about us
Building for Peace debate forum
America's Future debate forum
Open debate forum

For site management, information is collected for statistical purposes. This government computer system uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.

For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.

Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes.  Below is a sample of the logs generated.

    Date:  07/02/99 02:01:17 PM - this is the date and time of the request

    User Address: -  this is the host name (or IP address) associated with the requester (you as the visitor).

    Authenticated User: -This indicates if the user has been authenticated

    Status: 200 - this is the status code - 200 is OK - the request was filled

    Content Length: 14109 - this is the size of the requested file in bytes

    Content Type:  text/html - this is the type of file requested

    Request:        GET / HTTP/1.0

    Browser Used:  - this identifies the type of browser software used to access the page, which indicates what design parameters to use in constructing the pages

    Error: - this indicates if there was an error

    Referring URL: -this indicates the last site the person visited, which indicates how people find this site

    Server Address: - this indicates the server our website is hosted on.

    Elapse Time (ms): -this indicates the time to deliver this page

Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.