What We Collect and Store Automatically
If you come to the website and browse through the website, read pages, or download information, the system automatically collects and stores the following information about your visit:
- The IP address (an IP address is a number that is assigned to each computer connected to the Internet) from which you access our site;
- The type of browser and operating system used to access our site;
- The date and time you access our site;
- The pages you visit;
- The amount of data transferred between our server and your computer; and
- If you linked to our website from another website, the address of that site.
What Information We Use
This website uses the information collected for two purposes:
- We may use the information we collect to count the number and type of visitors to the different pages on our site and to help us make our site more useful to visitors.
- If you choose to contact us or send us feedback, you may indicate your name, organization, and/or e-mail address when you contact us either via e-mail or phone.
If You Send Us an E-Mail
You may choose to provide us with personal information as an e-mail with a comment or question. We use the information to improve our service to you or to respond to your request. Sometimes we forward your e-mail or help request to other government or contracted employees who may be better able to help you. Except for authorized law enforcement investigations, we do not share our e-mail or help requests with any organizations outside the Department of Labor or authorized contractors of the Department of Labor.
A persistent cookie is a small text file that is stored on your computer and makes it easy for you to move around a website without having to continually re-enter information. Consistent with the Department of Labor’s policy on the Usage of Persistent Cookies, our website does not use persistent cookies. A session cookie is a small text file that is not stored on your computer, but is kept in memory while you are connected to our site and is erased when you close your browser. We use session cookies only to make your visit more productive for you.
Securing the Information We Collect Online
We are committed to properly securing the information we collect online. To help us accomplish this, we take the following steps:
- We employ internal access controls to ensure that the only people who can see your information are those with a need to do so to perform their official duties;
- We train relevant personnel on our privacy and security measures so that our personnel know what is required for our compliance;
- We use technical controls to secure the information we collect online, including encryption, firewalls, and password protections;
- We periodically test our security procedures to ensure personnel and technical compliance; and
- We employ external access safeguards to identify and prevent unauthorized attempts by outsiders to hack into, or cause harm to, the information in our systems.
- Tampering with this website is punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
Links to Other Sites
System Use Notification and Rules of Behavior Policy
System Use Notification
JBS International, Inc., under contract Department of Labor's (DOL) Employment and Training Administration (ETA) actively monitors this system and activity to maintain system security and availability, and to ensure appropriate and legitimate usage. Any individual who intentionally accesses a computer or system without authorization, and who alters, damages, makes unauthorized modifications to, or destroys information in any Federal interest computer, or exceeds authorized access, is in violation of the Computer Fraud and Abuse Act of 1986 (Public Law 99-474). Any evidence of possible violations of proper use or applicable laws found as a result of this monitoring may be turned over to the Department of Labor, and law enforcement. Any individual found to be in violation of the system's proper use rules or law could be punished with loss of system access, fines, and/or imprisonment. By proceeding, you hereby acknowledge your agreement with these terms and the system's rules of behavior and consent to such monitoring and information retrieval for law enforcement and other official purposes.
Rules of Behavior
- As a user of this system, you are required to be aware of, and comply with, all applicable policies and guidelines on authorized use and security of the system resources and data.
If applicable, you are responsible for all actions performed with your personal user id.
- User IDs and passwords are for your individual use only and, as confidential information, are not to be shared.
- You must not disclose your password to anyone, and you must take necessary steps to prevent anyone from gaining knowledge of your password.
- As a user you will be expected to employ good password management practices as defined and enforced by system management prompts dictated by the system.
Policy, standards, and procedures must be followed.
- Use of computer resources is restricted in accordance with federal policy and guidelines.
- Violations of the "Computer Fraud and Abuse Act of 1986" (Public Law 99-474), the Privacy Act, the Trade Secrets Act (18 U.S.C. §905), and other federal regulations applying to unauthorized use of federal computer systems, files, records, and data, are punishable by law.
- Be aware that all computer resources used and accessed by users are subject to periodic testing, review, monitoring, and auditing. Any evidence of security violations or illegal activity will be immediately turned over to the Department of Labor or law enforcement for action. Penalties could include loss of access, fines, and/or imprisonment.
If applicable, access to information must be controlled.
- Access only the information for which you have been authorized and have a "need to know/access."
- Do not leave computers logged on and unattended. Log off at the end of each session or use access control software (for example, a screen saver with password) during unattended use.
- If you know that another person has used or is using your credentials, you must report the incident immediately to your supervisor.
- Take steps necessary to maintain security of computer files.