<ol> <li>accessing data not intended for you or logging into a server or account that you are not authorized to access;</li> <li>attempting to probe, scan, or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization;</li> <li>