Description : This is a privately-operated computer network and access and use is monitored to ensure system security and operational integrity, and to ensure compliance with organizational policies and applicable laws and regulations. Consequently, authorized IT personnel may (a) intercept, retrieve and disclose information stored on or communications made using the computer network, (b) monitor and log a user’s activity on the computer network, (c) access and search devices and software used to connect to