These violations include, without limitation: <ol> <li> Accessing data not intended for such User or logging into a server or account, which such User is not authorized to access. </li> <li> Attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization. </li> <li>