Please Log In

Enter your akims login information below

Forgot your password?

This Aker Solutions computer system, including all related equipment, networks, and network devices (specifically including Internet access) is provided only for use as authorised by Aker Solutions. Aker Solutions computer systems may be monitored for all lawful purposes, including ensuring that their use is authorised, for management of the system, to facilitate protection against unauthorised access, and to verify security procedures, survivability and operational security. Monitoring may include active attacks by entities authorised by Aker Solutions to test or verify the security of the system. During monitoring, information may be examined, recorded, copied and used for authorised purposes. All information, including personal information, placed or sent over this system may be monitored. Use of this Aker Solutions computer system, authorised or unauthorised, constitutes consent to the monitoring of this system. Unauthorised use may subject you to criminal prosecution. Evidence of unauthorised use collected during monitoring may be used for administrative, criminal or other adverse action. Use of this system constitutes consent to monitoring for these purposes.