•Theft, misuse, or misappropriation of assets by altering computer-readable records and files
•Theft, misuse, or misappropriation of assets by altering logic of computer software
•Theft or illegal use of computer-readable information
•Theft, corruption, illegal copying or intentional destruction of software
•Theft, misuse, or misappropriation of computer hardware