Ultra Secure Mode
Polycom®, Inc.
846
Guidelines for Customizing the Login Page Banner
●
The Login Page Banner cannot be disabled when the Collaboration Server is in Ultra Secure Mode.
●
The Login Page Banner must be acknowledged before the user is permitted to log in to the system.
●
If a Custom banner has been created, and the user selects one of the alternative, non-modifiable
banners the Custom banner not deleted.
●
The Custom Login Page Banner banner may contain up to 1300 characters.
●
An empty Login Page Banner is not allowed.
●
Any attempt to modify a non-modifiable banner results in it automatically being copied to the Custom
banner.
Non-Modifiable Banner Text
Sample 1 Banner
You are accessing a U.S. Government (USG) Information System (IS) that is provided
for USG-authorized use only.
By using this IS (which includes any device attached to this IS), you consent to the
following conditions:
−
The USG routinely intercepts and monitors communications on this IS for purposes
including, but not limited to, penetration testing, COMSEC monitoring, network
operations and defense, personnel misconduct (PM), law enforcement (LE), and
counterintelligence (CI) investigations.
−
At any time, the USG may inspect and seize data stored on this IS.
−
Communications using, or data stored on, this IS are not private, are subject to
routine monitoring, interception, and search, and may be disclosed or used for any
USG authorized purpose.
−
This IS includes security measures (e.g., authentication and access controls) to
protect USG interests--not for your personal benefit or privacy.
−
Notwithstanding the above, using this IS does not constitute consent to PM, LE or
CI investigative searching or monitoring of the content of privileged communications,
or work product, related to personal representation or services by attorneys,
psychotherapists, or clergy, and their assistants. Such communications and work
product are private and confidential. See User Agreement for details.
Sample 2 Banner
This system is for the use of authorized users only. Individuals using this computer
system without authority, or in excess of their authority, are subject to having all
of their activities on this system monitored and recorded by systems personnel. In
the course of monitoring individuals improperly using this system, or in the course
of system maintenance, the activities of authorized users also may be monitored.
Anyone using this system expressly consents to such monitoring and is advised that if
such monitoring reveals possible criminal activity, system personnel may provide the
evidence of such monitoring to law enforcement officials.
Summary of Contents for RealPresence RMX 4000
Page 135: ...Defining SVC and Mixed CP and SVC Conference Profiles Polycom Inc 104 12 Click the IVR tab ...
Page 468: ...Conference and Participant Monitoring Polycom Inc 437 ...
Page 578: ...Network Security Polycom Inc 547 3 Define the following fields ...
Page 992: ...Appendix D Ad Hoc Conferencing and External Database Authentication Polycom Inc 961 ...