This computer system is the property and/or operated on behalf of the Library of Congress and may be
accessed only by authorized users. Users may access and use the Library's computer system only for
official business and in accordance with Library regulations.
Any usage of the Library's computer system is subject to monitoring by the Library and inappropriate
usage may subject the user to loss or limitation of the user's system access rights, adverse
administrative action, and criminal prosecution. By accessing and using the Library's computer
system, users are consenting to monitoring of their activities and communications on the system.
For site security and to ensure that this service remains available to all users, this Government
computer system employs software programs to monitor network traffic to identify unauthorized
attempts to upload or change information, deny service, otherwise cause damage, or access non-public
information. Unauthorized attempts to upload information or change information are strictly
prohibited and may be punishable under the United States Criminal Code (18 U.S.C. 1030). Information
regarding possible violations of law may be provided to law enforcement officials.
This system contains information protected under the provisions of the Privacy Act of 1974 (Public Law 93-579).
Any privacy information displayed on the screen or printed shall be protected from unauthorized disclosure.