Security & Privacy

United States Army War College Website Policies

The U.S. Army War College (USAWC) website is provided as a public service by the U.S. Army War College. This system is accredited only for UNCLASSIFIED/PUBLIC release information.

Security Policy

THIS IS A DOD COMPUTER SYSTEM. BEFORE PROCESSING CLASSIFIED INFORMATION, CHECK THE SECURITY ACCREDITATION LEVEL OF THIS SYSTEM. DO NOT PROCESS, STORE, OR TRANSMIT INFORMATION CLASSIFIED ABOVE THE ACCREDITATION LEVEL OF THIS SYSTEM. THIS COMPUTER SYSTEM, INCLUDING ALL RELATED EQUIPMENT, NETWORKS AND NETWORK DEVICES (INCLUDES INTERNET ACCESS) ARE PROVIDED ONLY FOR AUTHORIZED U.S. GOVERNMENT USE. DOD COMPUTER SYSTEMS MAY BE MONITORED FOR ALL LAWFUL PURPOSES, INCLUDING TO ENSURE THAT THEIR USE IS AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO FACILITATE PROTECTION AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY SECURITY PROCEDURES, SURVIVABILITY, AND OPERATIONAL SECURITY. MONITORING INCLUDES, BUT IS NOT LIMITED TO, ACTIVE ATTACKS BY AUTHORIZED DOD ENTITIES TO TEST OR VERIFY THE SECURITY OF THIS SYSTEM. DURING MONITORING, INFORMATION MAY BE EXAMINED, RECORDED, COPIED, AND USED FOR AUTHORIZED PURPOSES. ALL INFORMATION, INCLUDING PERSONAL INFORMATION, PLACED ON OR SENT OVER THIS SYSTEM MAY BE MONITORED.

USE OF THIS DOD COMPUTER SYSTEM, AUTHORIZED OR UNAUTHORIZED, CONSTITUTES CONSENT TO MONITORING. UNAUTHORIZED USE OF THIS DOD COMPUTER SYSTEM MAY SUBJECT YOU TO CRIMINAL PROSECUTION. EVIDENCE OF UNAUTHORIZED USE COLLECTED DURING MONITORING MAY BE USED FOR ADMINISTRATIVE, CRIMINAL, OR OTHER ADVERSE ACTION. USE OF THIS SYSTEM CONSTITUTES CONSENT TO MONITORING FOR ALL LAWFUL PURPOSES.

This website resides on an official United States Government System, which may be used only for authorized purposes. This site is protected by various provisions of Title 18 of the U.S. Code. Violations of Title 18 are subject to criminal prosecution in federal court.

For security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic, to identify unauthorized attempts to upload or change information, to cause damage, or to deny service to authorized users.

Unauthorized attempts to upload information or change information on this site are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.

Information presented on this server, except where specifically copyrighted, is considered public information and may be distributed or copied. Use of appropriate byline/photo/image credits is requested.

Privacy Policy

Our privacy policy is clear: We will collect no personal information about you when you visit our website unless you choose to provide that information to us.

Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration General Schedule 20.

We do not disclose, give, sell or transfer any personal information about our visitors, unless required for law enforcement or by statute.

Once you link to another site, you are subject to the privacy policy of the new site.

Here is how we handle information about your visit to our website:

  • Information Collected and Stored Automatically

    If you do nothing during your visit but browse through the website, read pages, or download information, we will gather and store certain information about your visit automatically. This information does not identify you personally. We automatically collect and store only the following information about your visit:

    1. The Internet domain (for example, "youragency.com" if you connect from a government domain, "yourschool.edu" if you connect from a university's domain, or "yourcompany.com" if you use a private Internet access account) and IP address (an IP address is a number that is automatically assigned to your computer whenever you are surfing the Web) from which you access our website

    2. The type of browser and operating system used to access our site

    3. The date and time you access our site

    4. The pages you visit, and

    5. If you linked to the CSL website from another website, the address of that website

    We use this information to help us make our site more useful to visitors -- to learn about the number of visitors to our site and the types of technology our visitors use.

  • If You Send Us Personal Information

    If you choose to provide us with personal information by sending an e-mail message, or by filling out a form with your personal information and submitting it through our website, we use that information to respond to your message and to help us provide you with information that you request. We do not collect personal information for any other purposes.

**The appearance of hyperlinks does not constitute endorsement by the Department of the Army of this web site or the information, products or services contained therein. For other than authorized activities such as military exchanges and Morale, Welfare and Recreation sites, the Department of the army does not exercise any editorial control over the information you may find at these locations. Such links are provided and maintained as a convienience for visitors.**

© Copyright 2007 IAP