Return to District 17's Home Page.
Access Policy
Unauthorized access is prohibited by Title 18 USC Section 1030. Unauthorized access may also be a violation of other Federal Law or government policy, and may result in criminal and/or administrative penalties. Users shall not access other users' or system files without proper authority. Absence of access controls IS NOT authorization for access! USCG information systems and related equipment are intended for communication, transmission, processing and storage of U.S. Government information. These systems and equipment are subject to monitoring to ensure proper functioning, protect against improper or unauthorized use or access, and verify the presence or performance of applicable security features or procedures, and other like purposes. Such security monitoring may result in the acquisition, recording, and analysis of all data being communicated, transmitted, processed or stored in this system by a user. If security monitoring reveals evidence of possible criminal activity, such evidence may be provided to law enforcement personnel. Use of this system constitutes consent to such security monitoring.
Unauthorized access is prohibited by Title 18 USC Section 1030. Unauthorized access may also be a violation of other Federal Law or government policy, and may result in criminal and/or administrative penalties. Users shall not access other users' or system files without proper authority. Absence of access controls IS NOT authorization for access! USCG information systems and related equipment are intended for communication, transmission, processing and storage of U.S. Government information. These systems and equipment are subject to monitoring to ensure proper functioning, protect against improper or unauthorized use or access, and verify the presence or performance of applicable security features or procedures, and other like purposes. Such security monitoring may result in the acquisition, recording, and analysis of all data being communicated, transmitted, processed or stored in this system by a user. If security monitoring reveals evidence of possible criminal activity, such evidence may be provided to law enforcement personnel. Use of this system constitutes consent to such security monitoring.