YOU ARE ACCESSING A U.S. GOVERNMENT (USG) INFORMATION SYSTEM (IS) THAT IS PROVIDED
FOR USG-AUTHORIZED USE ONLY. By using this IS (which includes any device attached to this IS), you
consent to the following conditions: The USG routinely intercepts and monitors communications on this IS for
purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense,
personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. At any time, the USG
may inspect and seize data stored on this IS. Communications using, or data stored on, this IS are not private, are
subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.
This IS includes security measures (e.g., authentication and access controls) to protect USG interests–not for your
personal benefit or privacy. Notwithstanding the above, using this IS does not constitute consent to PM, LE, or CI
investigative searching or monitoring of the content of privileged communications, or work product, related to personal
representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work
product are private and confidential. See Terms of Use, and Privacy Policy for details.
By accepting this document, you acknowledge
and consent that when you access Department of Defense (DoD) information
systems:
You are accessing a U.S. Government
(USG) information system (IS) (which includes any device attached to this
information system) that is provided for U.S. Government authorized use only.
You consent to the following
conditions:
The U.S.
Government routinely intercepts and monitors communications on this information
system for purposes including, but not limited to, penetration testing,
communications security (COMSEC) monitoring, network operations and defense,
personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI)
investigations.
At any time,
the U.S. Government may inspect and seize data stored on this information
system.
Communications using, or data stored on, this information system are not
private, are subject to routine monitoring, interception, and search, and may
be disclosed or used for any U.S. Government-authorized purpose.
This
information system includes security measures (e.g., authentication and access
controls) to protect U.S. Government interests–not for your personal benefit
or privacy.
Notwithstanding the above, using an
information system does not constitute consent to personnel misconduct, law
enforcement, or counterintelligence investigative searching or monitoring of
the content of privileged communications or data (including work product) that
are related to personal representation or services by attorneys,
psychotherapists, or clergy, and their assistants. Under these circumstances,
such communications and work product are private and confidential, as further
explained below:
Nothing in this User Agreement shall
be interpreted to limit the user’s consent to, or in any other way restrict or
affect, any U.S. Government actions for purposes of network administration,
operation, protection, or defense, or for communications security. This
includes all communications and data on an information system, regardless of
any applicable privilege or confidentiality.
The user consents to
interception/capture and seizure of ALL communications and data for any
authorized purpose (including personnel misconduct, law enforcement, or
counterintelligence investigation).В However, consent to interception/capture
or seizure of communications and data is not consent to the use of privileged
communications or data for personnel misconduct, law enforcement, or
counterintelligence investigation against any party and does not negate any
applicable privilege or confidentiality that otherwise applies.
Whether any particular communication
or data qualifies for the protection of a privilege, or is covered by a duty of
confidentiality, is determined in accordance with established legal standards
and DoD policy. Users are strongly encouraged to seek personal legal counsel on
such matters prior to using an information system if the user intends to rely
on the protections of a privilege or confidentiality.
Users should take reasonable steps
to identify such communications or data that the user asserts are protected by
any such privilege or confidentiality. However, the user’s identification or
assertion of a privilege or confidentiality is not sufficient to create such
protection where none exists under established legal standards and DoD policy.
A user’s failure to take reasonable
steps to identify such communications or data as privileged or confidential
does not waive the privilege or confidentiality if such protections otherwise
exist under established legal standards and DoD policy. However, in such cases
the U.S. Government is authorized to take reasonable actions to identify such
communication or data as being subject to a privilege or confidentiality, and
such actions do not negate any applicable privilege or confidentiality.
These conditions preserve the
confidentiality of the communication or data, and the legal protections
regarding the use and disclosure of privileged information, and thus such
communications and data are private and confidential. Further, the U.S.
Government shall take all reasonable measures to protect the content of
captured/seized privileged communications and data to ensure they are
appropriately protected.
In cases
when the user has consented to content searching or monitoring of
communications or data for personnel misconduct, law enforcement, or
counterintelligence investigative searching, (i.e., for all communications and
data other than privileged communications or data that are related to personal
representation or services by attorneys, psychotherapists, or clergy, and their
assistants), the U.S. Government may, solely at its discretion and in
accordance with DoD policy, elect to apply a privilege or other restriction on
the U.S. Government’s otherwise-authorized use or disclosure of such
information.
All of the
above conditions apply regardless of whether the access or use of an
information system includes the display of a Notice and Consent Banner
("banner"). When a banner is used, the banner functions to remind the
user of the conditions that are set forth in this User Agreement, regardless of
whether the banner describes these conditions in full detail or provides a
summary of such conditions, and regardless of whether the banner expressly
references this User Agreement.
As a user of
an information system, I will adhere to the following security rules
I will use Army information systems
(computers, systems, and networks) only for authorized purposes.
I will not try to access data or use operating systems or programs,
except as specifically authorized.
I know I will be issued a user identifier (user ID) and a password to
authenticate my JSS account. After receiving
them—
I will not allow anyone else to have or use my password. If I know that
my password is compromised, I will report to my JSS
Webmaster for a new one.
I will not run “sniffers” (utilities used to monitor network traffic,
commonly used to Spy on other network users and attempt to collect their
passwords) or any hacker-related software on my GC, Government IT system, or
network.
If I observe anything on the system I am using that indicates inadequate
security, I will immediately notify the site Webmaster.
I know what constitutes a security incident and know that I must immediately
report such incidents to the Webmaster
I will comply with security guidance issued by my SA and IASO.
I know that my actions as a user can greatly affect the security of the
system and that my signature on this agreement indicates that I understand my
responsibility as a user requires that I adhere to regulatory guidance.
I know I am subject to disciplinary action if I violate DOD computer
policy. For U.S. personnel, this means that if I fail to comply with this
policy, I may be subject to adverse administrative action or punishment under
Article 92 of the Uniform Code of Military Justice (UCMJ). If I am not subject
to the UCMJ, I may be subject to adverse action under the United States Code or
Code of Federal Regulations.
Acknowledgement: I have read the above requirements regarding use of JSS
access systems.В I understand my responsibilities regarding these systems and
the information contained in them.
2011 National Guard Professional Development Seminar
11/19/2010
Attached are the Professional Development Seminar announcement memorandums. Registration for the event is open. There is a separate link for each program so ensure that you use the right link. Registering for the hotel will automatically register you for the Professional Development Seminar. The 2011J1Staff memo is NGB J1 staff a
Family Program – Financial Management Awareness Program
10/29/2010
Military Saves is a social marketing campaign to persuade, motivate, and encourage military families to save money every month, and to convince leaders and organizations to be aggressive in promoting automatic savings.