Unless specifically authorized by IT
users of JARKEN group must not
acquire
possess
trade
or
use hardware
or
software tools
that could be employed to evaluate
or
compromise information security
Examples of such unauthorized tools
include those which defeat software copy-protection
discover confidential passwords
identify security vulnerabilities
discover system
or
network topologies
remove evidence of misuse
or
intercept data in transit