Privacy & Security

Information available at http://www.peocscss.army.mil is consistent with Army and DoD policies and principles of information and contains information cleared for public release. Information intended for the internal Army audience is available through Army Knowledge Online (AKO)

Army web site Management Policy

Army Records Management Declassification Agency (Privacy Act, FOIA, etc.) Army Policy for Using Copyrighted Materials The Army home page is provided as a public service by the Army with oversight by the Army Public Affairs. Information presented on the Army home page is considered public information and may be distributed or copied unless otherwise specified. Use of appropriate byline/photo/image credits is requested.

The use of copyrighted material by the Army is subject to U.S. copyright law as reflected in Army regulations. It is Army policy to recognize and respect the rights of copyright owners. More information on the Army's use of copyrighted materials.

For site management, information is collected for statistical purposes only. This government computer system uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.

For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.

Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.

At the Army home page, we want all viewers to be able to experience the Army story. We have and continue to strive to be sure all sections of www.army.mil are in compliance with Section 508 standards. If you find something that is not compliant, please let us know via the Contact Us link on the footer.

Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986, Identity Theft Enforcement and Restitution Act of 2008, and the National Information Infrastructure Protection Act.

If you have any questions or comments about the information presented here, please forward them to us using the Contact Us link on the footer.

External Links Disclaimer - The appearance of hyperlinks to external sites does not constitute endorsement by the Department of the U.S. Army of the linked Web site or the information, products or services contained therein. For other than authorized activities such as military exchanges and Morale, Welfare and Recreation sites, the Department of the U.S. Army does not exercise any editorial control over the information you may find at these locations. Such links are provided consistent with the stated purpose of this DoD Web site.

Copyright

Use of Copyrighted Material This page specifically addresses the distribution of copyrighted material to external sources by the Army.

The use of copyrighted material within the Army is subject to U.S. copyright law as reflected in the above references and other sources. It is Army policy to recognize and respect the rights of copyright owners. This page does not create any right, remedy, or cause of action for any person against the Army.

It is Department of the Army policy to recognize the rights of copyright owners (for example, photo journalists or embedded media) consistent with the Army's mission and worldwide commitments. Copyrighted works will not be reproduced or distributed outside of the Army without the written or electronically conveyed permission of the copyright owner.

In the event a copyright owner grants the Army written or electronically conveyed permission to use copyrighted material for internal command information or morale and welfare purposes, commanders or heads of Army activities will take care to assure that such permission is not abused by improper use of the material.

In addition, any use of copyrighted material, for which permission has been obtained, will carry attribution for the source of the material. Army Public Affairs will continue to make every effort to reinforce this policy through public affairs channels and to ensure widest dissemination of these guidelines around the Army, and at every level of command.

Copyrighted material in the Army's possession should be safeguarded from accidental unauthorized release.

Copyright issues are under the purview of the Office of the Judge Advocate General and are covered in Army Regulation 27-60, Intellectual Property.

Army Regulation 25-1 prohibits the posting of documents or information protected by a copyright on Army websites without the permission of the copyright holder.

Licensed use. A license is a contract which identifies the terms under which we can use a copyrighted work (e.g., can use my painting on the Army website for a period of 6 months, but not for any other purposes). There is no required format for a license and different licenses will vary greatly in their terms. At a minimum, the organization which receives the license should file a record copy. This will vary based on the scope of the license and intended use of the copyrighted work. For example, Office of Chief of Public Affairs might keep track of any licenses which allow use of a copyrighted work on the Army website, but a battalion might keep track of a license to use a copyrighted work in a locally distributed document.

iSALUTE

iSALUTE provides a user-friendly means to report Counterintelligence Information for the entire Army Community and establishes Army-wide iSALUTE reporting procedures and availability. iSALUTE does not require a log-on to report CI Information. iSALUTE promotes foreign threat awareness across all commands and leverages every member of the Army community as a sensor to help identify and prevent potential espionage or international terrorist acts against the Army.

iSALUTE is an on-line Counterintelligence (CI) Reporting Portal designed to complement other Army threat awareness and reporting initiatives and foster partnerships with CI, law enforcement organizations and Army communities. iSALUTE focuses on foreign threats to DoD and the Army from espionage activities, terrorist threats, and the insider threat.

The critical element of iSALUTE involves individuals reporting questionable activities to Army Counterintelligence. Reports can be initiated through the iSALUTE on-line reporting portal. Basic information is transmitted to the Army CI Coordinating Authority (ACICA) for review and referral to the local CI Office or other agencies for further investigation as needed. Individuals can also initiate reports in person or by calling their supporting CI Office. CONUS personnel can also report via 1-800-CALLSPY(225-5779).

How & What to Report

When you are interviewed by Army Counterintelligence, give as many details as you can. Here is a checklist to help.

  • Size: Number and detailed description of people and vehicles. Identifying information such as unique distinguishing characteristics and license
  • Activity: What are the people/vehicles doing? What is suspicious? Provide as many details as possible.
  • Location: Location(s) of people, vehicles, or activities. Include direction of travel and names of roads(if known)
  • Unit: What unit they belong to, any markings, or insignias? Other identifying information on clothing or person such as brands, names, pictures, numbers or tattoos.
  • Time: Time and date you observed the behavior. Include timeline of activities during observation. How long did you observe in total? Note time of any significant events or changes during observation.
  • Equipment: Describe with as much detail as possible any equipment observed; such as cameras, writing/sketching instruments, tools, communications equipment, computer equipment, or weapons present.