All access attempts are logged, unauthorized access will be prosecuted to the full extent of the law