This computer system is the property of the company. As such, it may be accessed only by authorized users. Unauthorized use of this system is strictly prohibited and may be subject to criminal prosecution. the company may monitor any activity or communication on the system and retrieve any information stored within the system. By accessing and using this site, you are consenting to such monitoring and information retrieval by law enforcement and for other purposes. Users should have no expectation of privacy as to any communication on or information stored within the system, including information stored locally on the hard drive or other media in use with this site (e.g., floppy disks, PDAs and other hand-held peripherals, CD-ROMs, etc.) This site must be used within the guidelines of's Personnel Rules and Regulations.

Unauthorized attempts to defeat or circumvent security features, to use the site for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts will be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.