...
Programs that harass other users or infiltrate computer systems should not be used. Employees are prohibited from intentionally seeking information on, obtain copies of or modify files or data belonging to others unless authorized.
...
Programs that harass other users or infiltrate computer systems should not be used. Employees are prohibited from intentionally seeking information on, obtain copies of or modify files or data belonging to others unless authorized.