This is an archived web site made available for research purposes. The web page is no longer being maintained.
- This website is provided as a public service
by the Defense Advanced Research Projects Agency (DARPA).
- Information presented on this website is
considered public information and may be distributed or copied unless
otherwise specified. Use of appropriate byline/photo/image credits is
- Privacy Notice - If you choose to
provide us with personal information – e.g., registration for Challenge
participation - we only use that information for site administration,
registration tracking, communication with registrants, and to provide updates.
Other than for this use, personal information will not be maintained, used,
stored, indexed, or retrieved from any information system/database without
your prior notice, choice, or consent. DARPA never collects information for
commercial marketing. While you must provide an e-mail address or postal
address for a response other than those generated automatically in response to
questions or comments that you may submit, we recommend that you NOT include
any other personal information, especially Social Security numbers as part of
the registration process itself. At the end of the Challenge - and as part of
the award process - winner(s) may be required to provide their Social Security
number and other personally identifiable information (PII) as required by law.
The Social Security Administration offers additional guidance on sharing your
Social Security number. In addition, any winner(s) will be provided with a
Privacy Act Statement notice informing them of the authority, purpose, routine
uses, and disclosures underlying the collection of their Social Security
- DARPA maintains a variety of physical,
electronic and procedural safeguards to protect personal information. For site
security purposes and to ensure that this service remains available to all
users, this government computer system employs software programs to monitor
network traffic to identify unauthorized attempts to upload or change
information, or otherwise cause damage.
- Except for authorized law enforcement
investigations, no other attempts are made to identify individual users or
their usage habits. Raw data logs are used for no other purposes and are
scheduled for regular destruction in accordance with National Archives and
Records Administration guidelines.
- Unauthorized attempts to upload information
or change information on this service are strictly prohibited and may be
punishable under the Computer Fraud and Abuse Act of 1986 and the National
Information Infrastructure Protection Act.
- If you have any questions or comments about
the information presented here, please forward them to us at firstname.lastname@example.org.