of data or traffic on any network or system without express authorisation of the owner of such system or network;not to misrepresent the identity of a person responsible for an e-mail or other electronic message (e.g. by using another's e-mail account without permission, by so-called IP spoofing, or by modifying another's messages without permission);not to violate any law, regulation or tariff th