ss of your motives or intent; (c) attempting to interfere with or disrupt the services to any user, processor, host or network, including, without limitation, by submitting a virus, worm or Trojan horse; or (d) sending unsolicited e-mail or other information, including promotions or advertising.