(iii) send or store material containing software viruses, worms, Trojan horses or other harmful computer code, files, scripts, agents, or programs. (iv) interfere with or disrupt the integrity or performance of the Product or the data contained therein. or (v) attempt to gain unauthorized access to the Product or its related systems or networks.</li>