place into the computing resources or information any program which (i) replicates , transmits , or activates itself without control of a person operating computing equipment on which it resides , (ii) alters , damages , or erases any data or computer programs without control of a person operating the computing equipment on which it resides , (iii) contains any software routines or components designed to permit unauthorized access or to circumvent company's security restrictions or (iv) contains any features that were not specifically designed to allow unauthorized access , but which would still allow such unauthorized access