YOU ARE ACCESSING A U.S. GOVERNMENT (USG) INFORMATION SYSTEM (IS) THAT IS PROVIDED
FOR USG-AUTHORIZED USE ONLY. By using this IS (which includes any device attached
to this IS), you consent to the following conditions: The USG routinely intercepts
and monitors communications on this IS for purposes including, but not limited to,
penetration testing, COMSEC monitoring, network operations and defense, personnel
misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.
At any time, the USG may inspect and seize data stored on this IS. Communications
using, or data stored on, this IS are not private, are subject to routine monitoring,
interception, and search, and may be disclosed or used for any USG-authorized purpose.
This IS includes security measures (e.g., authentication and access controls) to
protect USG interests–not for your personal benefit or privacy. Notwithstanding
the above, using this IS does not constitute consent to PM, LE, or CI investigative
searching or monitoring of the content of privileged communications, or work product,
related to personal representation or services by attorneys, psychotherapists, or
clergy, and their assistants. Such communications and work product are private and
confidential. See Terms of Use, and
Privacy Policy for details.
-
п»їGet to Know Us
The National Guard Family Program exists for the sole purpose of supporting and
educating Families along the path of their National Guard life.
Discover Family Programs
-
п»їSupporting National Guard Kids
Children of all ages can be affected at any phase of military life. We have programs
to help one and all.
Our Youth Page
-
Family Readiness
We’re here to see you through your daily challenges and prepare you for the ones
that lie ahead.
Learn more
To narrow your search, select one or more additional filters below. Otherwise, leave un-selected to view everything matching your search criteria above. When done, click Find Now
Yellow Ribbon Events
More Events
Welcome to the NEW home of the
National Guard Family Program!
п»їWithout strong Families who stand by their National Guard Member, a successful
National Guard could not exist. With the ever-changing face and duties of the National
Guard, it’s important to help National Guard Families achieve
readiness for what’s ahead while remaining flexible in the Present. We support
you, the National Guard Family, by recognizing the sacrifices you make in support
of your loved ones who serve. Through our brand new home on the web and your
Family Program Office , you can find out about the services
, programs and assistance we provide for Service Members, Spouses, Parents and Youth. Join JSS to get Started
Family Services.
Serving in the National Guard can present new challenges to military Families. Whether
it is financial, emotional, household, or health benefits support you need, National
Guard Family Program strives to empower you with the tools to maintain or become
self-sufficient. Family Program Services
п»їFamily Readiness.
Family Readiness is Mission Readiness. Family Readiness is the level of awareness
Families and their Guard Members have in preparation for that call to state or federal
active duty. Just follow these six steps and learn how we can support you.
Youth.
The National Guard Youth Program serves children and youth ages 6-18 and provides
opportunities for youth to develop their physical, social, emotional and cognitive
abilities and to experience achievement, leadership, employment, friendship and
recognition. Learn more
В© 2009 Joint Services Support – All rights reserved.
JSS Home
YOU ARE ACCESSING A U.S. GOVERNMENT (USG) INFORMATION SYSTEM (IS) THAT IS PROVIDED
FOR USG-AUTHORIZED USE ONLY. By using this IS (which includes any device attached
to this IS), you consent to the following conditions: The USG routinely intercepts
and monitors communications on this IS for purposes including, but not limited to,
penetration testing, COMSEC monitoring, network operations and defense, personnel
misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.
At any time, the USG may inspect and seize data stored on this IS. Communications
using, or data stored on, this IS are not private, are subject to routine monitoring,
interception, and search, and may be disclosed or used for any USG-authorized purpose.
This IS includes security measures (e.g., authentication and access controls) to
protect USG interests–not for your personal benefit or privacy. Notwithstanding
the above, using this IS does not constitute consent to PM, LE, or CI investigative
searching or monitoring of the content of privileged communications, or work product,
related to personal representation or services by attorneys, psychotherapists, or
clergy, and their assistants. Such communications and work product are private and
confidential. See Terms of Use,
and Privacy Policy for details.
EnterLeave
Acceptable Use Policy (AUP)
By accepting this document, you acknowledge and consent that when you access Department
of Defense (DoD) information systems:
- You are accessing a U.S. Government (USG) information system (IS) (which includes
any device attached to this information system) that is provided for U.S. Government
authorized use only.
- You consent to the following conditions:
- The U.S. Government routinely intercepts and monitors communications on this information
system for purposes including, but not limited to, penetration testing, communications
security (COMSEC) monitoring, network operations and defense, personnel misconduct
(PM), law enforcement (LE), and counterintelligence (CI) investigations.
- At any time, the U.S. Government may inspect and seize data stored on this information
system.
- Communications using, or data stored on, this information system are not private,
are subject to routine monitoring, interception, and search, and may be disclosed
or used for any U.S. Government-authorized purpose.
- This information system includes security measures (e.g., authentication and access
controls) to protect U.S. Government interests–not for your personal benefit or
privacy.
- Notwithstanding the above, using an information system does not constitute consent
to personnel misconduct, law enforcement, or counterintelligence investigative searching
or monitoring of the content of privileged communications or data (including work
product) that are related to personal representation or services by attorneys, psychotherapists,
or clergy, and their assistants. Under these circumstances, such communications
and work product are private and confidential, as further explained below:
- Nothing in this User Agreement shall be interpreted to limit the user’s consent
to, or in any other way restrict or affect, any U.S. Government actions for purposes
of network administration, operation, protection, or defense, or for communications
security. This includes all communications and data on an information system, regardless
of any applicable privilege or confidentiality.
- The user consents to interception/capture and seizure of ALL communications and
data for any authorized purpose (including personnel misconduct, law enforcement,
or counterintelligence investigation). However, consent to interception/capture
or seizure of communications and data is not consent to the use of privileged communications
or data for personnel misconduct, law enforcement, or counterintelligence investigation
against any party and does not negate any applicable privilege or confidentiality
that otherwise applies.
- Whether any particular communication or data qualifies for the protection of a privilege,
or is covered by a duty of confidentiality, is determined in accordance with established
legal standards and DoD policy. Users are strongly encouraged to seek personal legal
counsel on such matters prior to using an information system if the user intends
to rely on the protections of a privilege or confidentiality.
- Users should take reasonable steps to identify such communications or data that
the user asserts are protected by any such privilege or confidentiality. However,
the user’s identification or assertion of a privilege or confidentiality is not
sufficient to create such protection where none exists under established legal standards
and DoD policy.
- A user’s failure to take reasonable steps to identify such communications or data
as privileged or confidential does not waive the privilege or confidentiality if
such protections otherwise exist under established legal standards and DoD policy.
However, in such cases the U.S. Government is authorized to take reasonable actions
to identify such communication or data as being subject to a privilege or confidentiality,
and such actions do not negate any applicable privilege or confidentiality.
- These conditions preserve the confidentiality of the communication or data, and
the legal protections regarding the use and disclosure of privileged information,
and thus such communications and data are private and confidential. Further, the
U.S. Government shall take all reasonable measures to protect the content of captured/seized
privileged communications and data to ensure they are appropriately protected.
- In cases when the user has consented to content searching or monitoring of communications
or data for personnel misconduct, law enforcement, or counterintelligence investigative
searching, (i.e., for all communications and data other than privileged communications
or data that are related to personal representation or services by attorneys, psychotherapists,
or clergy, and their assistants), the U.S. Government may, solely at its discretion
and in accordance with DoD policy, elect to apply a privilege or other restriction
on the U.S. Government’s otherwise-authorized use or disclosure of such information.
- All of the above conditions apply regardless of whether the access or use of an
information system includes the display of a Notice and Consent Banner (“banner”).
When a banner is used, the banner functions to remind the user of the conditions
that are set forth in this User Agreement, regardless of whether the banner describes
these conditions in full detail or provides a summary of such conditions, and regardless
of whether the banner expressly references this User Agreement.
As a user of an information system, I will adhere to the following security rules
- I will use Army information systems (computers, systems, and networks) only for
authorized purposes.
- I will not try to access data or use operating systems or programs, except as specifically
authorized.
- I know I will be issued a user identifier (user ID) and a password to authenticate
my JSS account. After receiving them—
- I will not allow anyone else to have or use my password. If I know that my password
is compromised, I will report to my JSS Webmaster for a new one.
- I will not run “sniffers” (utilities used to monitor network traffic, commonly used
to Spy on other network users and attempt to collect their passwords) or any hacker-related
software on my GC, Government IT system, or network.
- If I observe anything on the system I am using that indicates inadequate security,
I will immediately notify the site Webmaster. I know what constitutes a security
incident and know that I must immediately report such incidents to the Webmaster
- I will comply with security guidance issued by my SA and IASO.
- I know that my actions as a user can greatly affect the security of the system and
that my signature on this agreement indicates that I understand my responsibility
as a user requires that I adhere to regulatory guidance.
- I know I am subject to disciplinary action if I violate DOD computer policy. For
U.S. personnel, this means that if I fail to comply with this policy, I may be subject
to adverse administrative action or punishment under Article 92 of the Uniform Code
of Military Justice (UCMJ). If I am not subject to the UCMJ, I may be subject to
adverse action under the United States Code or Code of Federal Regulations.
- Acknowledgement: I have read the above requirements regarding use of JSS access
systems. I understand my responsibilities regarding these systems and the information
contained in them.