| http://www.w3.org/ns/prov#value | - gal information and activities, images, materials or descriptions; (j) send or store material or files containing software viruses, worms, or other harmful computer code, files, scripts or programs; (k) attempt unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication mea
|