=====================================================================
|                                                                   |
|  This system is for the use of authorized users only. Individuals |
|  using this computer system without authority, or in excess of    |
|  their authority, are subject to havings all of their activities  |
|  on this system monitored and recorded by systems personnel.      |
|                                                                   |
|  In the course of monitoring individuals improperly using this    |
|  system, or in the course of system maintenance, the activities   |
|  of authorized users may also be monitored.  Anyone using this    |
|  system expressly consents to such monitoring and is advised      |
|  that if such monitoring reveals possible criminal activity or    |
|  policy violation, system personnel may provide the evidence of   |
|  such monitoring to law enforcement or other officials.           |
|                                                                   |
=====================================================================