For example: accepting or offering money or material things and benefits to obtain an unlawful advantage, such as accepting or giving gifts, invitations to events, or other benefits, as well as risks and breaches of appropriate IT security standards, such as the unauthorised circumvention of firewalls or the betrayal of trade secrets.