OMB EXPIRATION DATE: 08/31/2019
Privacy Act Statement and Security
Privacy Act Statement
Authority: 10 U.S.C. §1144, “Employment Assistance, Job Training Assistance, and Other Transitional Services”, 10 U.S.C. §1784a, “Education and Training Opportunities for Military Spouses to Expand Employment and Portable Career Opportunities”, and DoDI 1342.22 “Military Family Readiness”.
Principal Purpose(s): The DoD Spouse Education and Career Opportunities (SECO) Program is the primary source of education, career and employment counseling for all military spouses. The SECO system delivers the resources and tools necessary to assist military spouses with career exploration/discovery, career education and training, employment readiness, and career connections at any point within the military spouse’s career lifecycle.
Routine Use(s): In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act of 1974, as amended, the records contained herein may specifically be disclosed outside the DoD as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: To authorized DoD SECO contractors and grantees for the purpose of responding to military spouse need. To authorized DoD contractors and grantees for the purpose of supporting research studies concerned with the education, career and employment counseling of military spouses participating in DoD funded spousal education, career and employment programs. To civilian educational institutions where the participant is enrolled, for the purposes of ensuring correct enrollment and billing information. To the Department of Education, Consumer Financial Protection Bureau and the Department of Justice for the purpose of complying with E.O. 13607, Establishing Principles of Excellence for Educational Institutions Serving Service Members, Veterans, Spouses, and Other Family Members. To local law enforcement entities for the purpose of intervention to prevent harm to the individual (self) in accordance with DoD/military branch of service and component regulations and established protocols. Any release of information contained in this system of records outside the DoD under a routine use will be compatible with the purpose(s) for which the information is collected and maintained. The DoD Blanket Routine Uses set forth at the beginning of the Office of the Secretary of Defense compilation of systems or records notices may apply to this system.
Disclosure: Voluntary; however, failure to provide some information may impact your ability to utilize certain program opportunities.
- This is a Department of Defense (DoD) interest computer system sponsored by the Under Secretary of Defense (Personnel & Readiness) as a public service.
- All DoD interest computer systems and equipment are intended for the communication, transmission, processing, and storage of official United States Government or other authorized information only.
- All DoD interest computer systems are subject to monitoring at all times. This is done to ensure that all equipment and systems function properly, including security devices and systems, to prevent unauthorized use, to deter criminal activity, and for other similar purposes. When you use a DoD interest computer system, you should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy.
- If monitoring of this or any other DoD interest computer system reveals a possible violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. Employees who violate security regulations or make unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action.
- When you use this or any other DoD interest computer system, you are consenting to being monitored at all times.
- This government computer system uses software programs that create summary statistics. These programs are used for assessing what information is of most and least interest to users, determining technical design specifications, and identifying system performance or problem areas.
- For security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information or otherwise cause damage. Unauthorized attempts to upload or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
- Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits.
- If you have any questions or comments about the information presented here, please forward them to us using the Feedback link on a tab on the left hand side of the screen or in the footer.