker-related software on my GC, Government IT system, or
    network.
  6. If I observe anything on the system I am using that indicates inadequate
    security, I will immediately notify the site Webmaster.
    I know what constitutes a security incident and know that I must immediately
    report such incidents to the Webmaster
  7. I will comply with security guidance issued by my SA and IASO.
  8. I know that my actions as a user can greatly affect the security of the
    system and that my signature on this agreement indicates that I understand my
    responsibility as a user requires that I adhere to regulatory guidance.
  9. I know I am subject to disciplinary action if I violate DOD computer
    policy. For U.S. personnel, this means that if I fail to comply with this
    policy, I may be subject to adverse administrative action or punishment under
    Article 92 of the Uniform Code of Military Justice (UCMJ). If I am not subject
    to the UCMJ, I may be subject to adverse action under the United States Code or
    Code of Federal Regulations.
  10. Acknowledgement: I have read the above requirements regarding use of JSS
    access systems.В I understand my responsibilities regarding these systems and
    the information contained in them.

 

Community Outreach

You and the Community

Community Outreach is defined as an endeavor by an organization to connect its ideas
or practices to the efforts of other organizations, groups, specific audiences or
the general public. The National Guard Family Program Community Outreach focuses
on connecting Guard families with local, regional, and national organizations in
support of their everyday lives at home.

Partnerships

The National Guard works closely with the local, regional and national communities
to link their services to the services already available to the Guard. We have formed
partnerships with the following organizations:

  • Veterans of Foreign Wars (VFW)
  • American Veterans (AMVETS)
  • Disabled American Veterans (DAV)
  • American Legion
  • United Service Organizations (USO)
  • America’s Adopt A Soldier

Interested in requesting National Guard Service Members or Family Members to participate in a survey and/or study? Please follow the below guidelines and reference the below document.

No matter if your request is nationwide or specific to a state or region, the request may be made by email or hard copy to Mr. Alex Baird, Chief of Family Program Division at [email protected] or 1411 Jefferson Davis Highway, Arlington, VA 22202-3231. There should be a letter from your university or establishment stating that you are a student or employee in good standing and have the support of the aforementioned university or establishment. In addition, please provide a letter that explains the nature of your research and how it will be utilized, as well as a copy of your proposed survey and/or study.

If your request is approved, our office will contact the appropriate leadership members for distribution. Please note: there is no guarantee of participation since the National Guard Bureau cannot require or request such participation. The National Guard Bureau may only present the opportunity to assist you in your research.

Please click here to view regulations.

Interested in partnering / collaborating / working together for military families?

Email Beth Horrigan:

To
First Name
Last Name
Your Email 
State of Residence
Role
Category
Subject 
Your Message