- Using the Kazaa software to transmit and download spoofed or corrupted files.
- Violating state and federal personal privacy laws and the rights of individual computer users by hacking and exploring files located on their computers.
- Using the Kazaa Software's instant messenger functionality to send threatening messages to other users of Kazaa software.
Source: Press release













