www.webvpn.raytheon.com Open in urlscan Pro
199.46.216.43  Public Scan

Submitted URL: https://www.webvpn.raytheon.com/static/redbox/
Effective URL: https://www.webvpn.raytheon.com/dana-na/auth/url_default/welcome.cgi
Submission: On May 18 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

Name: frmLoginPOST welcome.cgi

<form id="frmLogin_17" name="frmLogin" action="welcome.cgi" method="POST" autocomplete="off">
  <input id="xsauth_token" type="hidden" name="xsauth_token" value="">
  <table id="table_SigninNotifPreAuth_3" align="center" width="80%">
    <tbody>
      <tr>
        <td class="cssPageTitle"><b>Pre Sign-In Notification</b> </td>
      </tr>
      <tr>
        <td>
          <textarea id="sn-preauth-text_2" class="cssNiceTextArea" name="sn-preauth-text" rows="25" cols="110" readonly="" style="overflow:'auto'">* * * * WARNING * * * *

Consent to Monitor Company Provided Resources &amp; Systems

Raytheon Company's Information systems, networks, mobile devices and other assets ("Company assets") are only for authorized use by authorized users for Company business purposes and limited personal use as permitted by Company Policy RP-IT-009

Access to Company assets for any other use is not authorized.  Use of Company assets constitutes acknowledgement and consent to monitoring, recording, or blocking - by the Company or Company-authorized third parties - of any such use by you with or without further notice, for any lawful purpose.  Such monitoring, recording, and blocking includes your perosnal communications and information (including communications via a personal, non-Raytheon email or social-media account accessed through a Company asset).  Company assets, including encrypted data on them, are actively monitored for lawful purposes.

"Monitoring" includes interception or review of electronic communications and other information while in transmission or stored.  Persons using Company assets have no reasonable expectation of privacy or confidentiality in any such electronic communications or other information or other use of Company assets.  Your communications, information, and releated data collected through monitoring may be used and disclosed to third parties, including governmental entities, for any lawful purpose, including criminal or security investigations, information security, or adverse personnel action including termination.

* * * * WARNING * * * *
</textarea>
        </td>
      </tr>
      <tr>
        <td>&nbsp;</td>
      </tr>
      <tr>
        <td>
          <input id="sn-preauth-proceed_2" type="submit" name="sn-preauth-proceed" value="Proceed"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <input id="sn-preauth-decline_2" type="submit" name="sn-preauth-decline" value="Decline">
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

 



> Pre Sign-In Notification * * * * WARNING * * * * Consent to Monitor Company
> Provided Resources & Systems Raytheon Company's Information systems, networks,
> mobile devices and other assets ("Company assets") are only for authorized use
> by authorized users for Company business purposes and limited personal use as
> permitted by Company Policy RP-IT-009 Access to Company assets for any other
> use is not authorized. Use of Company assets constitutes acknowledgement and
> consent to monitoring, recording, or blocking - by the Company or
> Company-authorized third parties - of any such use by you with or without
> further notice, for any lawful purpose. Such monitoring, recording, and
> blocking includes your perosnal communications and information (including
> communications via a personal, non-Raytheon email or social-media account
> accessed through a Company asset). Company assets, including encrypted data on
> them, are actively monitored for lawful purposes. "Monitoring" includes
> interception or review of electronic communications and other information
> while in transmission or stored. Persons using Company assets have no
> reasonable expectation of privacy or confidentiality in any such electronic
> communications or other information or other use of Company assets. Your
> communications, information, and releated data collected through monitoring
> may be used and disclosed to third parties, including governmental entities,
> for any lawful purpose, including criminal or security investigations,
> information security, or adverse personnel action including termination. * * *
> * WARNING * * * *