Polycom DOC2702A User Manual

Page of 1010
Polycom RealPresence Collaboration Server (RMX) 1500/2000/4000 Administrator’s Guide 
21-48
Polycom, Inc.
− Communications using, or data stored on, this IS are not private, are 
subject to routine monitoring, interception, and search, and may be 
disclosed or used for any USG authorized purpose.
− This IS includes security measures (e.g., authentication and access 
controls) to protect USG interests--not for your personal benefit or 
privacy.
− Notwithstanding the above, using this IS does not constitute consent to 
PM, LE or CI investigative searching or monitoring of the content of 
privileged communications, or work product, related to personal 
representation or services by attorneys, psychotherapists, or clergy, and 
their assistants. Such communications and work product are private and 
confidential. See User Agreement for details.
Sample 2 Banner
This system is for the use of authorized users only. Individuals using this 
computer system without authority, or in excess of their authority, are 
subject to having all of their activities on this system monitored and 
recorded by systems personnel. In the course of monitoring individuals 
improperly using this system, or in the course of system maintenance, the 
activities of authorized users also may be monitored. Anyone using this 
system expressly consents to such monitoring and is advised that if such 
monitoring reveals possible criminal activity, system personnel may provide 
the evidence of such monitoring to law enforcement officials.
Sample 3 Banner
You are about to access a system that is intended for authorized users only.  
You should have no expectation of privacy in your use of this system.  Use 
of this system constitutes consent to monitoring, retrieval, and disclosure 
of any information stored within the system for any purpose including 
criminal prosecution.
Sample 4 Banner
This computer system including all related equipment, network devices 
(specifically including Internet access), is provided only for authorized 
use. All computer systems may be monitored for all lawful purposes, 
including ensuring that their use is authorized, for management of the 
system, to facilitate protection against unauthorized access, and to verify 
security procedures, survivability and operational security. Monitoring 
includes active attacks by authorized personnel and their entities to test 
or verify the security of the system. During monitoring, information may be 
examined, recorded, copied and used for authorized purposes. All information 
including personal information, placed on or sent over this system may be 
monitored. Use of this system, authorized or unauthorized, constitutes 
consent to monitoring of this system. Unauthorized use may subject you to 
criminal prosecution. Evidence of any such unauthorized use collected during 
monitoring may be used for administrative, criminal or other adverse action. 
Use of this system constitutes consent to monitoring for these purposes.