(k) Introduce any viruses, Trojan horses, worms, logic bombs, or other material that is malicious or technologically harmful. </p> <p> (l) Attempt to gain unauthorized access to, interfere with, damage, or disrupt the Website, the server that stores the Website, or any server, computer, or database connected to the Website.