This system is the property of this Corporation/organization, and is intended for the use of authorized users only. All activities of individuals using this computing system with or without authority, or in excess of their authority, may be monitored and recorded by system personnel. If any such monitoring reveals evidence of criminal activity or is in violation of foreign or U.S. state or federal law, such evidence may be provided to law enforcement officials and/or used for further legal action by this Corporation and/or the organization's Information Protection group. Unauthorized use of this system is prohibited and may result in revocation of access, disciplinary action and/or legal action. The company reserves the right to monitor and review user activity, files and electronic messages.