Intentionally or negligently transmitting files containing a computer virus or corrupted data.</li> <li>Accessing another network without permission, including to probe or scan for vulnerabilities or breach security or authentication measures.</li> <li>Unauthorized scanning or monitoring of data on any network or system without proper authorization of the owner of the system or network.</li> </ul>