Network Monitoring
All DoD interest computer systems and related equipment are
intended for the communication, transmission, processing, and
storage of official US Government authorized information only.
US Government telecommunications systems and ADPs are subject to
periodic security testing and monitoring without prior
notification to ensure proper functioning of equipment and
systems including security devices, to prevent unauthorized use
and violations of statutes and security regulations, to deter
criminal activity, and for other similar purposes. Use of any
Government network or equipment constitutes consent to
monitoring.
Any user of a DoD interest computer system should be aware that
any
information placed in the system is subject to monitoring and is
not subject to any expectation of privacy. If monitoring of the
system reveals possible evidence of violation of criminal
statutes,
this evidence and any other related information, including
identification information about the user, may be provided to law
enforcement officials. If monitoring reveals violations of
security
regulations of unauthorized use, employees who are responsible
will
be subject to appropriate disciplinary action. The notice
explaining this information (shown below) is displayed whenever a
user at NRL logs into NRL's networks.
-
- Use of this or any other DoD interest computer system
constitutes
a consent to monitoring at all times.
- This is a DoD interest computer system. All DoD interest
computer
systems and related equipment are intended for the communication,
transmission, processing, and storage of official U.S. Government
or authorized information only. All DoD interest computer
systems
are subject to monitoring at all times to ensure proper
functioning
of equipment and systems including security devices and systems,
to prevent unauthorized use and violations of statutes and
security
regulations, to deter criminal activity, and for other similar
purposes. Any user of a DoD interest computer system should be
aware that any information placed in this system is subject to
monitoring and is not subject to any expectation of privacy.
- If monitoring of this or any DoD interest computer system
reveals
possible evidence of violation of criminal statutes, this
evidence
and any other related information, including identification
information about the user, may be provided to law enforcement
officials. If monitoring of this or any other DoD interest
computer system reveals violations of security regulations or
unauthorized use, employees who violate security regulations or
make unauthorized use of DoD interest computer systems are
subject
to appropriate disciplinary action.