Please enter your email and password





*** WARNING ***

  • You are accessing a U.S. Government information system. This information system is provided for U.S. Government-authorized use only.
  • Unauthorized or improper use of this system may result in disciplinary action, as well as civil and criminal penalties.
  • By using this information system, you understand and consent to the following:
    • You have no reasonable expectation of privacy regarding any communications or data transiting or stored on this information system. At any time, and for any lawful Government purpose, the government may monitor, intercept, and search and seize any communication or data transiting or stored on this information system.
    • Any communication or data transiting or stored on this information system may be disclosed or used for any lawful Government purpose.

Nursing Model Rules of Behavior


To browse through our web site, you need to agree to the following:
a.  I understand that I have been given the user id and password to use on a system owned by the U.S. Government, and I am responsible for actions taken with that user id and password.
b.   I will not share my password with others.
c.   If I suspect that the security of my password is compromised, I will change it immediately and notify the Nursing Model System Owner.
d.   I will use the system to carry out only those procedures which form a part of my job function.
e.   I will not try to upload any infected software programs that will damage this Government system.
In the event it is suspected that you do not comply with these rules of behavior your account will be frozen and you will be denied access to the site. Suitable disciplinary action, including termination, might be taken. Intrusion Detection This site is maintained for the U.S. Government. It is protected by various provisions of Title 18, U.S. Code. Violations of Title 18 are subject to criminal prosecution in federal court. For site security purposes and to ensure that this service remains available for legitimate use by authorized users, we will collect information concerning your use of this system, such as the data you view and alter. We employ software programs to monitor traffic to identify unauthorized attempts to view or change information, or otherwise cause damage. In the event of authorized law enforcement investigations, and pursuant to any required legal process, information from these sources may be used to help identify unauthorized activities.