Lawyer: One is justified in accessing information in computer files without securing authorization from the computer's owner only if the computer is typically used in the operation of a business. ███ ██ █████████ █████ █████ ██████████ ███████ ███ █████████ ████ ████ █ ████████ ████████ ████ ██████ ██ ████████ ██ █ █████ ██████████ ███████ ███ ██████████ ██████ ████ █████████ ███ ████ ██ █████ ████████ █████ ███████ ███ ███████ █████████████ ██ ██████████
The first principle tells us a necessary condition (”only if”) for being justified in accessing computer info without authorization from the computer’s owner. Here’s one way to express that principle:
If computer NOT typically used in operation of a business → NOT justified in accessing info without authorization from owner
Here’s the second principle:
If typically used in operation of a business AND it’s reasonable to believe that the computer has info that can be evidence in a legal proceeding against the owner → accessing computer info without authorization is JUSTIFIED
The first principle tells us what allows us to conclude that accessing info is NOT JUSTIFIED.
The second principle tells us what allows us to conclude that accessing info IS JUSTIFIED.
The correct answer can use either principle. If using the first, the conclusion will say that access is NOT JUSTIFIED, and the evidence will establish that the computer is not typically used in the operation of a business.
If using the second principle, the conclusion will say that access IS JUSTIFIED, and the evidence will establish that the computer is typically used to operate a business, and there’s reasonable grounds to think there’s stuff on the computer that can be used as evidence in a legal proceeding.
The principles stated by the ██████ ████ ████████ ███████ █████ ███ ██ ███ █████████ ██████████
Rey gave his ██████ █████ █ ███ ██ ███ █████ █████ ██ ██████ ███ █████ ███ ██ ███ ███ █████ ███████ ████████ ██ ████ ██ █████ ██████ █████ █████ ███████ █████ ███ ████ ██ ███ █████████ ███████ █████ ███ █████ ███████████ ███ ██████ ███ ██████████
Police department investigators ████████ ███ ██████████ ██████████ █████ ██ ███ ███████ ████████ █████ ██ █ ██████████ ████ ████ ███ ██ █████ ███ ██████████ ████████ █████████ ███████ ███████ ██████████ ████ ███ ██████ ███████ ████████ ██ ███ ██████████████ ██████████ ████████ ████████ ███ █████ ██████████ ████████ ██ ████████ ██ ███████████ █████████████ ███ ██████████████ ██████ ███ ██████████
A police officer █████████ ███████ █████████ ███████████ █████ ██ ███ ████████ ████ ███████ █████ ███ ████ ███████████ ██ ███ █████████ ██ ███ █████ █████████ █████ ███ ██████ █████████ ██████ ██ ███ █████ ██ █████████ ████████ ████████ ██ ████████ ██████ ██ ███ █████ ██████████ ███████ ████████ ███ ██████ █████████ ██████ ███ ███████ ███ ██████████
Customs officials examined ███ ██ ███ █████ ██████ ██ █ ██████ ████████ ███████████ ████ ██ ████████ ████ ████ █████████ ██ ██████████ ███████ █████ ████ ██████████ ███████ ███ █████████ ████ ███ ████████ ███ █████████ ████ ████ ██ ███ █████████ ██ ███ ██████████ ██████████ █████████ ███ ███████ ██████████ ██████ ███ ██████████
Against the company ███████ ███████ █ ██████ ███████ ████████ ████ ██ ███ █████ ██ ███ ██ ███ █████████ ██████████ ████████ ███ ████████ ███ █████████ ████ ██ ███ █████████ ██ ███ █████████ █████████ ███ ██████████ █████ ████████ ██ ███ ██████ ███████ ████ ████████ ███████ ███████ ██ ███ ██ ███ █████████ ██████████ █████ ███ ██████ █████████ ████████████ ███ ██ ███ ████████ ███ ███ ██████████