attempts to introduce viruses or any other computer code, files or programs that interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment. </li> <li> attempts to gain unauthorized access to our computer network or user accounts. </li> <li>