e or contains false source-identifying information, spoofing or phishing Breaches or circumvents security or authentication controls, or attempts to do so Disrupts or interferes with Inbox functions, networks, websites or content, including overloading, viruses, planting malware or other system or network damaging activity May be considered threatening, abusive or hateful or promoting such behavio