Warning Banner Sample for Systems and Network Devices

System/Network Login Banners

Login banners provide a definitive warning to any possible intruders that may want to access your system that certain types of activity are illegal, but at the same time, it also advises the authorized and legitimate users of their obligations relating to acceptable use of the computerized or networked environment(s).

A requirement for successfully prosecuting unauthorized users who improperly use an organization’s computer is that the computer must have a warning banner displayed at all access points. The banner must warn authorized and unauthorized users:

  1. what is considered proper use of the system;
  2. that the system is being monitored to detect improper use and other illicit activity;
  3. that there is no expectation of privacy while using this system.

The technical details for implementing banners is dependent on the particular operating system and access point. Below are long- and short-form login banners that are acceptable to use on any organization’s system.

Long-Form Banner:

* * * * * * * * * * W A R N I N G * * * * * * * * * *

This computer system is the property of [Organization Name]. It is for authorized use only. By using this system, all users acknowledge notice of, and agree to comply with, the [Organization Name] Acceptable Use of Information Technology Resources Policy (“AUP”).  Click here to read the policy.

Users have no personal privacy rights in any materials they place, view, access, or transmit on this system. The [Organization Name] complies with state and federal law regarding certain legally protected confidential information, but makes no representation that any uses of this system will be private or confidential.

Any or all uses of this system and all files on this system may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized [Organization Name] and law enforcement personnel, as well as authorized individuals of other organizations. By using this system, the user consents to such interception, monitoring, recording, copying, auditing, inspection, and disclosure at the discretion of authorized [Organization Name] personnel.

Unauthorized or improper use of this system may result in administrative disciplinary action, civil charges/criminal penalties, and/or other sanctions as set forth in the University’s AUP. By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use.

If you are physically located in the European Union, you may have additional rights per the GDPR. Visit the web site dataprivacy.utk.edu for more information.117-120217-18

ALL USERS SHALL LOG OFF [Organization Name] OWNED SYSTEM IMMEDIATELY IF SAID USER DOES NOT AGREE TO THE CONDITIONS STATED ABOVE.

* * * * * [Organization Name Department]* * * * *

 Short-Form Banner:

* * * * * * * * * * W A R N I N G * * * * * * * * * *

This computer system is the property of the [Organization Name]. It is for authorized use only.  By using this system, all users acknowledge notice of, and agree to comply with, the [Organization Name] Acceptable Use of Information Technology Resources Policy (“AUP”).  Click here to read the policy.  Unauthorized or improper use of this system may result in administrative disciplinary action, civil charges/criminal penalties, and/or other sanctions as set forth in the [Organization Name] AUP. By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use.

If you are physically located in the European Union, you may have additional rights per the GDPR. Visit the web site dataprivacy.utk.edu for more information.

LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning.

* * * * * * * * * * * * * * * * * * * * * * * *

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.