This is a proprietary computer system. This system is for the use of authorized
users only. Individuals using this computer system without authority, or beyond
the limits of their authority or for inappropriate or unlawful purposes are subject
to having all of their activities on this system monitored and recorded. In the
course of monitoring individuals improperly using this system, or in the course
of system maintenance, the activities of authorized users may also be monitored.
Anyone using this system expressly consents to such monitoring. If monitoring
reveals unauthorized, inappropriate or possible unlawful activity, system personnel
will provide information derived from such monitoring to TI management or outside
legal authorities, as appropriate. Misuse of this system may result in disciplinary
action, including termination.