- March 2 Success is provided as a public service by the Department of the Army and US Army Recruiting Command. March2Success does not provide any specific user data to any other party, including the US Army and US Army Recruiting Command. However, if a user registers as part of the Future Soldiers Training Program, or if an Educator registers in the site to track student progress within the March2Success program, some data may be shared.
- Privacy Act Notice: The instructional portion of the Web site requires you to register with your personally identifiable information. Before signing up to use our site, you must read and agree with our privacy and security policy. When you register as a student on our site, we collect certain information about you. We collect your name, your email address, and your state and zipcode. We also ask you to create a user name and password. The primary reason we collect this information is to establish an account for you on the March 2 Success Web site. We use your user name to welcome you back to the site. You do not have to give us any information about yourself, but unfortunately, you would not be able to use Instructional portion of the Web site.
- The Children's Online Privacy Protection Act of 1998 (COPPA) requires that we do not collect any personally identifiable information from a child under 13 without verifiable parent consent. This site is intended for students who are at least 13 years old. By registering to use this site, you are certifying that you are at least 13. (Title 15 USC Section 6502.)
- We protect your information during transmission to our database using 128-bit encryption, using SSL technology.
- For site management and statistical purposes, the Web user's source IP address, date and time of request, location of requested Web site file from the server, size of the file, referral web page, browser used, and the status code for a web user's request for the web site file are recorded. The Web site uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.
- Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.
- Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
- If you have any questions or comments about the information presented here, please forward them to us using the March 2 Success Help page.
- Cookie Disclaimer - March 2 Success does not use persistent cookies (persistent tokens that pass information back and forth from the client machine to the server). March 2 Success may use session cookies (tokens that remain active only until you close your browser) in order to make the site easier to use. March 2 Success does not keep a database of information obtained from these cookies. You can choose not to accept these cookies and still use the site, but not all functionalities will work as intended. Refer to the help information in your browser software for instructions on how to disable and enable cookies.
What is encryption? Let us give you a little background information before we answer that question.
When you're on the Internet -- sending or receiving email, chatting, or even surfing - you're sending information back and forth between your computer and another. It doesn't go just from your machine to the other machine. It takes a winding route through several different systems. Someone could be monitoring your data "conversation" at any point along the route -- like someone could be eavesdropping on your conversation with your friends.
The technology used - SSL (that stands for Secure Sockets Layer) with 128-bit encryption on March2Success and many other leading Web sites - allows you to conduct your digital conversations in private, in a way that only your machine and the other machine understand.
Most of the newer Web browsers support 128-bit encryption, but older ones - or browsers purchased outside the United States - might not. Check your encryption preferences to see if yours does. You could also go to https://www.fortify.net/sslcheck.html to check.
If you find out that your browser doesn't support this level of encryption, you'll have to download a program to fix your browser. It's free, and you can do it from almost anywhere in the world. If you use Internet Explorer, go to click here and choose the "high encryption" pack for your version of Internet Explorer. You can get the latest version of Firefox at http://www.mozilla.com/en-US/.