Updated: August 18, 2016
The Defense Digital Service site is provided to the public by the Department of Defense
Information from Visits to DDS.mil
Automatically Collected. When you visit DDS.mil, information is automatically received and stored by the web servers hosting DDS.mil, including:
- The originating Internet Protocol (IP) address;
- The internet domain name;
- The date and time of your visit;
- Information about your computer or mobile set-up (e.g. type and version of web browser, operating system, screen resolution, language, and connection speed);
- The pages on DDS.mil that you visit, the time spend on each page, and scroll depth (how much of a page you viewed);
- User events (e.g. a click);
- The internet address, or URL, of the website that connected you to our site, if you accessed DDS.mil via a link on another page (i.e. “referral traffic”); and
- The amount of data transmitted from DDS.mil to your computer.
Information You Give Us
GenerallyYou do not have to provide the Defense Digital Service with any personal information or create a user account to access information on DDS.mil.
Third-party Sites.The Defense Digital Service maintains official pages or accounts on third-party websites in order to better engage with the American public (these are generally social media). You can submit or publish information to these sites that the Defense Digital Service will receive, for example by sending a message, posting a comment, “following,” “friending,” or taking similar actions. This information may contain personal information, such as an individual’s username and other public account information, when such information is available based on your privacy settings and the terms of the site.
Direct communicationYou can also send us feedback directly by the methods described under "Contact us" in the footer. This feedback is voluntary.
How Information is Used
Generally. If you choose to provide us with information, we may use that information to contact you or respond to your message. In order to serve you better, we may analyze multiple sources of data you have provided (for example, to look up whether you previously contacted the Defense Digital Service about the same topic so that we do not send you a duplicative response). We may also use messages or comments collected through DDS.mil or official third-party pages to inform policy decisions or in public advocacy.
Aggregated. We may use data you provide and automatically generated data for statistical analysis to assess, for example, what information is of interest to users, technical design specifications, and system performance. This allows us to make general improvements to our site and program.We will not link automatically collected information about your site visits with your personally identifiable information.
Sharing of this Information
Generally. Information you choose to share with the Defense Digital Service (directly and via third-party sites) may be treated as public information. We may, for example, publish compilations of messages or comments collected through official social media pages and provide them to national leaders, members of the press, or other individuals outside of the Federal Government. However, we exercise discretion to limit such disclosures to protect your privacy (for example, we generally do not publish last names of commenters).
Internally. Within the Defense Digital Service, we restrict access to non-public personally identifiable information to employees, contractors, and vendors who require access to this information in order to perform their official duties and exercise controls to limit what data they can view based on the specific needs of their position. Access to official Defense Digital Service accounts on third-party sites is limited to the individuals who administer those accounts.
Additional Government Use. In some cases, we may share information you have provided or automatically generated information with other government agencies in response to lawful law enforcement requests or to protect DDS.mil from security threats. Additionally, if you seek assistance on a matter within the jurisdiction of a federal agency, we may share your information with that agency for the limited purpose of addressing your request for assistance.
Other Sharing. We do not use or share your information for commercial purposes.
Third-Party Policies. Your activity on those sites is governed by the website’s security and privacy policies. Users of third-party sites often share information with the general public, user community, and/or the third-party operating the site. Consequently, you should review the privacy policies of third-party sites before using them and ensure that you understand how your information may be shared and used. You should also adjust privacy settings on your account on any third-party site to match your preferences. All official Defense Digital Service accounts are clearly labeled
Analytics. For aggregate statistical analysis and to improve the quality of our services, we may integrate web measurement tools with our social media pages. These tools enable basic analysis of social media traffic (such as the number of people visiting a certain page).
Under the Federal Records Act, the Defense Digital Service is required to retain some information that users submit or publish when engaging with the Defense Digital Service, for eventual transfer to the National Archives and Records Administration (NARA). NARA may eventually release this material to the public.
Children and Privacy
We believe in the importance of protecting the privacy of children online. The Children’s Online Privacy Protection Act governs information gathered online from or about children under the age of 13. Verifiable consent from a child’s parent or guardian is required before collecting, using, or disclosing personal information from a child under age 13. Our site is not intended to solicit information of any kind from children under age 13.
We take reasonable precautions to protect our site and information collected by the Defense Digital Service. We utilize common practices and technical controls to protect the information in our possession or control, along with DDS.mil itself. These practices and controls include, but are not limited to: encrypting the transfer of personal information over the internet via Transport Layer Security (TLS) and maintaining strict technical controls and procedures to ensure the integrity of all data on DDS.mil. We periodically review our processes and systems to verify compliance with industry best practices and to ensure the highest level of security for our website.
Unauthorized attempts to upload information or change information on this site are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1987 and the National Information Infrastructure Protection Act.
Defense Digital Service Intellectual Property
Copyright Information created by the Defense Digital Service is in the public domain and you may reproduce, publish, or otherwise use it without our permission. Please consider appropriate citation to the Defense Digital Service as the source. However, copyrighted materials created by entities outside of the Defense Digital Service also may appear on this website, on our third-party site accounts, or may be reached through a link on this website. Copyright and other intellectual property laws may apply to your use of those materials.
Images Because this site contains images from many sources, we want to label them as clearly as we can.
- Images labeled USGW (U.S. Government Work) were created by government employees as a part of their work. In most cases, you may reproduce, publish, or otherwise use it without our permission, though we request you appropriately cite the creator where noted. You cannot (in general) use U.S. government trademarks or the logos of U.S. government agencies without permission. See USA.gov for more details on copyright exceptions. For specific information on the Department of Defense Seal, see Military Service Seals.
- Images labeled Public Domain are non-government images released into the public domain. You may reproduce, publish, or otherwise use it without permission.
- Images labeled © (Copyright) are non-government images where the owner is retaining all rights associated with Copyright. You cannot reuse these images without permission. We can put you in touch with the owner if you want to ask to use one of these images.
- Logo for the Hack the Pentagon bug bounty program: USGW
- Logo for the Hack The Air Force 2.0 Bug Challenge: HackerOne / ©
- Logo for USMEPCOM - the US Military Entrance Processing Command: USGW
- The Code.gov logo; the word ''Code'' monospaced with an underscore after, reminescent of a terminal prompt: USGW
- The USTRANSCOM logo; a light blue sphere with white gridlines, a gold winged sea horse, all within a white designation band edged light blue, displaying four gold stars, two on either side of the inscription ''UNITED STATES'' at top and ''TRANSPORTATION COMMAND'' below, all black. All surmounting a light blue compass rose.: USGW
- Army Digital Service Logo: USGW
- Air Force Digital Service Logo: USGW
- Tim Van Name: Tim Van Name / ©
- Chris Lynch: Chris Lynch / ©
- Hunter Price: Hunter Price / ©
- Patrick Stoddart: Patrick Stoddart / ©
- CBS interview prep with Chris.: Reina Staley / USGW
- Person climbing rope.: Kathy Reesey / USGW
- Corey in front of Hack the Pentagon logo.: Chris Lynch / USGW
- Nick on subway with homemade art.: Chris Lynch / USGW
- Chris posing in front of plane.: Stephanie Dreyer / USGW
- Rebel Alliance door sign.: Chris Lynch / USGW
- Discovery sprint team photo - Justin, Nathan, Parisa, Weaver, and Brad.: Weaver / USGW
- People trying out Hololens.: Reina Staley / USGW
- Weaver balancing on obstacle course.: Kathy Reesey / USGW
- Office visit from Bezos and Secretary of Defense.: Master Sgt. Adrian Cadiz / USGW
- Rebel base art delivered to HQ.: Reina Staley / USGW
- Team photo with Bezos and Secretary of Defense.: Master Sgt. Adrian Cadiz / USGW
We will revise or update this policy from time to time. If we make significant changes to how we handle personal information, we will post changes to the policy on our site and change the date at the top. We will provide additional notice in advance (e.g., a disclaimer on our website) if material changes are being made.