By using this information system, you understand and consent to the following: all Leidos information systems, which include computers, networks, and connected devices, are owned or managed by or on behalf of Leidos and may be used only for official business purposes by authorized users to the extent of any system accreditation. Such use must also be consistent with applicable law and Leidos policies including, but not limited to, Leidos Security and Privacy Policies and the Leidos Code of Conduct. Unauthorized access or use is prohibited and may subject the user to civil and criminal penalties and/or disciplinary action, including termination. Leidos routinely monitors, searches, and retains communications and data on or from information technology systems for purposes including, but not limited to, penetration testing, security monitoring, network operations, data leakage protection, personnel misconduct/counterintelligence investigations, and government-directed investigations. Subject to applicable law, communications using, or data stored on Leidos information systems are not private, are subject to routine monitoring by Leidos for any Leidos-authorized purpose, and may be disclosed to third parties, including government and law enforcement agencies.


Login icon