Prohibited activities include: </p> <b>Harmful Software. </b>Content, software, or any other technology that may damage, interfere with, surreptitiously intercept, or expropriate any computer system, program, or data, including any viruses, malware, spyware, adware, Trojan horses, worms, or time bombs. <b>Unauthorized Access.</b>