incorporates applications which consist of viruses, worms and/or Trojan horses or any other Laptop or computer code, information or packages designed to interrupt, ruin or limit the features of any Laptop or computer software program or hardware or telecommunications;Furthermore, it's essential to consist of copies of any paperwork that has been su