This computer system, including all related equipment, networks and
network devices (including Internet Access) are provided only for
authorized U.S. Government use. DoD Computer systems may be monitored
for all lawful purposes, including to ensure that their use is
authorized, for management of the system, to facilitate protection
against unauthorized access, and to verify security procedures,
survivability and operational security. Monitoring includes, but is
not limited to, active attacks by authorized DoD entities to test or
verify the security of the system. During monitoring, information may
be examined, recorded, copied and used for authorized purposes. All
information, including personal information, placed on or sent over
this system may be monitored. Use of this DoD computer system,
authorized or unauthorized, constitutes consent to monitoring of this
system. Unauthorized use may subject you to criminal
prosecution. Evidence of unauthorized use collected during monitoring
may be used for administrative, criminal or other adverse action. Use
of this system constitutes consent to monitoring for all lawful purposes.
The data contained herein is protected by the Privacy Act of 1974.
All measures required to protect this information should be taken.