For security purposes and to make sure this service remains available to all users, we use special software programs for monitoring network traffic to identify unauthorized attempts to upload or change information, or otherwise to cause damage to this government computer system. These programs collect no information that would directly identify individuals, but they do collect information that could help us identify someone attempting to tamper with this Web site.
If you use this system, you should understand that all activities may be monitored and recorded. Anyone using this system expressly consents to such monitoring. If such monitoring reveals possible evidence of criminal activity, monitoring records may be provided to law enforcement officials.
Except for authorized law enforcement investigations, we make no other attempts to identify individual users or their usage habits. We only use raw monitoring data logs for determining trends in usage patterns and in diagnosing system problems.