-
Notifications
You must be signed in to change notification settings - Fork 0
/
index_banner.html
51 lines (38 loc) · 3.3 KB
/
index_banner.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
<html>
<head>
</head>
<body>
<div class="row">
<div id="container">
<div id="login">
<!-- Mobile image -->
<div id="mobile-login" class="row hidden-lg hidden-md">
<div style="margin-top:50px; margin-bottom:30px; text-align:center;">
</div>
</div>
<!-- Tablet and bigger device image -->
<div id="tablet-login" class="hidden-xs hidden-sm">
</div>
<!-- Usage Agreement -->
<div id="usageAgreementContainer">
<div id="usageAgreement">
<div style="width: 100%; text-align: center; background-color: lightpink;">
<h2>Warning</h2> </div>
<div style="padding: 10px;">
<p>You are accessing a U.S. Federal Government computer system intended to be solely accessed by individual users expressly authorized to access the system by the U.S. Department of Education. Usage may be monitored, recorded, and/or subject to audit. For security purposes and in order to ensure that the system remains available to all expressly authorized users, the U.S. Department of Education monitors the system to identify unauthorized users. Anyone using this system expressly consents to such monitoring and recording. Unauthorized use of this information system is prohibited and subject to criminal and civil penalties. Except as expressly authorized by the U.S. Department of Education, unauthorized attempts to access, obtain, upload, modify, change, and/or delete information on this system are strictly prohibited and are subject to criminal prosecution under 18 U.S.C 1030, and other applicable statutes, which may result in fines and imprisonment. For purposes of this system, unauthorized access includes, but is not limited to:</p>
<ul>
<li>Any access by an employee or agent of a commercial entity, or other third party, who is not the individual user, for purposes of commercial advantage or private financial gain (regardless of whether the commercial entity or third party is providing a service to an authorized user of the system); and</li>
<li>Any access in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or any State.</li>
</ul>
<p>If system monitoring reveals information indicating possible criminal activity, such evidence may be provided to law enforcement personnel.</p>
<p>Your use of this website implies your agreement to comply with the <a href="/NAEP-Rules-of-Behavior-FY-2015.pdf" target="_blank">Rules of Behavior for NAEP Private Sites</a>.</p>
</div>
<div style=" text-align: center; padding-top: 3em;">
<input type="button" name="ctl00$PlaceHolderMain$BtnAccept" value="I Accept" onclick="location.href = 'index.html';" id="PlaceHolderMain_BtnAccept" class="form-control" style="font-size: 1em; border: none;padding: 20px;text-align: center;text-decoration: none;display: inline-block;font-size: 16px;margin: 4px 2px;cursor: pointer;border-radius: 4px;">
</div>
</div>
</div>
</div><!--end of div#login -->
</div>
</div>
</body>