Hearst Mobile Connect

 

The Hearst Information Security Policy This system, which includes proprietary and confidential information (including copyrighted material and trade secrets), is for authorized users only. Anyone using this computer is subject to having their activities monitored. In the course of monitoring individuals improperly using this system, or in the course of system maintenance, the activities of authorized users may also be monitored. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals criminal activity, or misappropriation or misuse of information of materials included in the system, system personnel may provide evidence of such monitoring to law enforcement officials and may enforce any rights and remedies resulting from the misappropriation or misuse or unauthorized use of information and materials.