You are accessing a PC-Warriors LLC Information System (IS).
Use of this System constitutes:
- Consent for authorized monitoring at all times. To ensure proper functioning of equipment and systems including security systems and devices.
- To prevent, detect, and deter violations of statutes and security regulations and other unauthorized use of the system. This system and related equipment are intended for the communication, transmission, processing, and storage of official authorized information only. Communications using, or data stored on this system are:
-- Not private
-- Subject to routine monitoring, interception, and search.
-- May be disclosed or used for any authorized purpose.
If monitoring of this system reveals possible evidence of violation of criminal statutes or security regulations (or other unauthorized usage), this evidence and any other related information, including user identification, may be provided to law enforcement officials.
Use of this System constitutes:
- Consent for authorized monitoring at all times. To ensure proper functioning of equipment and systems including security systems and devices.
- To prevent, detect, and deter violations of statutes and security regulations and other unauthorized use of the system. This system and related equipment are intended for the communication, transmission, processing, and storage of official authorized information only. Communications using, or data stored on this system are:
-- Not private
-- Subject to routine monitoring, interception, and search.
-- May be disclosed or used for any authorized purpose.
If monitoring of this system reveals possible evidence of violation of criminal statutes or security regulations (or other unauthorized usage), this evidence and any other related information, including user identification, may be provided to law enforcement officials.
