|
Individuals using this computer system without authority, or in
excess of their authority, are subject to having all of their activities
on this system monitored and recorded by system personnel.
In the course of monitoring individuals improperly using this system,
or in the course of system maintenance, the activities of
authorized users may also be monitored. Anyone using this
system expressly consents to such monitoring and is advised
that if such monitoring reveals possible evidence of criminal
activity, system personnel may provide the evidence of such
monitoring to law enforcement officials.
|