******************************************************************* * This system is for the use of authorized users only. * * Individuals using this computer system without authority, or in * * excess of their authority, are subject to having all of their * * activities on this system monitored and recorded by system * * personnel. * * * * In the course of monitoring individuals improperly using this * * system, or in the course of system maintenance, the activities * * of authorized users may also be monitored. * * * * Anyone using this system expressly consents to such monitoring * * and is advised that if such monitoring reveals possible * * evidence of criminal activity, system personnel may provide the * * evidence of such monitoring to law enforcement officials. * *******************************************************************