Ask myPay -- Online Customer Service
May I view and print my Leave and Earnings Statement (LES) / Pay Statement online?
Question
May I view and print my Leave and Earnings Statement (LES) / Pay Statement online?
Answer
All Active/Reserve Military and Civilians:
You may view, save, and print your Leave and Earnings Statement (LES) from myPay by selecting the Leave and Earnings Statement (LES) option from your menu. Your LES will remain available for a temporary period after your separation: Non-Appropriated Fund employees:
Your last 26 LESs will remain available until they have cycled off through normal monthly updates. Army, Navy and Air Force (Active):
Your last 12 LESs will remain available until they have cycled off through normal monthly updates. LESs will not be available online after separation. Army, Navy and Air Force (Reserve):
Your LESs for the last 13 months will remain available until they have cycled off through normal monthly updates. Marines (Active and Reserve):
Your last 12 LESs will remain available until they have cycled off through normal monthly updates. Civilians:
Your last 26 LESs will remain available until they have cycled off through normal pay period updates. Annuitants and Retired Military:
You can also view and print your account statements on-line. Former Spouses:
You can view and print your Pay Statement on-line.
Current Viewer Rating for this FAQ
Provide your input by Rating this FAQ - 5 is the best possible rating.
Top Five items from this sub category (By Rating):
Frequently Asked Question
Viewer Rating
You are entering an Official U.S. Government System
- The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personal misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.
- At any time, the USG may inspect and seize data stored on this IS.
- Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.
- This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.
- Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement and User Rules of Behavior for details.
Privacy Act Statement:
- The Privacy Act of 1974 covers the information you provide to AskDFAS. To receive a copy of the Privacy Act Statement for the actions you enter into the system, please see your supervisor.
- Authority: Title 5 U.S.C. Chapters 53, 55, 81; Title 10 U.S.C. Chapters 11, 61-73; Title 37 U.S.C.; GAO Manual for Guidance of Federal Agencies, Title 6, Chapter 4, para. 4.2.B.2; and E.O. 9397
- Purpose of Use/Dissemination: Data gathered by the AskDFAS system is shared/disseminated to DFAS operations personnel with a need-to-know to include customer service representatives, accountants or technicians for purposes of use in identifying, researching and satisfying ticket inquiries within DFAS accounting systems. PII information types subject to gathering are listed here:
- Routine Uses: Those generally permitted under the 5 U.S.C. 522A(B) of the Privacy Act as required.
- Disclosure: Disclosure is voluntary.
Section 508 Compliance Statement
In accordance with Section 508 of the Rehabilitation Act of 1973, as amended, (29 U.S.C. 794d), DFAS is committed to ensuring that AskDFAS functionality and content is accessible to all customers. Send feedback or concerns related to the accessibility of this website to the DFAS 508 coordinator at: dfas.indianapolis-in.zta.mbx.section508@mail.mil. For more information about Section 508, please visit the DoD Chief Information Officer (CIO) Section 508 Website available at https://dodcio.defense.gov/DoDSection508.aspx
I consent to the above for system access
MANDATORY NOTICE AND CONSENT PROVISION FOR ALL DOD INFORMATION SYSTEM USER AGREEMENTS
By clicking the Consent button on the prior page to enter the system, you acknowledge:
- You are accessing a U.S. Government (USG) information system (IS) (which includes any device attached to this information system) that is provided for U.S. Government-authorized use only.
- You consent to the following conditions
- The U.S. Government routinely intercepts and monitors communications on this information system for purposes including, but not limited to, penetration testing, communications security (COMSEC) monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.
- At any time, the U.S. Government may inspect and seize data stored on this information system.
- Communications using, or data stored on, this information system are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any U.S. Government-authorized purpose.
- This information system includes security measures (e.g., authentication and access controls) to protect U.S. Government interests -- not for your personal benefit or privacy.
- Notwithstanding the above, using an information system does not constitute consent to personnel misconduct, law enforcement, or counterintelligence investigative searching or monitoring of the content of privileged communications or data (including work product) that are related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Under these circumstances, such communications and work product are private and confidential, as further explained below:
- Nothing in this User Agreement shall be interpreted to limit the user's consent to, or in any other way restrict or affect, any U.S. Government actions for purposes of network administration, operation, protection, or defense, or for communications security. This includes all communications and data on an information system, regardless of any applicable privilege or confidentiality.
- The user consents to interception/capture and seizure of ALL communications and data for any authorized purpose (including personnel misconduct, law enforcement, or counterintelligence investigation). However, consent to interception/capture or seizure of communications and data is not consent to the use of privileged communications or data for personnel misconduct, law enforcement, or counterintelligence investigation against any party and does not negate any applicable privilege or confidentiality that otherwise applies.
- Whether any particular communication or data qualifies for the protection of a privilege, or is covered by a duty of confidentiality, is determined in accordance with established legal standards and DoD policy. Users are strongly encouraged to seek personal legal counsel on such matters prior to using an information system if the user intends to rely on the protections of a privilege or confidentiality.
- Users should take reasonable steps to identify such communications or data that the user asserts are protected by any such privilege or confidentiality. However, the user's identification or assertion of a privilege or confidentiality is not sufficient to create such protection where none exists under established legal standards and DoD policy.
- A user's failure to take reasonable steps to identify such communications or data as privileged or confidential does not waive the privilege or confidentiality if such protections otherwise exist under established legal standards and DoD policy. However, in such cases the U.S. Government is authorized to take reasonable actions to identify such communication or data as being subject to a privilege or confidentiality, and such actions do not negate any applicable privilege or confidentiality.
- These conditions preserve the confidentiality of the communication or data, and the legal protections regarding the use and disclosure of privileged information, and thus such communications and data are private and confidential. Further, the U.S. Government shall take all reasonable measures to protect the content of captured/seized privileged communications and data to ensure they are appropriately protected.
AskDFAS Rules of Behavior
By clicking the Consent button on the prior page to enter the system, you acknowledge as an Authorized user you shall:
- Hold a U.S. Government security clearance commensurate with the level of access granted.
- Access only that data, control information, software, hardware, and firmware for which they are authorized access and have a need-to-know, and assume only those roles and privileges for which they are authorized.
- Observe policies and procedures governing the secure operation and authorized use of a DoD information system.
- Use AskDFAS only for authorized purposes.
- Immediately report all IA-related events, potential threats, and vulnerabilities involving AskDFAS to either the System ISSM, System Manager, or contact DFAS CSSP at 327-212-9172. After hours, call DMI at 1-844-DISA-HLP (844-347-2457), press 5 or email: dfasdmiservicedesk@mail.mil .
- Ensure that system media and output are properly marked, controlled, stored, transported, and destroyed based on classification or sensitivity and need-to-know.
- Not introduce or use unauthorized software, firmware, or hardware with AskDFAS.
- Ensure that devices that display or output sensitive information in human-readable form are positioned to deter unauthorized individuals from reading the information and/or obtain a privacy screen filter for your monitor.
- Ensure that all documents, equipment, and machine-readable media containing sensitive data are cleared, properly marked, and sanitized before being released outside of the Department of Defense.
- Protect Common Access Card (CAC) and/or personal identification number (PIN). Do not record, write or display PINs at any time. PINs will be kept confidential and are not to be shared with anyone. Only the individual will have knowledge of the login ID and PIN combination. This unique login ID and PIN combination will be used as the basis for holding the individual accountable for actions associated with their login ID. PINs shall not be composed of easily guessed names or personally related items such as children's or spouse's names addresses, etc. If you believe your PIN has been compromised, promptly change the PIN and immediately notify the Information System Security Manager (ISSM).
Personally Identifiable Information (PII):
You may be granted access to personal information about an individual that identifies, links, relates, or is unique to, or describes him or her, e.g., name, phone numbers, rank/grade. Such information is also known as personally identifiable information (PII).
- Comply with DFAS policies for safeguarding and protecting PII.
- Follow DFAS policies and procedures for reporting a PII breach.
Administrative and Privileged users shall:
- Utilize public key (PK)-enabled government owned computers while accessing DoD systems for administrative and/or privileged use.
- Connect to the application system via DFAS Network.
If you have any questions or comments about the information presented here, please contact the System Manager.
Information Types Subject to Gathering:
- Social Security Number (SSN) (full or in any form)
- Birth Date
- Child Information
- Citizenship
- Disability Information
- DoD ID Number
- Driver's License
- Employment Information
- Financial Information
- Gender/Gender Identification
- Home/Cell Phone
- Law Enforcement Information
- Legal Status
- Mailing/Home Address
- Marital Status
- Medical Information
- Military Records
- Mother's Middle/Maiden Name
- Name(s)
- Official Duty Address
- Official Duty Telephone Number
- Other ID Number
- Personal E-mail Address
- Place of Birth
- Position/Title
- Protected Health Information (PHI)
- Race/Ethnicity
- Rank/Grade
- Work E-mail Address
- In addition to the above, other data elements may be requested or required in the course of researching and responding to ticket submissions.