This computing system is a company owned asset and provided for the exclusive use
of authorized personnel for business purposes. All information and data created,
accessed, processed, or stored using this system (including personal information)
are subject to monitoring, auditing, or review to the extent permitted by applicable
law. Unauthorized use or abuse of this system may lead to corrective action including
termination of employment, civil and/or criminal penalties.