(xii) access or use (or attempt to access or use) another user’s content without permission. (xiii) transmit any software or other materials that contain any viruses, worms, trojan horses, defects, date bombs, time bombs, or any other computer code, files, or programs designed to interrupt, destroy, or limit the functionality of any computer software or hardware or telecommunications equipment.