15.12.2012 Views

enlisted distribution and assignment system (edas) - Soldier Support ...

enlisted distribution and assignment system (edas) - Soldier Support ...

enlisted distribution and assignment system (edas) - Soldier Support ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PERNET/EDAS LOG-ON INSTRUCTIONS<br />

PPPPPPPPP EEEEEEEEEE RRRRRRRRR<br />

PPPPPPPPPP EEEEEEEEEE RRRRRRRRRR ttt<br />

PPP PPP EEE RRR RRR ttttttttttt<br />

PPPPPPPPPP EEEEEEE RRRRRRRRRR nnnnnnnn eeeeeee ttt<br />

PPPPPPPPPP EEEEEEE RRRRRRRRRR nnn nnn eee eee ttt<br />

PPP EEE RRR RRR nnn nnn eeeeeeee ttt<br />

PPP EEEEEEEEEE RRR RRR nnn nnn eee ttt<br />

PPP EEEEEEEEEE RRR RRR nnn nnn eeeeeeee ttt<br />

/K or LOGOFF to EXIT<br />

This network of computers is protected by a security <strong>system</strong>.<br />

Criminal law prohibits unauthorized use. Violators will be prosecuted.<br />

*****************************************************************************<br />

* USER-ID: PASSWORD: 15:25:15 *<br />

* NEW PASSWORD: 11/05/05 *<br />

* ACCOUNT: ALTC0487 *<br />

* TRANSFER: 3278-2A *<br />

* SMRTAL9A *<br />

********************************* TPX 5.1 ***********************************<br />

STEP 1: ENTER YOUR PERNET USER ID AND PASSWORD AND PRESS “ENTER”.<br />

ATTENTION!<br />

This is a DOD computer <strong>system</strong>. Before processing classified information,<br />

check the security accreditation level of this <strong>system</strong>. Do not process, store,<br />

or transmit information classified above the accreditation level of this<br />

<strong>system</strong>. This computer <strong>system</strong>, including all related equipment, networks, <strong>and</strong><br />

network devices (includes internet access) are provided only for authorized<br />

U. S. Government use. DOD computer <strong>system</strong>s may be monitored for all lawful<br />

purposes, including to ensure their use is authorized, for management of the<br />

<strong>system</strong>, to facilitate protection against unauthorized access, <strong>and</strong> to verify<br />

security procedures, survivability, <strong>and</strong> operational security. Monitoring<br />

includes, but is not limited to, active attacks by authorized DOD entities to<br />

test or verify the security of this <strong>system</strong>. During monitoring, information<br />

may be examined, recorded, copied, <strong>and</strong> used for authorized purposes. All<br />

information, including personal information, placed on or sent over this<br />

<strong>system</strong> may be monitored. Use of this DOD computer <strong>system</strong>, authorized or<br />

unauthorized, constitutes consent to monitoring. Unauthorized use of this<br />

DOD computer <strong>system</strong> may subject you to criminal prosecution. Evidence of<br />

unauthorized use collected during monitoring may be used for administrative,<br />

criminal, or other adverse action. Use of this <strong>system</strong> constitutes consent to<br />

monitoring for all lawful purposes.<br />

Press ENTER to Continue<br />

STEP 2. PRESS ENTER TO CONTINUE.<br />

Page 4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!