The information systems you are about to use are Webster owned and intended for use by authorized users for official company business.
As such, Webster reserves the right to monitor all activity on all company provided equipment and services for unauthorized or improper use,
including adherence to the Corporate Information Security Acceptable Use Policy.
Use of the company provided information systems and networks in violation of Webster policies may result in disciplinary action, up to and
including termination. By logging into the Webster domain, you agree to abide by these terms and policies.
The information systems you are about to use are Webster owned and intended for use by authorized users for official company business.
As such, Webster reserves the right to monitor all activity on all company provided equipment and services for unauthorized or improper use,
including adherence to the Corporate Information Security Acceptable Use Policy.
Use of the company provided information systems and networks in violation of Webster policies may result in disciplinary action, up to and
including termination. By logging into the Webster domain, you agree to abide by these terms and policies.
The information systems you are about to use are Webster owned and intended for use by authorized users for official company business.
As such, Webster reserves the right to monitor all activity on all company provided equipment and services for unauthorized or improper use,
including adherence to the Corporate Information Security Acceptable Use Policy.
Use of the company provided information systems and networks in violation of Webster policies may result in disciplinary action, up to and
including termination. By logging into the Webster domain, you agree to abide by these terms and policies.