An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Delaware National Guard
Delaware National Guard
Search
Search Delaware National Guard:
Search
Search Delaware National Guard:
Search
Home
About
DNG Leadership
DNG Factsheet
Briefings
Media
News
Photos
Social Media
Join
Join the DNG
Part-Time Jobs
Full-Time Careers
State Employee Positions
Active Duty Operational Support
Joint Support Services
Support Programs
Education Services
Intervention Services
Sexual Assault & Prevention
DoD Safe Helpline
Military Resources
Inspector General (IG)
Staff Judge Advocate (JAG)
Chaplain
Unit Self Assessment Program
Community
Contact Us
Email Inquiries
Military ID Card Information
Military Records Request
Federal Employees (Full-Time)
State Employees (Full-Time)
Bethany Beach Lodging
Noise Complaints
iSalute Suspicious Activity
Army Recruiting
Air Recruiting
Home
Privacy Act
PRIVACY ACT
This World Wide Web (WWW) site is provided as a public service by the Delaware National Guard, Wilmington, DE.
Information presented on this WWW site is considered public information and may be distributed or copied. Use of appropriate byline/photo/image credits is requested.
For site management, general information is collected for statistical purposes. This government computer system uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.
For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with the National Archives and Records Administration’s General Records Schedule 20 (Electronic Records).
Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
If you have any questions or comments about the information presented here, please forward them to us.