The Defense Department (DOD) created the Too Much to Lose campaign and website as part of a comprehensive effort to educate Service members on prescription drug misuse and illicit and prohibited drug use. We take your privacy very seriously. In compliance with the online privacy guidelines of the White House Office of Management and Budget, we do not sell, share or rent any personally identifying information about you.
The information we receive depends on what you do when visiting our site. If you choose to submit a comment or question to the “Contact Us” submission page, we will request your e-mail address to respond. We will store the address only long enough to respond to your request. If you request materials to be sent and identify yourself as a point of contact for the Too Much to Lose campaign, we may add your contact information to our database to receive materials and follow up information.
We automatically collect and store the following information about your visit:
On certain Web pages, we may use a certain type of “cookie” – what is known as a “session” cookie – to help you use our website interactively. Cookies are data a website can send to your browser. Session cookies (also known as session variables) are kept in your browser’s memory and are purged after your browser session is over. Session cookies are used to keep track of passwords, preferences, orders and various other aspects of a user’s “session” within a website. We may use session cookies to improve your interaction with selected pages on the site. We do not use session cookies to track or personally identify users. Further, we do not make use of “persistent cookies” – another type of cookie that, when used, are stored on your hard drive and can be used to track Web users over time and across websites.
You should be aware that when you are on the Too Much to Lose website, you could be directed to other sites that are beyond our control, because there are links to other sites outside of toomuchtolose.org. These other sites may collect data or solicit personal information. Always be aware of where you end up on the Web.
For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.