This computer system including all related equipment, network devices are provided only for authorized use. All computer systems are actively monitored for all lawful purposes, including to ensure that their useis authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability and operational security.
During monitoring, information may be examined, recorded, copied and used for authorized purposes. All information placed on or sent over this system may be monitored. Uses of this system, authorized or unauthorized, constitutes consent to monitoring of this system.
Unauthorized use may subject you to criminal prosecution and/or civil litigation. Evidence of any such unauthorized use collected during monitoring may be used for administrative, criminal or other adverse action. Use of this system constitutes consent to monitoring.