Linking Policy and Endorsement
This site may include useful hypertext links or pointers to information created and maintained by others. We provide these links and pointers solely for your information and convenience. When you select a link to an outside website, remember that you’re leaving this website and are subject to the privacy and security policies of the owners/sponsors of the outside website. When you leave this website, remember that the U.S. Army
does not control or guarantee the accuracy, relevance, timeliness or completeness of information contained on a linked website
does not endorse the organizations sponsoring linked websites, and we do not endorse the views they express or the products/services they offer
cannot authorize the use of copyrighted materials contained in linked websites. Those who provide comments are responsible for the copyright of any content they provide
is not responsible for transmissions users receive from linked websites
does not guarantee that outside websites comply with Section 508 (Accessibility Requirements) of the Rehabilitation Act
Use of Third-Party Websites and Applications
Third-party websites and applications that are not owned, operated, or controlled by the Defense Department, are integral to internet-based operations across DoD and used to augment official communication. These capabilities include, but are not limited to, networking services, media sharing services, wikis and data mashups. A list of DoD's authorized pages and uses of these services is available at https://dod.defense.gov/About/Military-Departments/DoD-Websites/. These sites may collect personally identifiable information and may make it available to the DoD and other users; however, the information is not collected on behalf of, nor is it provided specifically for DoD. DoD does not harvest and additionally collect, maintain, share or otherwise use such personally identifiable information for any purpose other than that for which it is made available to all users.
This is an official United States Army website, and is provided as a public service by the Army Installation Management Command (IMCOM), G9 Family and Morale, Welfare and Recreation (MWR).
Information presented on this website is considered public information and may be distributed or copied unless otherwise specified. Use of appropriate byline/photo/image credits is requested.
If you choose to provide us with personal information -- like filling out a Contact Us form with your email -- we only use that information to respond to your message or request. We will only share the information you give us with another government agency if your inquiry relates to that agency, or as otherwise required by law. We never create individual profiles or give it to any private organizations. Family and MWR websites never collect information for commercial marketing. While you must provide an email address for a response, other than those generated automatically, in response to questions or comments that you may submit, we recommend that you NOT include any other personal information, especially Social Security numbers. The Social Security Administration offers additional guidance on sharing your Social Security number.
We maintain a variety of physical, electronic and procedural safeguards to protect your personal information. For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.
Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
Family and MWR is especially concerned about protecting children's privacy. We hope parents and teachers are involved in children's Internet explorations. It is particularly important for parents to guide their children when children are asked to provide personal information online. Family and MWR will request no personal information from children.
If you have any questions or comments about the information presented here, please forward them to us using our Contact Us page.
Use of Measurement and Customization Technology:
This website uses measurement and customization technology known as "cookies." Cookies are used to remember a user's online interactions with a website or online application to conduct measurement and analysis of usage or to customize the user's experience.
Two kinds of cookies are used on this website. A single-session cookie (Tier 1) is a line of text that is stored temporarily on a user's computer and deleted as soon as the browser is closed. A persistent or multisession cookie (Tier 2) is saved to a file on a user's hard drive and is called up the next time that user visits a website. Use of these cookies does not involve the collection of a visitor's personally identifiable information.
Cookies are enabled by default to optimize website functionality and customize user experience. Users can choose not to accept the use of these cookies by changing the settings on their local computer's web browser. The USA.gov website, https://www.usa.gov/optout-instructions, provides general instructions on how to opt out of cookies and other commonly used web measurement and customization technologies. Opting out of cookies still permits users to access comparable information and services; however, it may take longer to navigate or interact with the website if a user is required to fill out certain information repeatedly.
Tier 1 cookies are used for technical purposes to improve a user experience and to allow users to more easily navigate the website.
Google Analytics services are used to collect aggregate statistics of website visitor characteristics, traffic, and activity. This information is used to assess what content is of most and least interest, determine technical design specifications, and identify system performance or problem areas. The software records a variety of data, including IP addresses (the locations of computers or networks on the internet), unique visits, page views, hits, referring websites and what hyperlinks have been clicked. Tier 2 cookies are used to distinguish between summary statistics for users who have been to the site before and those that are visiting the site the for the first time. The Defense Department does not gather, request, record, require, collect or track any internet users' personally identifiable information through these processes.
Privacy Act Statement
AUTHORITY: Army Regulation 215-1, Morale, Welfare and Recreation
PRINCIPAL PURPOSE(s): To allow Family and Morale, Welfare and Recreation staff members to contact patrons regarding Family and Morale, Welfare and Recreation services, products and activities.
ROUTINE USE: The information collected will be used by Family and Morale, Welfare and Recreation staff to respond to patron messages requesting information.
DISCLOSURE: Voluntary. Your personal information security is highly important to us and is treated as such, with confidentiality following Army regulations and procedures. You may refuse to provide the data, or you may withdraw your consent to provide any data, for any reason, without consequences. Please note that providing this information is completely voluntary.
Keeping your identity safe
We care about you – and want to help you keep your personal information safe. The more crooks know about you, the easier they can crack into your accounts, take out credit cards in your name, or cause other problems.
These tips will help protect you from internet scams and keep your personal information from people who want to misuse it.
Look for the s. If the website name in your browser starts with https, that’s a good sign. The s in https means the site has an SSL certificate, and sensitive information won’t be vulnerable as it travels from site to server. There may still be problems with an https site, but they’re generally more reliable than the simple http ones.
Look out for the obvious signs. Beware popups or ads that make crazy claims, lead with celebrity scandals, or contain spelling or grammar errors. A professional look doesn’t guarantee a site’s safety, but definitely stay away from one that raises doubts.
Keep your antivirus program up to date. If you’re connecting to the internet, you should have at least the basic level of protection of a free antivirus defense.
Check out a site before you click. Several sites can tell you if another site has hosted malware recently. Type the URL into a site like hpHosts, Norton Safe Web, or Unmask Parasites – and if the results show danger, don’t go further. Google Safe Browsing allows you to type http://google.com/safebrowsing/diagnostic?site= and then the website address into the browser window to get immediate results.
Never click on popups or links to get to sensitive accounts. Scammers may try to scare you with a popup that says your bank account is frozen, or that there are fraudulent charges on your credit card – and then request your username, password, or other important information to start fixing the problem. Of course, they can cause havoc once they have your info. Instead, always type the URL directly into the address field to access financial accounts, shopping sites, or other places you’ll be giving personal info.
Think before acting when someone you don’t know cries “Emergency!” Cyber criminals routinely make their pitches sound especially urgent, so their victims don’t have time to think about them. If a financial institution, utility, business, or government agency claims you need to handle an urgent matter online – and wants your personal information to do it – don’t fall for it. Instead, pause for a moment. Then call them directly, or log into your account by typing in the URL yourself.
Use trusted networks. Don’t pass sensitive information over open Wi-Fi networks, like those at stores or coffeeshops. Save your shopping, bill paying, and checking on investments till you get to a trusted private network. If you have to take care of those tasks while you’re out, disconnect from the risky public network and set up a private hotspot with your phone.
Keep software updated. When your computer or phone notifies you of software updates, perform them as soon as you can. Many people delay them, then forget…which can leave vulnerabilities for malware to exploit.
Share carefully on social media. Social media can be great for staying in touch with friends and loved ones, but criminals also use it – to learn about you. Adjust your privacy settings so you don’t display your address, phone number, birthday, and other data. Be careful what you post, too. Every time you mention your pet, high school, or first car, you may be giving away the answer to a security question. And your vacation news? Post it after you get back – so you don’t tip off burglars that your home is empty while you’re away.
While you’re making sure you surf the web safely – take a minute to look at some of the other scams out there. From fake charities to made-up family member hospitalizations to phony credit alerts and more, crooks are working overtime to dream up ways to learn your information. Stay informed – and keep your information secure.