(g) facilitate ,any viruses, Trojan horses, worms, or other computer programming routines that ,may damage, detrimentally interfere with, surreptitiously intercept, or expropriate ,any system, data, or information. (h) constitute use of any robot, spider, other ,automatic device, or manual process to monitor or copy the Service or the portion ,of the Site through which the Service is offered without our prior written permission.