Logo

You are accessing a Verint Information System (IS) that is provided for Verint use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions:

  1. Verint routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.
  2. At any time, Verint may inspect and seize data stored on this IS.
  3. Communications using, or data stored on this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any Verint authorized purpose.
  4. This IS includes security measures (e.g., authentication and access controls) to protect Verint interests - not for your personal benefit or privacy.
  5. This system contains information that may be considered sensitive data and must be accessed in accordance with data handling practices.

Unauthorized or improper use of this system may result in administrative disciplinary action, civil and criminal penalties.

By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use.