This system is for the use of authorized personnel only. By logging onto this system, you are subject to the terms and conditions of all Information Security policies and standards. Use by unauthorized individuals or for unauthorized purposes
is a violation of federal and/or state law. The Company reserves the right to take any necessary action to protect authorized users, intellectual property and other information assets. Individuals using this system are subject to having
all of their activities on this system monitored. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity, system personnel may provide the evidence
of such monitoring to law enforcement officials.