THIS SYSTEM IS FOR THE USE OF AUTHORIZED USERS ONLY.
INDIVIDUALS USING THIS COMPUTER SYSTEM WITHOUT AUTHORITY,
OR IN EXCESS OF THEIR AUTHORITY, ARE SUBJECT TO HAVING ALL OF
THEIR ACTIVITIES ON THIS SYSTEM MONITORED AND RECORDED BY SYSTEM PERSONNEL.
IN THE COURSE OF MONITORING INDIVIDUALS IMPROPERLY USING THIS SYSTEM,
OR IN THE COURSE OF SYSTEM MAINTENANCE, THE ACTIVITIES OF AUTHORIZED USERS
MAY ALSO BE MONITORED. ANYONE USING THIS SYSTEM EXPRESSLY CONSENTS TO
SUCH MONITORING AND IS ADVISED THAT IF SUCH MONITORING REVEALS POSSIBLE
EVIDENCE OF CRIMINAL ACTIVITY, SYSTEM PERSONNEL MAY PROVIDE THE EVIDENCE
OF SUCH MONITORING TO LAW ENFORCEMENT OFFICIALS. REPORT SUSPECTED VIOLATIONS
TO THE SYSTEM SECURITY OFFICER.
|
|