For security purposes, this computer system employs software programs to monitor network traffic.
Anyone using this system consents to the monitoring of their activities by security personnel.
All activities are logged.
Unauthorized access or attempts to use, alter, destroy or damage data, programs or equipment
will result in criminal prosecution. In the event of unauthorized intrusion, all relevant
information regarding possible violation of law will be provided to law enforcement officials.