5.1.8. damage, disable or impair the operation of, or gain or attempt to gain unauthorized access to, any Solution or to any property, Devices, software, services, networks or data connected to, or inter-operating with, such Solution, or to any content or data stored, accessed or delivered through such Solution, by any means, including by hacking, phishing, spoofing or seeking to circumvent or defeat any firewalls, password protection or other information security protections or controls of whatever nature;</p> <p>