Privacy Act Statement
- Authority: 10 U.S.C. 136, "Under Secretary of Defense for Personnel and Readiness"; 10 U.S.C. 1781 note, "Establishment of Online Resources to Provide Information About Benefits and Services Available to Members of the Armed Forces and Their Families"; Directive-type Memorandum (DTM)-17-004, "Department of Defense Expeditionary Civilian Workforce"; DoD Instruction 1342.22, "Military Family Readiness"; and DoDI 6490.06, "Counseling Services for DoD Military, Guard and Reserve, Certain Affiliated Personnel, and Their Family Members."
- Principal Purpose(s): To document and verify the eligibility of callers and identify your inquiry or issue so that we may provide a warm hand-off, referral and/or requested information. Records may be used as a management tool for statistical analysis, tracking, reporting, and evaluating program effectiveness and conducting research. However, if you indicate you may represent a threat to self or others, you will be reported to the appropriate authorities in accordance with DoD/military branch of service and component regulations and established protocols.
- Routine Use(s): In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, these records may be disclosed outside the DoD as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: To authorized DoD military occupational specialty contractors for the purpose of responding to service member or family member need. To contractors and grantees for the purpose of supporting research studies concerned with the effectiveness of non-medical counseling interventions. To local law enforcement entities for the purpose of intervention to prevent harm to the individual (self) in accordance with DoD/military branch of service and component regulations and established protocols. Any release of information contained in this system of records outside the DoD under a routine use will be compatible with the purpose(s) for which the information is collected and maintained. The DoD Blanket Routine Uses set forth at the beginning of the Office of the Secretary of Defense compilation of systems or records notices may apply to this system.
- Disclosure: Voluntary; however, if you do not provide information needed to determine your eligibility for non-medical counseling and specialty consultations, you may not be able to receive those services.
- All DoD interest computer systems and equipment are intended for the communication, transmission, processing, and storage of official United States Government or other authorized information only.
- All DoD interest computer systems are subject to monitoring at all times. This is done to ensure that all equipment and systems function properly, including security devices and systems, to prevent unauthorized use, to deter criminal activity, and for other similar purposes. When you use a DoD interest computer system, you should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy.
- If monitoring of this or any other DoD interest computer system reveals a possible violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. Employees who violate security regulations or make unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action.
- This is a Department of Defense (DoD) interest computer system sponsored by the Under Secretary of Defense (Personnel & Readiness) as a public service.
- When you use this or any other DoD interest computer system, you are consenting to being monitored at all times.
- This government computer system uses software programs that create summary statistics. These programs are used for assessing what information is of most and least interest to users, determining technical design specifications, and identifying system performance or problem areas.
- For security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information or otherwise cause damage. Unauthorized attempts to upload or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
- Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits.
- If you have any questions or comments about the information presented here, please give us your feedback at our Help Desk page.