All systems at are for the use of authorized users only. Individuals using any computer system are subject to having their activities monitored and recorded by system personnel to ensure that the use is authorized.