This is a private computer system. This computer system, including all related equipment, networks, devices, and
Internet access is for the use of authorized users only. Individuals using this system must abide by all
Information Security Policies and are subject to having all of their activities on this system monitored
and recorded. Anyone using this system expressly consents to such monitoring and is advised that if such
monitoring reveals possible evidence of criminal activity, that evidence may be provided to law enforcement
officials. Unauthorized use of this system may subject you to discipline, up to and including termination
of employment, or criminal or civil penalties. Evidence of any unauthorized use collected during monitoring
may be used for administrative, criminal, or other adverse action.