This system may be used only as authorized. Anyone accessing or using this system expressly consents to monitoring of their activities to protect against unauthorized use and for maintenance purposes. If such monitoring or recording reveals evidence of unauthorized use or criminal activity, IT personnel may provide that evidence to law enforcement officials.