The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources.
The unauthorized release of information.
The unauthorized copying of software<|>Denying an end user access to his or her own hardware, software, data, or network resources.
Using or conspiring to use computer or network resources to obtain information or tangible property illegally