Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan, or test the vulnerability of a system or network, relay communication through a resource, or to breach security or authentication measures without express authorization of the owner of the system or network.</li> <li> Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner or network.</li> <li> Interference with service to any user, host, or network, including but not limited to: mail bombing, flooding, or denial of service attacks.</li> <li>