(3) Transmitting spam, chain letters, or any other unsolicited emails;</p> <p>(4) Engaging in attempts to interfere with, compromise the integrity or security of the system, or decrypt any transmissions to or from the servers operating the Service;</p> <p>