This is an archived web site made available for research purposes. The web page is no longer being maintained.

Cyber Grand Challenge Logo

Privacy Policy

  1. This website is provided as a public service by the Defense Advanced Research Projects Agency (DARPA).
  2. Information presented on this website is considered public information and may be distributed or copied unless otherwise specified. Use of appropriate byline/photo/image credits is requested.
  3. Privacy Notice - If you choose to provide us with personal information – e.g., registration for Challenge participation - we only use that information for site administration, registration tracking, communication with registrants, and to provide updates. Other than for this use, personal information will not be maintained, used, stored, indexed, or retrieved from any information system/database without your prior notice, choice, or consent. DARPA never collects information for commercial marketing. While you must provide an e-mail address or postal address for a response other than those generated automatically in response to questions or comments that you may submit, we recommend that you NOT include any other personal information, especially Social Security numbers as part of the registration process itself. At the end of the Challenge - and as part of the award process - winner(s) may be required to provide their Social Security number and other personally identifiable information (PII) as required by law. The Social Security Administration offers additional guidance on sharing your Social Security number. In addition, any winner(s) will be provided with a Privacy Act Statement notice informing them of the authority, purpose, routine uses, and disclosures underlying the collection of their Social Security number.
  4. DARPA maintains a variety of physical, electronic and procedural safeguards to protect personal information. For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
  5. Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.
  6. Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
  7. If you have any questions or comments about the information presented here, please forward them to us at cybergrandchallenge@darpa.mil.
This is an Official U.S. Department of Defense Web Site sponsored by the Defense Advanced Research Projects Agency.