8. Installing unauthorized equipment that is attached to the Parker Information Technology Network, including but not limited to network components, computers, printers, fax machines, access points, monitoring systems, etc. “Attached” means any logical connection to the Parker Information Technology Network using any networking to telecommunication protocols.