System/Network Login Banners

Updated by the IT Security Community of Practice & Office of General Counsel – January 2014

Login banners provide a definitive warning to any possible intruders that may want to access your system that certain types of activity are illegal, but at the same time, it also advises the authorized and legitimate users of their obligations relating to acceptable use of the computerized or networked environment(s).

A requirement for successfully prosecuting unauthorized users who improperly use a university computer is that the computer must have a warning banner displayed at all access points. The banner must warn authorized and unauthorized users:

  1. what is considered proper use of the system;
  2. that the system is being monitored to detect improper use and other illicit activity;
  3. that there is no expectation of privacy while using this system.

The technical details for implementing banners is dependent on the particular operating system and access point. Below are long- and short-form login banners that are acceptable to use on any University of Tennessee system.

Long-Form Banner:

* * * * * * * * * * W A R N I N G * * * * * * * * * *

This computer system is the property of The University of Tennessee. It is for authorized use only. By using this system, all users acknowledge notice of, and agree to comply with, the University’s Acceptable Use of Information Technology Resources Policy (“AUP”), available at http://policy.tennessee.edu/it_policy/it0110/.
Users have no personal privacy rights in any materials they place, view, access, or transmit on this system. The University complies with state and federal law regarding certain legally protected confidential information, but makes no representation that any uses of this system will be private or confidential.
Any or all uses of this system and all files on this system may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized University and law enforcement personnel, as well as authorized individuals of other organizations. By using this system, the user consents to such interception, monitoring, recording, copying, auditing, inspection, and disclosure at the discretion of authorized University personnel.
Unauthorized or improper use of this system may result in administrative disciplinary action, civil charges/criminal penalties, and/or other sanctions as set forth in the University’s AUP. By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use.
ALL USERS SHALL LOG OFF A UNIVERSITY OF TENNESSEE OWNED SYSTEM IMMEDIATELY IF SAID USER DOES NOT AGREE TO THE CONDITIONS STATED ABOVE.
* * * * * The University of Tennessee * * * * *

 Short-Form Banner:

* * * * * * * * * * W A R N I N G * * * * * * * * * *
This computer system is the property of the University of Tennessee. It is for authorized use only.  By using this system, all users acknowledge notice of, and agree to comply with, the University’s Acceptable Use of Information Technology Resources Policy (“AUP”), available at http://policy.tennessee.edu/it_policy/it0110/. Unauthorized or improper use of this system may result in administrative disciplinary action, civil charges/criminal penalties, and/or other sanctions as set forth in the University’s AUP. By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use.
LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning.
* * * * * * * * * * * * * * * * * * * * * * * *