. . . "Not destroy or damage data, networks, or other resources that do not belong to them, without clear permission of the owner." .