Privacy and Security
This web information service is provided as a public service by the United States European Command.
Information presented via this web service is considered public information and may be distributed or copied. Use of appropriate byline, photo, and image credits is requested. Contact us if you have questions about reusing materials from this site.
We use the information compiled by Google Analytics to help us make our site more useful for you. We learn about the number of visitors to our site, which features/links that are most popular, and the types of technology our visitors use. For more detailed information on the type of information collected from users please see http://www.google.com/analytics/features.html.
Information Collected and Stored Automatically
If you do nothing during your visit but browse through the website, read pages, or download information, we will gather and store certain information about your visit automatically. This information does not identify you personally. We automatically collect and store only the following information about your visit:
- The Internet domain (for example, "xcompany.com" if you use a private Internet access account, or "yourschool.edu" if you connect from a university's domain) and IP address (an IP address is a number that is automatically assigned to your computer whenever you are surfing the Web) from which you access our website;
- The type of browser and operating system used to access our site;
- The date and time you access our site;
- The pages you visit; and
- If you linked to the U.S. European Command website from another website, the address of that website.
For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration General Schedule 20. All data collection activities are in strict accordance with DoD Directive 5240.1.
Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
Please let us know if you have questions or comments about this policy.