Which of the following Statements about Legal Compliance Is True

    0
    29

    Unauthorized attempts to upload information and/or alter information to any portion of this website are strictly prohibited and liable to prosecution under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act of 1996 (see 18 U.S.C. §§ 1001 and 1030). Note that this policy may change as the SEC maintains SEC.gov to ensure that the site works efficiently and remains available to all users. By using this website, you consent to security monitoring and auditing. For security reasons and to ensure that the public service remains accessible to users, this government computer system uses network traffic monitoring programs to identify unauthorized attempts, upload or modify information, or otherwise cause damage, including attempts to deny service to users. For more information, see the SEC`s website privacy and security policy. Thank you for your interest in the U.S. Securities and Exchange Commission. Please report your traffic by updating your user agent to include company-specific information. If a user or application sends more than 10 requests per second, other requests from the IP address may be restricted for a short period of time.

    Once the request rate drops below the threshold for 10 minutes, the user can continue to access the content on SEC.gov. This SEC practice is designed to limit excessive automated searches to SEC.gov and is not intended or should not affect individuals who visit the SEC.gov site.