For security purposes, and to ensure system integrity, this computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information or to otherwise cause damage, including attempts to deny service to authorized users. Attempts to upload or change information on this system without integral authorization or to download and copy with the intent to defraud are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986, the National Information Infrastructure Protection Act, and other applicable law, both written and natural. |