THIS IS A PRIVATE COMPUTER SYSTEM.
This computer system, including all related equipment, networks and network
devices (including Internet access) is provided only for authorized use. All
computer systems may be monitored for all lawful purposes to ensure their use is
authorized, for management of the system, to facilitate protection against
unauthorized access, and to verify security procedures, survivability, and
operations security.
Monitoring includes, but is not limited to, active attacks by authorized
personnel to test or verify the security of this system. During monitoring,
information may be examined, recorded, copied, and used for authorized purposes.
All information including personal information placed on or sent over this
system may be monitored.
Use of this computer system, authorized or unauthorized, constitutes consent to
monitoring. Unauthorized use of this computer system may subject you to criminal
prosecution. Evidence of unauthorized use collected during monitoring may be
used for administrative, criminal or other adverse action.