WARNING: This
is a private computer system. This computer system, including all related
equipment, networks, and network devices (specifically including internet
access), are provided only for authorized use.
Users (authorized or unauthorized) have no explicit or implicit expectation of
privacy.
Unauthorized or improper use of this system may result in civil and criminal
penalties. By continuing to use this system you indicate your awareness of and
consent to the policies
. Log off immediately
if you do not agree to the conditions stated in the Terms of Use .
|
NOTICE TO USERS:
These computer systems may be monitored for all lawful purposes, including, but
not limited to ensure that their use is authorized, for management of the
system, to facilitate protection against unauthorized access, and to verify
security procedures, survivability and operational security. Monitoring includes
active attacks by authorized entities to test or verify the security of this
system. During monitoring, information may be examined, recorded, copied and
used for authorized purposes. All information, including personal information,
placed on or sent over this system may be monitored. Use of this computer
system, authorized or unauthorized, constitutes consent to monitoring of this
system. Evidence of unauthorized use collected during monitoring may be used for
administrative, legal or other adverse action.
|
UNAUTHORIZED ACCESS AND
MALICIOUS ACTIONS: All users are forbidden to attempt unauthorized
entry to computer systems or accounts, or to attempt unauthorized damage,
alteration, falsification or deletion of data (including software and email).
This prohibition explicitly includes attempts to spoof or falsify email,
network, or other information used to identify sources, destinations or other
information about communications, data, or storage. Individuals are implicitly
authorized to access accounts in their own name, and to alter or delete data in
those accounts, and they may access files, which are enabled, for reading by
them. The burden of proof of authorization rests with the person attempting to
access an account; possession of a password is not proof of authorization. All
users are forbidden to attempt to cause denial of computing or network services.
|
|
|