|
Authorized Use |
This system is for authorized users only. |
This is a private computing system with restricted access. |
All accesses, including unauthorized attempted accesses, are logged. |
Those who attempt unauthorized access are subject to criminal and/or civil prosecution. |
|