You are accessing a proprietary information system (IS) that is provided for U.S. Government (USG) authorized use only.
By using this IS, which includes any device attached to this IS, you consent to the following conditions:
Jacobs Technology routinely intercepts and monitors communications occurring on this IS for purposes including,
but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM),
quality control, employee misconduct, law enforcement (LE) and counterintelligence (CI) investigations.
At any time, the Jacobs Technology may inspect and seize data stored on this IS, and any device attached to this IS
and provide it to the USG for further inspection.
Communications occurring on or data stored on this IS, or any device attached to this IS, are not private and
are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose.
Security protections may be utilized on this IS to protect certain interests that are important to the Jacobs Technology.
For example, passwords, access cards, encryption or biometric access controls provide security for the benefit of the USG.
These protections are not provided for your benefit or privacy and may be modified or eliminated at the USG’s discretion.
Users will not attempt to strain, test, circumvent, or bypass network or Ginkgo+ security mechanisms, or to perform network or
keystroke monitoring. Approved activities, operating in their official capacities only, may be exempted from this requirement.
Notwithstanding the above, using this IS does not constitute consent to PM, LE, or CI investigative searching or
monitoring of the content of privileged communications, or work product, related to personal representation or
services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work products
are private and confidential.