Gaining unauthorized access to the Services or data stored within the Services (or attempting to). </p> </li> <li> <p>Sending or storing material on our Services containing software viruses, bots, scripting exploits worms, trojan horses or other harmful computer code. </p> </li> <li> <p>