y or authentication measures without proper authorization; transmitting material that contains viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines with the intent or effect of damaging, destroying, disrupting or otherwise impairing a computer???s functionality or the operation of the system; interfering with, intercepting or expropriating any sys