(c) access or use (or attempt to access or use) another user’s account without permission, or solicit another user’s login information. (d) transmit any software or materials that contain any viruses, worms, trojan horses, defects, or other items of a destructive nature.