Notwithstanding the above, using an information system does not constitute consent to personnel misconduct, law enforcement, or counterintelligence investigative searching or monitoring of the content of privileged communications or data (including work product) that are related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Under these circumstances, such communications and work product are private and confidential, as further explained below:
- Nothing in this User Agreement shall be interpreted to limit the user's consent to, or in any other way restrict or affect, any U.S. Government actions for purposes of network administration, operation, protection, or defense, or for communications security. This includes all communications and data on an information system, regardless of any applicable privilege or confidentiality.
- The user consents to interception/capture and seizure of ALL communications and data for any authorized purpose (including personnel misconduct, law enforcement, or counterintelligence investigation). However, consent to interception/capture or seizure of communications and data is not consent to the use of privileged communications or data for personnel misconduct, law enforcement, or counterintelligence investigation against any party and does not negate any applicable privilege or confidentiality that otherwise applies.
- Whether any particular communication or data qualifies for the protection of a privilege, or is covered by a duty of confidentiality, is determined in accordance with established legal standards and DoD policy. Users are strongly encouraged to seek personal legal counsel on such matters prior to using an information system if the user intends to rely on the protections of a privilege or confidentiality.
- Users should take reasonable steps to identify such communications or data that the user asserts are protected by any such privilege or confidentiality. However, the user's identification or assertion of a privilege or confidentiality is not sufficient to create such protection where none exists under established legal standards and DoD policy.
- A user's failure to take reasonable steps to identify such communications or data as privileged or confidential does not waive the privilege or confidentiality if such protections otherwise exist under established legal standards and DoD policy. However, in such cases the U.S. Government is authorized to take reasonable actions to identify such communication or data as being subject to a privilege or confidentiality, and such actions do not negate any applicable privilege or confidentiality.
- These conditions preserve the confidentiality of the communication or data, and the legal protections regarding the use and disclosure of privileged information, and thus such communications and data are private and confidential. Further, the U.S. Government shall take all reasonable measures to protect the content of captured/seized privileged communications and data to ensure they are appropriately protected.
AskDFAS Rules of Behavior
By clicking the Consent button on the prior page to enter the system, you acknowledge as an Authorized user you shall:
- Hold a U.S. Government security clearance commensurate with the level of access granted.
- Access only that data, control information, software, hardware, and firmware for which they are authorized access and have a need-to-know, and assume only those roles and privileges for which they are authorized.
- Observe policies and procedures governing the secure operation and authorized use of a DoD information system.
- Use AskDFAS only for authorized purposes.
- Immediately report all IA-related events, potential threats, and vulnerabilities involving AskDFAS to either the System ISSM, System Manager, or contact DFAS CSSP at 327-212-9172. After hours, call DMI at 1-844-DISA-HLP (844-347-2457), press 5 or email: dfasdmiservicedesk@mail.mil .
- Ensure that system media and output are properly marked, controlled, stored, transported, and destroyed based on classification or sensitivity and need-to-know.
- Not introduce or use unauthorized software, firmware, or hardware with AskDFAS.
- Ensure that devices that display or output sensitive information in human-readable form are positioned to deter unauthorized individuals from reading the information and/or obtain a privacy screen filter for your monitor.
- Ensure that all documents, equipment, and machine-readable media containing sensitive data are cleared, properly marked, and sanitized before being released outside of the Department of Defense.
- Protect Common Access Card (CAC) and/or personal identification number (PIN). Do not record, write or display PINs at any time. PINs will be kept confidential and are not to be shared with anyone. Only the individual will have knowledge of the login ID and PIN combination. This unique login ID and PIN combination will be used as the basis for holding the individual accountable for actions associated with their login ID. PINs shall not be composed of easily guessed names or personally related items such as children's or spouse's names addresses, etc. If you believe your PIN has been compromised, promptly change the PIN and immediately notify the Information System Security Manager (ISSM).
Personally Identifiable Information (PII):
You may be granted access to personal information about an individual that identifies, links, relates, or is unique to, or describes him or her, e.g., name, phone numbers, rank/grade. Such information is also known as personally identifiable information (PII).
- Comply with DFAS policies for safeguarding and protecting PII.
- Follow DFAS policies and procedures for reporting a PII breach.
Administrative and Privileged users shall:
- Utilize public key (PK)-enabled government owned computers while accessing DoD systems for administrative and/or privileged use.
- Connect to the application system via DFAS Network.
If you have any questions or comments about the information presented here, please contact the System Manager.
Information Types Subject to Gathering:
- Social Security Number (SSN) (full or in any form)
- Birth Date
- Child Information
- Citizenship
- Disability Information
- DoD ID Number
- Driver's License
- Employment Information
- Financial Information
- Gender/Gender Identification
- Home/Cell Phone
- Law Enforcement Information
- Legal Status
- Mailing/Home Address
- Marital Status
- Medical Information
- Military Records
- Mother's Middle/Maiden Name
- Name(s)
- Official Duty Address
- Official Duty Telephone Number
- Other ID Number
- Personal E-mail Address
- Place of Birth
- Position/Title
- Protected Health Information (PHI)
- Race/Ethnicity
- Rank/Grade
- Work E-mail Address
- In addition to the above, other data elements may be requested or required in the course of researching and responding to ticket submissions.