contains software viruses, worms, time bombs, corrupted files, Trojan horses or any other computer code, files, or programs that are designed or intended to disrupt, damage, overburden, impair or limit the functioning of any software, hardware, network, server or communications systems or equipment;</li> <li>