Unauthorized use is prohibited; Usage may be subject to security testing and monitoring; Misuse may be subject to criminal prosecution; Users have no expectation of privacy except as otherwise provided by applicable privacy laws; and A reference to University Standard Administrative Procedure 29.01.03.M0.02, Rules for Responsible Computing.