
    -----------------------------------------------------------------
   | This system is for the use of authorized users only.            |
   | Individuals using this computer system without authority, or in |
   | excess of their authority, are subject to having all of their   |
   | activities on this system monitored and recorded by system      |
   | personnel.                                                      |
   |                                                                 |
   | In the course of monitoring individuals improperly using this   |
   | system, or in the course of system maintenance, the activities  |
   | of authorized users may also be monitored.                      |
   |                                                                 |
   | Anyone using this system expressly consents to such monitoring  |
   | and is advised that if such monitoring reveals possible         |
   | evidence of criminal activity, system personnel may provide the |
   | evidence of such monitoring to law enforcement officials.       |
    -----------------------------------------------------------------

