| (a) | - | accesses or secures access to the Central Identities Data Repository; |
| (b) | - | downloads, copies or extracts any data from the Central Identities Data Repository or stored in any removable storage medium; |
| (c) | - | introduces or causes to be introduced any virus or other computer contaminant in the Central Identities Data Repository; |
| (d) | - | damages or causes to be damaged the data in the Central Identities Data Repository; |
| (e) | - | disrupts or causes disruption of the access to .... To read the full section download the app from Google Play store
|