Sample Jury Instructions from the 9th Circuit Federal Court of Appeals. http://www3.ce9.uscourts.gov/jury-instructions/
5.6 Maliciously is a type of malicious activity that is typically done with the intent to damage, disrupt, or otherwise harm someone else's computer system and/or network. It can be done either directly or indirectly, and may involve activities such as hacking, malware, phishing, data theft, denial of service attacks, and more. Different types of 5.6 Maliciously include but are not limited to: hacking, malware, phishing, data theft, denial of service attacks, social engineering, ransomware, spoofing, botnets, and Trojan horses.
5.6 Maliciously is a type of malicious activity that is typically done with the intent to damage, disrupt, or otherwise harm someone else's computer system and/or network. It can be done either directly or indirectly, and may involve activities such as hacking, malware, phishing, data theft, denial of service attacks, and more. Different types of 5.6 Maliciously include but are not limited to: hacking, malware, phishing, data theft, denial of service attacks, social engineering, ransomware, spoofing, botnets, and Trojan horses.