"This rule ensures that outsiders cannot use the resources such as storage space and bandwidth unless they are communicating with an authorized user." . . . . .