This is a U.S. Federal Government owned computer system, for the use by authorized users only.
Unauthorized access includes, but is not limited to: any access by an employee or agent of a commercial entity,
or other third party, who is not the individual authorized user,
for purposes of commercial advantage or private financial gain
(regardless of whether that commercial entity or third party is providing a service to an authorized user of the system);
and any access in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States
or of any State. Unauthorized access violates Title 18, U.S. Code Section 1030 and other applicable statutes. Violations are
punishable by civil and criminal penalties. Use of this system implies consent to have all activities on this system monitored and
recorded, which can be provided as evidence to law enforcement officials.