includes applications which incorporate viruses, worms and/or Trojan horses or another computer code, documents or programs built to interrupt, ruin or Restrict the performance of any computer software or components or telecommunications;Our customer, a schoolteacher without prior criminal record, was pulled above for just a insignificant traffic v