You are accessing the Knowledge Management System (KMS) utilizing the Odysseus™ web-based preparedness and planning system developed and maintained by Integrated Solutions Consulting (ISC) and our clients. The KMS program and system is the property of Integrated Solutions Consulting (ISC). The planning information (non-proprietary e.g. code and operational concepts) is the property of each client and ISC; the planning information is mutually protected as confidential. ISC will not share or disseminate any planning information developed by the client without the client’s approval. The client will not share or disseminate any planning information developed by ISC without ISC’s approval. Since the KMS integrates client and ISC planning information and concepts the KMS security policy is designed to protect both parties as a collaborative endeavor.
By using the KMS, you consent to the terms set forth in this notice, the Security Policy, the Authorized User Agreement, the Access and Use Policy, and the Security Agreement. Access to the KMS is restricted to authorized users only. Unauthorized access, use, or modification of this system or of data contained herein, or in transit to/from this system, is strictly prohibited. Anyone who accesses the KMS without authorization or exceeds access authority, or obtains, alters, damages, destroys, or discloses information, or prevents authorized use of information on the KMS, may be subject to internal disciplinary action, may lose access to the system, and in serious cases make face further legal action.
By using the KMS and Odysseus, you consent to monitoring of your access and use of the system, and are advised that, if such monitoring reveals any violation of Client and Security Policy, the Authorized User Agreement, the Access and Use Policy, the Security Agreement, or any other Terms of Use, the violation shall be reported to the proper supervisory personnel, and may result in internal disciplinary action, loss of access to the system, and in serious cases further legal action. The KMS and any related equipment is subject to monitoring for administrative oversight, data security and integrity, inquiries into alleged wrongdoing or misuse, to ensure proper performance of applicable security features and procedures, and in serious instances of abuse, may be used for law enforcement and/or criminal investigative purposes.
Social Security Number (SSN) and Health Insurance Portability and Accountability Act (HIPAA) information is not a component of the KMS.