Overview of RAI Activities Throughout the Product Life Cycle

Privacy and Security

The RAI Toolkit website is provided as a public service by the Chief Digital and Artificial intelligence office (CDAO).

Information presented on this website is considered public information and may be distributed or copied unless otherwise specified. Use of appropriate byline/photo/image credits is requested.

If you choose to provide us with personal information — like filling out a Contact Us form with email and/or postal addresses — we only use that information to respond to your message or request. We will only share the information you give us with another government agency if your inquiry relates to that agency, or as otherwise required by law. We never create individual profiles or give it to any private organizations. Defense.gov never collects information for commercial marketing. While you must provide an email address or postal address for a response other than those generated automatically in response to questions or comments that you may submit, we recommend that you NOT include any other personal information, especially Social Security numbers. The Social Security Administration offers additional guidance on sharing your Social Security number.

We maintain a variety of physical, electronic and procedural safeguards to protect your personal information. For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.

For site management, information is collected for statistical purposes, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.

Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.

Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.

This website uses measurement and customization technology known as a “cookies.” Cookies are used to remember a user's online interactions with a website or online application to conduct measurement and analysis of usage or to customize the user's experience.

Two kinds of cookies are used on this website. A single-session cookie (Tier 1) is a line of text that is stored temporarily on a user's computer and deleted as soon as the browser is closed. A persistent or multisession cookie (Tier 2) is saved to a file on a user's hard drive and is called up the next time that user visits a website. Use of these cookies does not involve the collection of a visitor's personally identifiable information.

The Defense Department does not use the information associated with cookies to track individual user activity on the internet outside DOD websites, nor does it share the data obtained through such technologies, without the user's explicit consent, with other departments or agencies. DOD does not keep a database of information obtained from the use of cookies.

Cookies are enabled by default to optimize website functionality and customize user experience. Users can choose not to accept the use of these cookies by changing the settings on their local computer's web browser. The USA.gov website, https://www.usa.gov/optout-instructions, provides general instructions on how to opt out of cookies and other commonly used web measurement and customization technologies. Opting out of cookies still permits users to access comparable information and services; however, it may take longer to navigate or interact with the website if a user is required to fill out certain information repeatedly.

Third-party websites and applications that are not owned, operated, or controlled by the Defense Department are integral to internet-based operations across DOD and used to augment official communication. These capabilities include, but are not limited to, networking services, media sharing services, wikis and data mashups. A list of DOD's authorized pages and uses of these services is available at https://dod.defense.gov/About/Military-Departments/DOD-Websites/. These sites may collect personally identifiable information and may make it available to the DOD and other users; however, the information is not collected on behalf of, nor is it provided specifically for DOD. DOD does not harvest and additionally collect, maintain, share or otherwise use such personally identifiable information for any purpose other than that for which it is made available to all users.