You are accessing a U.S. Government (USG) Information System (IS) that is provided by the Defense Security Cooperation Agency (DSCA) to both the United States and international security cooperation community. Its components are designed for the free exchange of ideas, documents, and other collaborative services* designed to foster growth and build partnerships to increase capacity and capability. DSCA provides the capability but each member community validates its users and extends the general use policies listed below. DSCA does not provide routine access to any intelligence or counter intelligence activities.
Content Contribution Policy
GlobalNET is largely self-policing allowing users to flag content that is not appropriate to foster the above stated mission. The guidelines for appropriate content are:
- No content shall be posted that is hate speech, threatening, or pornographic.
- No commercial content shall be posted, such as spam or links to corporate advertisements
- No copyright material shall be posted that does not adhere to the agreements of the copyright
With the exception of name and email address, submission of information is voluntary without any degradation of functionality for incomplete information. All authorized users may view the information provided. The information is collected under OSD Privacy Act Systems Notice DSCA-02, Regional International Outreach System (RIO). This site is for UNCLASSIFIED content and discussion only.
Acceptable Use Policy
Users should conduct themselves in accordance with acceptable behavior. Examples of unacceptable behavior include but are not limited to:
- Bullying, harassing, or threatening
- Knowingly upload viruses or other malicious code
- Provide or use the credentials (username and password) of any other user
The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, communications security (COMSEC) monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. At any time, the USG may inspect and seize data stored on this IS. Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. Notwithstanding the above, using this IS does not constitute consent to PM, LE,or CI investigative searching or monitoring of the content of privileged communications, or work product, related to the personal representation or services by attorneys, psychotherapists, or clergy and their assistants. Such communications and work product are private and confidential.
Components include but are not limited to asynchronous communications such as sharing of files, blogs, ideas, subject matter expertise, person finder, and delivering course content. Messages and synchronous communications like instant messenger, video teleconference, group chat, white-boarding, sharing of interfaces real time.