. . . "Users must not misuse, damage, or misappropriate in any manner computing equipment, property, or other facilities and resources." . . . .