Access is granted to authorized users only. All access is logged and monitored. Unauthorized access is investigated and may lead to civil or criminal prosecution.