This computer system, including all related equipment, networks, and network devices (specifically including Internet access) are provided only for authorized use by Cyber Info employees and volunteers. Cyber Info computer systems may be monitored for all lawful purposes, including ensuring that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability and operational security. Monitoring includes active attacks by authorized Cyber Info entities to test or verify the security of this system. During monitoring, information may be examined, recorded, copied and used for authorized purposes.
All information, including personal information, placed on or sent over this system may be monitored. Unauthorized use could result in criminal prosecution. Use of this Cyber Info computer system, authorized or unauthorized, constitutes consent to monitoring of this system.
By logging on, you acknowledge that you are aware of these responsibilities and you are in compliance with Cyber Info policies and guidelines. If you do not agree to these terms, please do not attempt to login. You are also aware that any misuse or appropriation of the system, information, or unauthorized disclosure of proprietary information could be subject to disciplinary action, including termination and legal action.