. . . . . "(c) Disrupt, interfere with or gain unauthorized access to public funds or to information processing, communication or telecommunication systems, including the information contained in the systems, that are used or operated by a public body." .