Picture this scenario:  you run a private residential facility for abused children.  Late one night, one of your computers is used to access pornographic web-sites and other inappropriate material in violation of several well-publicized workplace policies.  After further investigation, you learn that the inappropriate computer usage occurred on several occasions, but was limited to that