Personal Opinion Disclaimer

Thispage was prepared as a service to the U.S. Army ommunity. Neither the United States Government nor any of its employees makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product, or process disclosed, or represents that its use would not infringe privately owned rights. The opinions of the authors expressed herein do not necessarily state or reflect those of the United States Government and shall not be used for advertising or product endorsement purposes.


Security and Privacy Notice

Army Cyber Security imageThe Fort Dix Home Page is provided as a public service by the Fort Dix Public Affairs Training Office.

Information presented on this site is considered public information and may be distributed or copied. Use of appropriate byline/photo/image credits is requested.

For site management, information is collected for statistical purposes. This government computer system uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.

For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.

Except for authorized law enforcementinvestigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration General Schedule 20. All data collection activities are in strict accordance with DoD Directive 5240.1.

Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.

If you have any questions or comments about the information presented here, please forward them to us.