220-This system is for the use of authorized users only. Individuals
220-using this computer system without authority, or in excess of their
220-authority, are subject to having all of their activities on this
220-system monitored and recorded by system personnel.
220-In the course of monitoring individuals improperly using this
220-system, or in the course of system maintenance, the activities of
220-authorized users may also be monitored.