Specifications

Table Of Contents
Detailed Description - Changes to Existing Security Features
91
By using this IS (which includes any device attached to this IS), you
consent to the following conditions:
The USG routinely intercepts and monitors communications on this IS
for purposes including, but not limited to, penetration testing, COMSEC
monitoring, network operations and defense, personnel misconduct (PM),
law enforcement (LE), and counterintelligence (CI) investigations.
At any time, the USG may inspect and seize data stored on this IS.
Communications using, or data stored on, this IS are not private, are
subject to routine monitoring, interception, and search, and may be
disclosed or used for any USG authorized purpose.
This IS includes security measures (e.g., authentication and access
controls) to protect USG interests--not for your personal benefit or
privacy.
Notwithstanding the above, using this IS does not constitute consent
to PM, LE or CI investigative searching or monitoring of the content of
privileged communications, or work product, related to personal
representation or services by attorneys, psychotherapists, or clergy,
and their assistants. Such communications and work product are private
and confidential. See User Agreement for details.
Sample 2 Banner
This system is for the use of authorized users only. Individuals using
this computer system without authority, or in excess of their
authority, are subject to having all of their activities on this system
monitored and recorded by systems personnel. In the course of
monitoring individuals improperly using this system, or in the course
of system maintenance, the activities of authorized users also may be
monitored. Anyone using this system expressly consents to such
monitoring and is advised that if such monitoring reveals possible
criminal activity, system personnel may provide the evidence of such
monitoring to law enforcement officials.
Sample 3 Banner
You are about to access a system that is intended for authorized users
only. You should have no expectation of privacy in your use of this
system. Use of this system constitutes consent to monitoring,
retrieval, and disclosure of any information stored within the system
for any purpose including criminal prosecution.
Sample 4 Banner
This computer system including all related equipment, network devices
(specifically including Internet access), is provided only for
authorized use. All computer systems may be monitored for all lawful
purposes, including ensuring that their use is authorized, for
management of the system, to facilitate protection against unauthorized
access, and to verify security procedures, survivability and
operational security. Monitoring includes active attacks by authorized
personnel and their entities to test or verify the security of the
system. During monitoring, information may be examined, recorded,
copied and used for authorized purposes. All information including
personal information, placed on or sent over this system may be
monitored. Use of this system, authorized or unauthorized, constitutes
consent to monitoring of this system. Unauthorized use may subject you
to criminal prosecution. Evidence of any such unauthorized use
collected during monitoring may be used for administrative, criminal or
other adverse action. Use of this system constitutes consent to
monitoring for these purposes.