Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.<br> </li> <li>Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.<br> </li> <li>