USPFO HI MENU Selections

+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
The following important advisory was issued by the DOD General
Counsel (DOD/GC) and is being relayed via the Defense
Information Systems Agency's Security Coordination Center
distribution system as a means of providing DISN subscribers
! with important security guidelines.
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +

Following Warning Notice is from the DOD General Counsel (DOD/GC).
DISA has received guidance form DOD/GC to have this warning notice
transmiited electronically to all personnel conected to our DISANET.
Ensure you immediately retransmit this notice to ALL, repeat, ALL
personnel within your respective organizations.

---------------------------------------------------------------------

MEMORANDUM FROM THE DOD GENERAL COUNSEL TO ALL DOD COMPUTER USERS:

We increasingly rely on uninterrupted service from our information systems to provide and communicate authentic, accurate, and timely information. However, DoD systems are continually under attack by hackers and other unscrupulous persons. To improve our computer security, it is necessary for authorized organizations to monitor our computer systems and networks, looking for unauthorized users or uses. Computer security may also include authorized efforts to penetrate DoD systems, in an effort to locate weak points in our security systems. It is DoD policy to ensure that DoD computer users are aware that monitoring may occur at any time, and that monitoring will usually go unnoticed even by skilled users. We are sending the following notice to all current users via e-mail to remind them of DoD monitoring.

THIS IS A DEPARTMENT OF DEFENSE COMPUTER SYSTEM. THIS COMPUTER SYSTEM, WHICH INCLUDES ALL RELATED EQUIPMENT, NETWORKS AND NETWORK DEVICES (SPECIFICALLY INCLUDING ACCESS TO THE INTERNET), ARE PROVIDED ONLY FOR OFFICIAL U.S. GOVERNMENT BUSINESS. DOD COMPUTER SYSTEMS MAY BE MONITORED BY AUTHORIZED PERSONNEL TO ENSURE THAT THEIR USE IS AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO FACILITATE PROTECTION AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY SECURITY PROCEDURES. MONITORING INCLUDES "HACKER" ATTACKS TO TEST OR VERIFY THE SECURITY OF THIS SYSTEM AGAINST USE BY UNAUTHORIZED PERSONS. DURING THESE ACTIVITIES, INFORMATION STORED ON THIS SYSTEM MAY BE EXAMINED, COPIED AND USED FOR AUTHORIZED PURPOSES, AND DATA OR PROGRAMS MAY BE PLACED INTO THIS SYSTEM. THEREFORE, INFORMATION YOU PLACE ON THIS SYSTEM IS NOT PRIVATE. USE OF THIS DOD COMPUTER SYSTEM, AUTHORIZED OR UNAUTHORIZED, CONSTITUTES CONSENT TO OFFICIAL MONITORING OF THIS SYSTEM. UNAUTHORIZED USE OF A DOD COMPUTER SYSTEM MAY SUBJECT YOU TO CRIMINAL PROSECUTION. EVIDENCE OF UNAUTHORIZED USE COLLECTED DURING MONITORING MAY BE PROVIDED TO APPROPRIATE PERSONNEL FOR ADMINISTRATIVE, CRIMINAL OR OTHER ACTION.