This is a Verizon computer system. This resource, including all related
equipment, networks and network devices, is provided for authorised
Verizon use only. Verizon computer systems may be monitored to ensure
authorised and acceptable use, for management of the system, to facilitate
protection against unauthorized access and to verify security and
operational procedures. The monitoring of this system may include
audits by authorised Verizon personnel to test or verify the use
and security of this system. During monitoring information may be
examined, recorded, copied and used for authorised purposes as described
in the relevant Commonwealth Security Manuals (PSM, DSM, ISM) and
in Verizon policies. All information placed on or sent to/from this
system may be subject to such monitoring procedures. Use of this
Verizon computer system, authorised or unauthorised, constitutes
consent to this policy and the policies and procedures set forth
in the relevant Commonwealth Security Manuals (PSM, DSM, ISM) and by
Verizon management. Evidence of unauthorised use collected during
monitoring/auditing may be used for disciplinary and/or criminal
prosecution by our customers, Verizon and law enforcement agencies.
The unauthorised access, use or modification of this computer system
or the data contained therein or in transit to/from, is prohibited
by Part VIA of the Commonwealth Crimes Act, other Federal and State
laws and the Verizon Code of Conduct. For security related issues
please contact the Verizon Service Desk by phone on 1300 761 101
option 2 or email on servicedesk@au.verizon.com