| http://www.w3.org/ns/prov#value | - e proper function of any software, hardware, or telecommunications equipment or to damage or obtain unauthorized access to any system, data, password or other information of Company or any third party; orimpersonates any person or entity, including any employee or representative of Company
|