persist-efile.hud.gov Open in urlscan Pro
64.132.40.128  Public Scan

Submitted URL: https://persist-efile.hud.gov/etk-hud-persist-prod/
Effective URL: https://persist-efile.hud.gov/etk-hud-persist-prod/login.request.do
Submission: On December 22 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

Name: signonFormPOST /etk-hud-persist-prod/login.submit.do

<form name="signonForm" method="post" action="/etk-hud-persist-prod/login.submit.do">
  <div><input type="hidden" name="org.apache.struts.taglib.html.TOKEN" value="124ddcb8cbdc839730a02ed97214a2f8"></div><input type="hidden" name="service" value="">
  <p>
    <label for="username" accesskey="u">
      <span>Username</span>
      <input type="text" name="username" id="username" placeholder="Username" size="20" maxlength="255" aria-label="Please enter your username">
    </label>
    <label for="password" accesskey="p">
      <span>Password</span>
      <input type="password" name="password" id="password" size="20" maxlength="255" placeholder="Password" aria-label="Please enter your password">
    </label>
  </p>
  <p>
    <input type="submit" id="submit" aria-describedby="policy security-notice" value="Sign On" class="button">
  </p>
</form>

Text Content

By signing on to this system you are agreeing to follow the stated security
policy.

Username Password




SECURITY POLICY

This computer system and all related equipment, networks, and network devices
contains data belonging to the U.S. Government, and is provided for use by
authorized personnel only. To facilitate protection against unauthorized access,
and to verify operational security, this computer may be monitored for all
lawful purposes, including ensuring that its use is authorized. During
monitoring, system usage may be examined, recorded, and subject to audit. All
activities and information, including personal information, associated with the
use of this system may be monitored and recorded. Use of this computer system,
authorized or unauthorized, constitutes consent to monitoring and recording.
Misuse or unauthorized use is strictly prohibited and may subject you to
criminal prosecution. Evidence of misuse collected during monitoring may be used
for administrative, criminal, or other adverse action. Use of this system
implies understanding of these terms and conditions. Authority: U.S. Federal
Criminal Code (18 USC 1030 Fraud and Related Activity with Computers), Privacy
Act of 1974, and HUD Information Technology Security Policy 2400.25.