This system is for use by authorized users only.
        Individuals using this computer system without
        authority, or in excess of their authority, are subject
        to having all of their activities on this system
        monitored, and recorded by system personnel. In the
        course of monitoring individuals improperly using this 
        system, or in the course of system maintenance, the
        activities of authorized users may also be monitored.
        Anyone using this system expressly consents to such
        monitoring and is advised that if such monitoring
        reveals possible evidence of criminal activity, system
        personnel may provide the evidence of such monitoring
        to law enforcement officials.