Polycom RealPresence Collaboration Server (RMX) 1500/2000/4000 Administrator’s Guide
21-48 Polycom, Inc.
Communications using, or data stored on, this IS are not private, are
subject to routine monitoring, interception, and search, and may be
disclosed or used for any USG authorized purpose.
This IS includes security measures (e.g., authentication and access
controls) to protect USG interests--not for your personal benefit or
privacy.
Notwithstanding the above, using this IS does not constitute consent to
PM, LE or CI investigative searching or monitoring of the content of
privileged communications, or work product, related to personal
representation or services by attorneys, psychotherapists, or clergy, and
their assistants. Such communications and work product are private and
confidential. See User Agreement for details.

Sample 2 Banner

This system is for the use of authorized users only. Individuals using this
computer system without authority, or in excess of their authority, are
subject to having all of their activities on this system monitored and
recorded by systems personnel. In the course of monitoring individuals
improperly using this system, or in the course of system maintenance, the
activities of authorized users also may be monitored. Anyone using this
system expressly consents to such monitoring and is advised that if such
monitoring reveals possible criminal activity, system personnel may provide
the evidence of such monitoring to law enforcement officials.

Sample 3 Banner

You are about to access a system that is intended for authorized users only.
You should have no expectation of privacy in your use of this system. Use
of this system constitutes consent to monitoring, retrieval, and disclosure
of any information stored within the system for any purpose including
criminal prosecution.

Sample 4 Banner

This computer system including all related equipment, network devices
(specifically including Internet access), is provided only for authorized
use. All computer systems may be monitored for all lawful purposes,
including ensuring that their use is authorized, for management of the
system, to facilitate protection against unauthorized access, and to verify
security procedures, survivability and operational security. Monitoring
includes active attacks by authorized personnel and their entities to test
or verify the security of the system. During monitoring, information may be
examined, recorded, copied and used for authorized purposes. All information
including personal information, placed on or sent over this system may be
monitored. Use of this system, authorized or unauthorized, constitutes
consent to monitoring of this system. Unauthorized use may subject you to
criminal prosecution. Evidence of any such unauthorized use collected during
monitoring may be used for administrative, criminal or other adverse action.
Use of this system constitutes consent to monitoring for these purposes.