Privacy Policy
- March 2 Success is provided as a public service by the Department of the Army and US Army Recruiting Command. March2Success does not provide any specific user data to any other party, including the US Army and US Army Recruiting Command. However, if a user registers as part of the Future Soldiers Training Program, or if an Educator registers in the site to track student progress within the March2Success program, some data may be shared.
- Privacy Act Notice: The instructional portion of the Web site requires you to register with your personally identifiable information. Before signing up to use our site, you must read and agree with our privacy and security policy. When you register as a student on our site, we collect certain information about you. We collect your name, your email address, and your state and zipcode. We also ask you to create a user name and password. The primary reason we collect this information is to establish an account for you on the March 2 Success Web site. We use your user name to welcome you back to the site. You do not have to give us any information about yourself, but unfortunately, you would not be able to use Instructional portion of the Web site.
- The Children's Online Privacy Protection Act of 1998 (COPPA) requires that we do not collect any personally identifiable information from a child under 13 without verifiable parent consent. This site is intended for students who are at least 13 years old. By registering to use this site, you are certifying that you are at least 13. (Title 15 USC Section 6502.)
- We protect your information during transmission to our database using 128-bit encryption, using SSL technology.
- For site management and statistical purposes, the Web user's source IP address, date and time of request, location of requested Web site file from the server, size of the file, referral web page, browser used, and the status code for a web user's request for the web site file are recorded. The Web site uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.
- Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.
- Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
- If you have any questions or comments about the information presented here, please forward them to us using the March 2 Success Help page.
- Cookie Disclaimer - March 2 Success does not use persistent cookies (persistent tokens that pass information back and forth from the client machine to the server). March 2 Success may use session cookies (tokens that remain active only until you close your browser) in order to make the site easier to use. March 2 Success does not keep a database of information obtained from these cookies. You can choose not to accept these cookies and still use the site, but not all functionalities will work as intended. Refer to the help information in your browser software for instructions on how to disable and enable cookies.