Lawyer: One is justified in accessing information in computer files
without securing authorization from the computer’s owner only if the computer is
typically used in the operation of a business. If, in addition, there exist
reasonable grounds for believing that such a computer contains
data usable as evidence in a legal proceeding against the computer’s owner, then
accessing the data in those computer files
without the owner’s authorization is justified.
The principles stated by the lawyer most strongly support which one of the following judgments?
(A) Rey gave his friend Sunok a key to the store where he worked and asked her to use the store owners’ computer to look up their friend Jim’s phone number, which Rey kept on the computer.
Because Sunok had Rey’s permission, her action was justified. - WRONG. Permission was there.
(B) Police department investigators
accessed the electronic accounting files of the central computer owned by a consulting firm
that was on trial for fraudulent business practices without seeking permission from the firm’s owners. Contrary to the investigators’ reasonable beliefs, however, the files ultimately provided no evidence of wrongdoing. Nevertheless, the i
nvestigators’ action was justified. - CORRECT. What happens after accessing suspected data which didn't result in leagal proceedings is not a concern since suspicion is still reasonable prior to investigation.
(C) A police officer accessed,
without Natalie’s permission, files on the computer that Natalie owned and used exclusively in the
operation of her small business. Since the police officer’s search of the files on Natalie’s computer produced
no evidence usable in any legal proceeding against Natalie, the police officer’s
action was clearly not justified. - WRONG. The scenario where action is not justified with evidence not enough for legal proceedings is not covered in the passage, thus cannot be supported.
(D) Customs officials examined all of the files stored on a laptop
computer confiscated from an importer whom they
suspected of smuggling. Because there were reasonable grounds for believing that the computer had typically been used in the operation of the
importer’s legitimate business, the customs officials’
action was justified. - WRONG. Slight language and its correct or wrong. Confiscation means the owner knew and thus authorization was there. But the scenario here is way different than what we have in passage.
(E)
Against the company owner’s wishes, a police officer accessed some of the files on one of the company’s computers. Although the computer was typically
used in the operation of the company’s business, the particular files accessed by the police officer were
personal letters written by one of the company’s employees. Thus, the police officer’s
unauthorized use of the computer was not justified. - WRONG. Like C here too a different situation is being dealt.
Got it wrong for it length that played with my patience.

The crux of the passage is -
1. No authorization is required for accessing the computer used typically in business. The action is justified.
2. If suspicion exists then data that is perceived reasonable for leagal action can be accessed without authorization. The action is justified.
Answer B.