Personal computer plans, in which the circumvention is carried out on the lawfully obtained system or device on which the computer plan operates entirely for the objective of fantastic-faith security analysis and would not violate any applicable legislation,Computer system systems that empower voice assistant equipment to execute lawfully obtained