Unauthorized access is a violation of U.S. Law and Commandant policy, and may result in criminal or administrative penalties. Users shall not access others users’ or system files without proper authority. Absence of access controls IS NOT authorization for access! USCG Information Systems are intended for communication, transmission, processing, and storage of U.S. Government information. These systems are subject to monitoring to ensure proper functioning, protect against improper or unauthorized use or access, and verify the presence and performance of applicable security features or procedures, and other like purposes. Such security monitoring may result in the acquisition, recording, and analysis of all data being communicated, transmitted, processed, or stored in this system by the user. If security monitoring reveals evidence of possible criminal activity, such evidence may be provided to law enforcement personnel. Use of this system constitutes consent to such monitoring.