www.cisa.gov
Open in
urlscan Pro
2a02:26f0:3500:891::447a
Public Scan
URL:
https://www.cisa.gov/privacy-policy
Submission: On July 03 via api from US — Scanned from DE
Submission: On July 03 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id2">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Skip to main content An official website of the United States government Here’s how you know Here’s how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites. Cybersecurity & Infrastructure Security Agency America's Cyber Defense Agency Search × search Menu Close × search * Topics Topics Cybersecurity Best Practices Cyber Threats and Advisories Critical Infrastructure Security and Resilience Election Security Emergency Communications Industrial Control Systems Information and Communications Technology Supply Chain Security Partnerships and Collaboration Physical Security Risk Management How can we help? GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help Locally * Spotlight * Resources & Tools Resources & Tools All Resources & Tools Services Programs Resources Training Groups * News & Events News & Events News Events Cybersecurity Alerts & Advisories Directives Request a CISA Speaker Congressional Testimony * Careers Careers Benefits & Perks HireVue Applicant Reasonable Accommodations Process Hiring Resume & Application Tips Students & Recent Graduates Veteran and Military Spouses Work @ CISA * About About Culture Divisions & Offices Regions Leadership Doing Business with CISA Contact Us Site Links Reporting Employee and Contractor Misconduct CISA GitHub Report a Cyber Issue America's Cyber Defense Agency Breadcrumb 1. Home 2. About 3. Site Links Share: WEBSITE PRIVACY POLICY Thank you for visiting the Cybersecurity and Infrastructure Security Agency (CISA) online and reviewing our website privacy policy. Our privacy policy explains how we handle the personally identifiable information (PII) that you provide to us when you visit us online to browse, obtain information, or conduct a transaction. PII includes information that is personal in nature and which may be used to identify you. You may provide PII to us when you send us an e-mail message or a request for information, when you fill out a questionnaire or customer satisfaction survey, when you participate in a research study, etc. We do not require you to register or provide PII to visit our websites. We do collect some technical information that does not include PII when you visit to make your visit seamless. The section below explains how we handle and collect information when you visit CISA websites. The PII you provide on a CISA website will be used only for the purpose for which you provided it. We will protect your information consistent with the principles of the Privacy Act of 1974, the E-Government Act of 2002, and the Federal Records Act. We welcome feedback if you have any questions regarding our privacy policy or the use of your information. Any additional privacy questions should be directed to the CISA Office of Privacy. CISA’s privacy compliance materials are available at Privacy Impact Assessments (PIA) and Systems of Records Notices (SORN). For additional information about our Privacy Policy, please contact us at: Email:Privacy@cisa.dhs.gov Mail: CISA Office of Privacy DHS Mail Stop 0380 245 Murray Lane Arlington, VA 20598 As a general rule, CISA does not collect PII about you when you visit our websites, unless you choose to provide such information to us. Submitting PII through our website is voluntary. By doing so, you are giving the Department permission to use the information for a specific, stated purpose. If you choose to provide us with PII through such methods as completing a web form, we will use that information to help us provide you the information or service you have requested. The information we may receive from you varies based on what you do when visiting our site. We only share the PII you give us with another government agency if your inquiry relates to that agency, or as otherwise required by law. We never create individual profiles or give your PII to any private organizations. CISA never collects information for commercial marketing. If we store your PII in a record system designed to retrieve information about you by personal identifier (name, personal email address, home mailing address, personal or mobile phone number, etc.), so that we may contact you, we will safeguard the information you provide to us in accordance with the Privacy Act of 1974, as amended (5 U.S.C. §552a). The Act requires all public-facing sites or forms that request PII to prominently and conspicuously display a privacy notice. The notice must address the following criteria: 1. Legal authorization to collect information about you; 2. Purpose for which the information will be used; 3. Routine uses for disclosure of information outside of the Department of Homeland Security; 4. Whether your providing the information is voluntary or mandatory under law; and 5. Effects if you choose to not provide the requested information. For the general contact information that may be submitted through CISA websites, we have completed a Privacy Impact Assessment (PIA) and System of Records Notice (SORN) providing details about the privacy protections and redress options available for the contact information we collect from the public. This information may be used to distribute information to you and to perform various administrative tasks. For further information, please reference the privacy compliance documentation below: * DHS/ALL/PIA-006 Department of Homeland Security General Contact Lists Privacy Impact Assessment (April 25, 2019) * DHS/ALL-002 Department of Homeland Security (DHS) Mailing and Other Lists System of Records Notice (November 25, 2008) (73 FR 71659) Email Communications Many of our programs and websites allow you to send us email messages. We will use the information you provide to respond to your inquiry. We will only send you general information via email. You should be reminded that email may not necessarily be secure against interception. Therefore, we suggest that you do not send sensitive PII (such as your Social Security number) to us via email. If your intended email communication is sensitive, e.g., it includes information such as your bank account, charge card, or Social Security number, you should instead send it by U.S. mail. Another alternative may be submission of data through a secure program website, if available. Electronic mail messages that meet the definition of records in the Federal Records Act (44 U.S.C. § 3101) are covered under the same disposition schedule as all other Federal records. This means that emails you send us will be preserved and maintained for varying periods of time if those emails meet the definition of Federal records. Electronic messages that are not records are deleted when no longer needed. Web Measurement Tools and Web Surveys When you browse through any website, certain information about your visit can be collected. We automatically collect the following types of information about your visit: * Domain from which you access the internet; * IP address (an IP address is a number that is automatically assigned to a computer when surfing the internet); * Operating system and information about the device or browser used when visiting the site; * Date and time of your visit; * Content you visited or downloaded; and, * Website (such as google.com or bing.com) or referral source (email notice or social media site) that connected you to the website. CISA uses Google Analytics measurement software to collect the information listed above. The data are automatically sent to Google’s system and the system immediately aggregates the data. Neither the Department nor Google ever have access to the specifics of your particular site visits. The staff can only see the aggregate data from all users for a particular time period. CISA gathers this information to improve our websites and has chosen to not share the aggregate data with Google. We may use the aggregated data to share with our partners and contractors to help improve visitor experiences. CISA also uses online surveys to collect opinions and feedback from a random sample of visitors. CISA uses Survey Monkey online surveys to obtain feedback and data on visitors’ satisfaction with CISA websites. Surveys do not collect PII and participation in surveys is voluntary. If you decline the survey, you will still have access to identical information and resources on the website as those who take the survey. Answers to the survey help CISA improve its websites to make it easier to use and more responsive to the needs of our visitors. CISA staff conducts analysis and reports on aggregated data from website surveys. The reports are only available to website managers, members of their communications and web teams, and other designated staff who require this information to perform their duties. CISA retains data from Google analytics and Survey Monkey survey results only as long as required by law or needed to support the mission of CISA websites. How CISA Uses Cookies The Office of Management and Budget Memo M-10-22, Guidance for Online Use of Web Measurement and Customization Technologies allows Federal agencies to use session and persistent cookies. When you visit any website, its server may generate a piece of text known as a “cookie” to place on your computer. Placing cookie text allows websites to “remember” visitors’ preferences, surfing patterns, and behavior while they are connected. The cookie makes it easier for you to use the dynamic features of webpages. Cookies from CISA webpages only collect information about your browser’s visit to the site; they do not collect any personal information about you. There are two types of cookies, single session (temporary), and multi-session (persistent). Session cookies last only as long as your web browser is open. Once you close your browser, the cookie disappears. Persistent cookies are stored on your computer for longer periods. Session Cookies: We use session cookies for technical purposes such as to enable better navigation through our site. These cookies let our server know that you are continuing to visit our site. The OMB Memo 10-22 guidance defines our use of session cookies as “Usage Tier 1-Single Session.” The policy says, “This tier encompasses any use of single session web measurement and customization technologies.” Persistent Cookies: We use persistent cookies to differentiate between new and returning visitors to our site. Persistent cookies remain on your computer between visits to CISA websites for six months. We also use persistent cookies to block repeated invitations to take our customer satisfaction surveys. The persistent cookies that block repeated survey invitations expire in 90 days. The OMB Memo 10-22 guidance defines our use of persistent cookies as “Usage Tier 2-Multi-session without Personally Identifiable Information (PII).” The policy says, “This tier encompasses any use of multi-session web measurement and customization technologies when no PII is collected.” Third party software, modules, or add-ins being leveraged on CISA websites may or may not use persistent cookies or similar technology; however, no data collected in this manner is accessible, viewable, or retained by the federal government. If you do not wish to have session or persistent cookies stored on your machine, you can opt out or disable cookies in your browser. You will still have access to all information and resources at CISA websites. However, turning off cookies may affect the functioning of some websites. Be aware that disabling cookies in your browser will affect cookie usage at all other websites your visit as well. For additional information about CISA’s use of Google Analytics, please see our privacy impact assessment, DHS/ALL/PIA-033 Google Analytics (June 9, 2011). Third-Party Websites and Applications CISA uses social media websites and other kinds of third-party websites. CISA uses social media websites to engage in dialogue, share information and media, and collaborate with the public. CISA may also use these websites to make information and services widely available, while promoting transparency and accountability, as a service for those seeking information about or services from CISA. The Department has published two Privacy Impact Assessments detailing the use of social media: * DHS/ALL/PIA-031 Use of Social Networking Interactions and Applications Communications/Outreach/Public Dialogue (September 16, 2010) * DHS/ALL/PIA-036 Use of Unidirectional Social Media Applications (March 8, 2011) CISA does not used third-party websites to solicit and collect PII from individuals. Any PII collected by the third-party website will not be transmitted or stored by CISA; no PII will be disclosed, sold, or transferred to any other entity outside the Department, unless required for law enforcement purposes or by statute consistent with the Privacy Act. Site Security CISA takes the security of all PII very seriously. We take precautions to maintain the security, confidentiality, and integrity of the information we collect on CISA websites. Such measures include access controls designed to limit access to the information to the extent necessary to accomplish our mission. We also employ various security technologies to protect the information stored on our systems. We routinely test our security measures to ensure that they remain operational and effective. * For site security purposes and to ensure that services remain available to all users, this government computer system employs commercial software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. * Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines. * Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act. Visiting Other Websites Our websites may contain links to international agencies, private organizations, and commercial entities. These websites are not within our control and may not follow the same privacy, security, or accessibility policies. Once you link to another site, you are subject to the policies of that site. All Federal websites, however, are subject to the same Federal policy, security, and accessibility mandates. Return to top * Topics * Spotlight * Resources & Tools * News & Events * Careers * About Cybersecurity & Infrastructure Security Agency * Facebook * Twitter * LinkedIn * YouTube * Instagram * RSS CISA Central 888-282-0870 Central@cisa.dhs.gov(link sends email) DHS Seal CISA.gov An official website of the U.S. Department of Homeland Security * About CISA * Accessibility * Budget and Performance * DHS.gov * FOIA Requests * No FEAR Act * Office of Inspector General * Privacy Policy * Subscribe * The White House * USA.gov * Website Feedback