An account holder or their authorized users may not attempt to gain unauthorized or illegal access to, or attempt to interfere with or compromise the normal operations or security of any network, application, or system, including the data and/or information maintained on that entity.