(e) In which the person is providing information technology services and has control over, or access to, information technology systems that would allow the person to harm the information technology systems or the information contained in the systems; (f) In which the person has access to personal information about employees or members of the public including Social Security numbers, dates of birt