This computer system, which includes all related equipment, networks, and
network devices, is operated by Cornerstone Information Systems (CIS) and is
for authorized users only. Any unauthorized access, attempted access, or use of
this system is prohibited and is subject to criminal and civil penalties under
Federal and/or State Law including but not limited to the Computer Fraud and
Abuse Act of 1986. CIS computer systems may be monitored for all lawful
purposes, including to ensure that their use is authorized, for management of
the system, to facilitate protection against unauthorized access, and to verify
security procedures, survivability, and operational security. Anyone using this
system expressly consents to such monitoring and is advised that if such
monitoring reveals possible evidence of criminal activity, system and security
personnel will provide such evidence to the appropriate law enforcement
officials for prosecution to the full extent of the law. Please review the
“Terms of Use” and “Privacy Statement” links for further information regarding
the use of and access to this computer system.
|