Storing or sending material that contains software viruses, worms, Trojans or other harmful computer code, files, scripts, agents or programs;</li> <li>The impairment, damage or disruption of the integrity or performance of the service;</li> <li>Attempting to gain unauthorized access to the service or its associated systems or networks;</li> <li>