(e) access, tamper with or use non-public areas of the Company Properties, the Company’s computer systems, or the technical delivery systems of the Company’s providers. (f) attempt to probe, scan, or test the vulnerability of any Company system or network, or breach any security or authentication measures.