This system is operated in the interests of the U.S. Government. The use of this U.S. Government system is restricted to authorized users only.
Unauthorized access, use, or modification of this computer system or of the data contained herein or in transit to/from this system constitutes a violation of Title 18,
United States Code, Section 1030, and state criminal and civil laws. These systems and equipment are subject to monitoring to ensure proper performance of applicable security features or procedures.
Such monitoring may result in the acquisition, recording, and analysis of all data being communicated, transmitted, processed, or stored in this system by a user. If monitoring reveals possible evidence of
criminal activity, such evidence may be provided to law enforcement personnel.
Anyone who accesses a Federal computer system without authorization or exceeds their access authority, and by any means of such conduct obtains, alters, damages, destroys, discloses information,
or prevents authorized use of information on the computer, shall be subject to fine or imprisonment, or both.