Last visit was: 22 Apr 2026, 13:46 It is currently 22 Apr 2026, 13:46
Close
GMAT Club Daily Prep
Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History
Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.
Close
Request Expert Reply
Confirm Cancel
User avatar
Hovkial
Joined: 23 Apr 2019
Last visit: 24 Nov 2022
Posts: 802
Own Kudos:
2,599
 [9]
Given Kudos: 202
Status:PhD trained. Education research, management.
Posts: 802
Kudos: 2,599
 [9]
Kudos
Add Kudos
9
Bookmarks
Bookmark this Post
Most Helpful Reply
User avatar
dips1122
Joined: 12 Oct 2019
Last visit: 24 Feb 2022
Posts: 72
Own Kudos:
49
 [5]
Given Kudos: 92
Location: India
Concentration: Marketing, General Management
GMAT 1: 720 Q48 V41
GMAT 2: 730 Q50 V39
GMAT 3: 760 Q50 V44
GPA: 4
WE:Information Technology (Computer Software)
Products:
5
Kudos
Add Kudos
Bookmarks
Bookmark this Post
General Discussion
User avatar
sampriya
User avatar
ISB School Moderator
Joined: 23 Nov 2018
Last visit: 25 Nov 2022
Posts: 297
Own Kudos:
Given Kudos: 358
Location: India
GMAT 1: 710 Q48 V39
GPA: 2.88
Products:
Kudos
Add Kudos
Bookmarks
Bookmark this Post
User avatar
Skywalker18
User avatar
Retired Moderator
Joined: 08 Dec 2013
Last visit: 15 Nov 2023
Posts: 1,973
Own Kudos:
10,161
 [2]
Given Kudos: 171
Status:Greatness begins beyond your comfort zone
Location: India
Concentration: General Management, Strategy
GPA: 3.2
WE:Information Technology (Consulting)
Products:
Posts: 1,973
Kudos: 10,161
 [2]
2
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Lawyer: One is justified in accessing information in computer files without securing authorization from the computer’s owner only if the computer is typically used in the operation of a business. If, in addition, there exist reasonable grounds for believing that such a computer contains data usable as evidence in a legal proceeding against the computer’s owner, then accessing the data in those computer files without the owner’s authorization is justified.

The principles stated by the lawyer most strongly support which one of the following judgments?

Two principles are listed by the lawyer-
1. One is justified in accessing information in computer files without securing authorization from the computer’s owner ONLY IF the computer is typically used in the operation of a business.
2. If a computer is typically used in the operation of a business and there exist reasonable grounds for believing that the computer contains data usable as evidence in a legal proceeding against the owner, then accessing the data within the computer without the owner's authorization is justified.

(A) Rey gave his friend Sunok a key to the store where he worked and asked her to use the store owners’ computer to look up their friend Jim’s phone number, which Rey kept on the computer. Because Sunok had Rey’s permission, her action was justified.- incorrect, since the access to the computer was provided by the owner

(B) Police department investigators accessed the electronic accounting files of the central computer owned by a consulting firm that was on trial for fraudulent business practices without seeking permission from the firm’s owners. Contrary to the investigators’ reasonable beliefs, however, the files ultimately provided no evidence of wrongdoing. Nevertheless, the investigators’ action was justified.- Correct; There were reasonable beliefs the computer would contain usable data as evidence in a legal proceeding against the owner and the computer was used in the operation of a business. So, the accessing that information was justified.

(C) A police officer accessed, without Natalie’s permission, files on the computer that Natalie owned and used exclusively in the operation of her small business. Since the police officer’s search of the files on Natalie’s computer produced no evidence usable in any legal proceeding against Natalie, the police officer’s action was clearly not justified.- incorrect; we have no idea whether the police officer had a reasonable suspicion that the computer would contain usable data as evidence against the computer's owner.

(D) Customs officials examined all of the files stored on a laptop computer confiscated from an importer whom they suspected of smuggling. Because there were reasonable grounds for believing that the computer had typically been used in the operation of the importer’s legitimate business, the customs officials’ action was justified.- incorrect, since the computer was confiscated, the user must be aware. Also, the computer was used in the operation of the business.

(E) Against the company owner’s wishes, a police officer accessed some of the files on one of the company’s computers. Although the computer was typically used in the operation of the company’s business, the particular files accessed by the police officer were personal letters written by one of the company’s employees. Thus, the police officer’s unauthorized use of the computer was not justified.- incorrect, the police officer accessed personal letters of the owner. Also, we do not know whether it was reasonable for the police officer to think the letters were likely to provide information usable against the owner in court

Answer B
avatar
RITESH24
Joined: 15 Jun 2019
Last visit: 24 Jan 2025
Posts: 25
Own Kudos:
20
 [1]
Given Kudos: 56
Location: India
Schools:
GMAT 1: 530 Q44 V19
Schools:
GMAT 1: 530 Q44 V19
Posts: 25
Kudos: 20
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Easy way to eliminate D is a subtle hint CONFISCATE which means to lay claim or take possession of things / objects/ property as if police suspecting thief and criminal belongings taken by them which is whole different scenario ... we here are only concerned with the principle where accessing file in normal state of business without owner's authority...
whereas confiscating is almost always associated with legal matters and confiscating something is inevitably a right of authority IN SUMMARY - it will be a whole different scenario .
i hope it was useful. :)
User avatar
bidskamikaze
Joined: 07 Jan 2018
Last visit: 29 Oct 2022
Posts: 251
Own Kudos:
Given Kudos: 160
Location: India
GMAT 1: 710 Q49 V38
GMAT 1: 710 Q49 V38
Posts: 251
Kudos: 307
Kudos
Add Kudos
Bookmarks
Bookmark this Post
For those confused between B and D:

(D) Customs officials examined all of the files stored on a laptop computer confiscated from an importer whom they suspected of smuggling. Because there were reasonable grounds for believing that the computer had typically been used in the operation of the importer’s LEGITIMATE business, the customs officials’ action was justified.

This one word makes option D incorrect, as it destroys this option's logic.

Had it been ILLEGITIMATE, this option could have been correct.
User avatar
RohitSaluja
Joined: 02 Aug 2020
Last visit: 21 Sep 2024
Posts: 199
Own Kudos:
Given Kudos: 254
Location: India
Concentration: General Management, Healthcare
Schools: HEC'22 (J)
GMAT 1: 720 Q49 V40
GPA: 3.8
WE:Consulting (Healthcare/Pharmaceuticals)
Products:
Schools: HEC'22 (J)
GMAT 1: 720 Q49 V40
Posts: 199
Kudos: 94
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Hovkial
Lawyer: One is justified in accessing information in computer files without securing authorization from the computer’s owner only if the computer is typically used in the operation of a business. If, in addition, there exist reasonable grounds for believing that such a computer contains data usable as evidence in a legal proceeding against the computer’s owner, then accessing the data in those computer files without the owner’s authorization is justified.

The principles stated by the lawyer most strongly support which one of the following judgments?

(A) Rey gave his friend Sunok a key to the store where he worked and asked her to use the store owners’ computer to look up their friend Jim’s phone number, which Rey kept on the computer. Because Sunok had Rey’s permission, her action was justified.

(B) Police department investigators accessed the electronic accounting files of the central computer owned by a consulting firm that was on trial for fraudulent business practices without seeking permission from the firm’s owners. Contrary to the investigators’ reasonable beliefs, however, the files ultimately provided no evidence of wrongdoing. Nevertheless, the investigators’ action was justified.

(C) A police officer accessed, without Natalie’s permission, files on the computer that Natalie owned and used exclusively in the operation of her small business. Since the police officer’s search of the files on Natalie’s computer produced no evidence usable in any legal proceeding against Natalie, the police officer’s action was clearly not justified.

(D) Customs officials examined all of the files stored on a laptop computer confiscated from an importer whom they suspected of smuggling. Because there were reasonable grounds for believing that the computer had typically been used in the operation of the importer’s legitimate business, the customs officials’ action was justified.

(E) Against the company owner’s wishes, a police officer accessed some of the files on one of the company’s computers. Although the computer was typically used in the operation of the company’s business, the particular files accessed by the police officer were personal letters written by one of the company’s employees. Thus, the police officer’s unauthorized use of the computer was not justified.

Hi AndrewN and VeritasKarishma can you please help me on why D is wrong? I was stuck between B and D and couldn't eliminate either of them confidently.
avatar
AndrewN
avatar
Volunteer Expert
Joined: 16 May 2019
Last visit: 29 Mar 2025
Posts: 3,490
Own Kudos:
7,661
 [1]
Given Kudos: 500
Expert
Expert reply
Posts: 3,490
Kudos: 7,661
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
RohitSaluja
Hi AndrewN and VeritasKarishma can you please help me on why D is wrong? I was stuck between B and D and couldn't eliminate either of them confidently.
Hello, RohitSaluja. I may not be able to comb through CR questions as efficiently as Karishma, but I typically arrive at the correct conclusion, and that proved to be the case here. I will use the color-coded image below to discuss the question in full.

Attachment:
Screen Shot 2021-11-10 at 09.44.43.png
Screen Shot 2021-11-10 at 09.44.43.png [ 159.22 KiB | Viewed 4830 times ]
Notice, first, that the passage outlines two ways in which one is justified in accessing information in computer files without securing authorization from the computer's owner:

  • only if the computer is typically used in the operation of a business
  • only if reasonable grounds exist for believing that information found in this manner may be usable as evidence in a legal proceeding against the computer's owner

With these criteria in mind, we can assess the answer choices.

Answer choice (A) fails because permission was granted for someone to access a business computer for personal use, looking up the phone number of a friend, and that situation is not covered in the conditions above.

Answer choice (B) works because all conditions are met: the computer was used for business purposes, there is a trial to hold the business owners accountable for fraudulent business practices, and the investigators have reasonable beliefs for having accessed the computer files. In short, there is nothing to find fault with in this option.

Answer choice (C) fails because the criterion for establishing that the police officer was not justified in accessing computer files is that no evidence usable in any legal proceeding was found, and the outcome of the search for evidence has no relation to the conditions in the passage.

Answer choice (D) fails because the one missing piece is the legal proceeding, not to mention that it is difficult to reconcile smuggling and legitimate business. Did the customs officials seize the wrong computer? Do they intend to prosecute the importer? There are a few pieces missing from the picture, enough for us to disfavor this option and get behind the safer one in (B).

Answer choice (E) fails because, according to the conditions of the passage, the police officer should be justified in combing through the computer files. The nature of the particular files accessed goes beyond the scope of the passage.

I hope that helps you appreciate why (B) is a better, safer answer than (D). I tend to spend longer on these nuanced LSAT questions to ensure that the logical connection is airtight. But I would rather get an answer correct in such a manner than chase an incorrect one in a shorter time and then wonder why I had missed the question.

Thank you for thinking to ask me.

- Andrew
User avatar
KarishmaB
Joined: 16 Oct 2010
Last visit: 21 Apr 2026
Posts: 16,439
Own Kudos:
79,386
 [4]
Given Kudos: 484
Location: Pune, India
Expert
Expert reply
Active GMAT Club Expert! Tag them with @ followed by their username for a faster response.
Posts: 16,439
Kudos: 79,386
 [4]
4
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Hovkial
Lawyer: One is justified in accessing information in computer files without securing authorization from the computer’s owner only if the computer is typically used in the operation of a business. If, in addition, there exist reasonable grounds for believing that such a computer contains data usable as evidence in a legal proceeding against the computer’s owner, then accessing the data in those computer files without the owner’s authorization is justified.

The principles stated by the lawyer most strongly support which one of the following judgments?

(A) Rey gave his friend Sunok a key to the store where he worked and asked her to use the store owners’ computer to look up their friend Jim’s phone number, which Rey kept on the computer. Because Sunok had Rey’s permission, her action was justified.

(B) Police department investigators accessed the electronic accounting files of the central computer owned by a consulting firm that was on trial for fraudulent business practices without seeking permission from the firm’s owners. Contrary to the investigators’ reasonable beliefs, however, the files ultimately provided no evidence of wrongdoing. Nevertheless, the investigators’ action was justified.

(C) A police officer accessed, without Natalie’s permission, files on the computer that Natalie owned and used exclusively in the operation of her small business. Since the police officer’s search of the files on Natalie’s computer produced no evidence usable in any legal proceeding against Natalie, the police officer’s action was clearly not justified.

(D) Customs officials examined all of the files stored on a laptop computer confiscated from an importer whom they suspected of smuggling. Because there were reasonable grounds for believing that the computer had typically been used in the operation of the importer’s legitimate business, the customs officials’ action was justified.

(E) Against the company owner’s wishes, a police officer accessed some of the files on one of the company’s computers. Although the computer was typically used in the operation of the company’s business, the particular files accessed by the police officer were personal letters written by one of the company’s employees. Thus, the police officer’s unauthorized use of the computer was not justified.

Accessing info from a computer without authorisation of owner is justified:
1. Only if the computer is typically used in the operation of a business
2. There exist reasonable grounds for believing that such a computer contains data usable as evidence in a legal proceeding against the computer’s owner

So to access without authorisation, it is NECESSARY that the computer should be typically used in the operation of business and there should be reasonable grounds to believe that the computer could provide evidence in legal proceedings against the owner.

This principle is applied effectively is which of the following cases?

(A) Rey gave his friend Sunok a key to the store where he worked and asked her to use the store owners’ computer to look up their friend Jim’s phone number, which Rey kept on the computer. Because Sunok had Rey’s permission, her action was justified.

Irrelevant. This is related to personal data retrieval and has nothing to do with evidence in a legal proceeding.

(B) Police department investigators accessed the electronic accounting files of the central computer owned by a consulting firm that was on trial for fraudulent business practices without seeking permission from the firm’s owners. Contrary to the investigators’ reasonable beliefs, however, the files ultimately provided no evidence of wrongdoing. Nevertheless, the investigators’ action was justified.

The Police accessed the central computer of a consulting firm. So we know that the computer was used for business. Also, the firm was on trial for fraudulent business and the Police had reasonable belief that the files would provide evidence of fraud. Hence, accessing the computer was justified as per our principle.
Finally, whether the files did provide evidence or not is irrelevant. The point is that our principle was correctly used in this situation.

(C) A police officer accessed, without Natalie’s permission, files on the computer that Natalie owned and used exclusively in the operation of her small business. Since the police officer’s search of the files on Natalie’s computer produced no evidence usable in any legal proceeding against Natalie, the police officer’s action was clearly not justified.

We know that if the computer is mostly for personal use, then unauthorised access is not ok. But a computer used for business could be accessed in certain cases such as when there is reasonable grounds to believe that it will provide evidence in a legal proceeding against the owner. Whether the police actually found evidence or not does not say whether the action of accessing the computer was justified or not.


(D) Customs officials examined all of the files stored on a laptop computer confiscated from an importer whom they suspected of smuggling. Because there were reasonable grounds for believing that the computer had typically been used in the operation of the importer’s legitimate business, the customs officials’ action was justified.

This is a problem: ... because there were reasonable grounds for believing that the computer had typically been used in the operation of the importer’s legitimate business... Reasonable grounds is not enough. It is necessary that the computer should have been used for business. The reasonable grounds should be present for the belief that it will provide evidence.
Hence this option is incorrect.


(E) Against the company owner’s wishes, a police officer accessed some of the files on one of the company’s computers. Although the computer was typically used in the operation of the company’s business, the particular files accessed by the police officer were personal letters written by one of the company’s employees. Thus, the police officer’s unauthorized use of the computer was not justified.

The computer was a company computer so the necessary condition is met. We don't know whether there were reasonable grounds to believe that the letters could provide evidence.
So we cannot say whether the access was justified or not.

Answer (B)
User avatar
unraveled
Joined: 07 Mar 2019
Last visit: 10 Apr 2025
Posts: 2,706
Own Kudos:
Given Kudos: 763
Location: India
WE:Sales (Energy)
Posts: 2,706
Kudos: 2,329
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Lawyer: One is justified in accessing information in computer files without securing authorization from the computer’s owner only if the computer is typically used in the operation of a business. If, in addition, there exist reasonable grounds for believing that such a computer contains data usable as evidence in a legal proceeding against the computer’s owner, then accessing the data in those computer files without the owner’s authorization is justified.

The principles stated by the lawyer most strongly support which one of the following judgments?

(A) Rey gave his friend Sunok a key to the store where he worked and asked her to use the store owners’ computer to look up their friend Jim’s phone number, which Rey kept on the computer. Because Sunok had Rey’s permission, her action was justified. - WRONG. Permission was there. 

(B) Police department investigators accessed the electronic accounting files of the central computer owned by a consulting firm that was on trial for fraudulent business practices without seeking permission from the firm’s owners. Contrary to the investigators’ reasonable beliefs, however, the files ultimately provided no evidence of wrongdoing. Nevertheless, the investigators’ action was justified. - CORRECT. What happens after accessing suspected data which didn't result in leagal proceedings is not a concern since suspicion is still reasonable prior to investigation. 

(C) A police officer accessed, without Natalie’s permission, files on the computer that Natalie owned and used exclusively in the operation of her small business. Since the police officer’s search of the files on Natalie’s computer produced no evidence usable in any legal proceeding against Natalie, the police officer’s action was clearly not justified. - WRONG. The scenario where action is not justified with evidence not enough for legal proceedings is not covered in the passage, thus cannot be supported.

(D) Customs officials examined all of the files stored on a laptop computer confiscated from an importer whom they suspected of smuggling. Because there were reasonable grounds for believing that the computer had typically been used in the operation of the importer’s legitimate business, the customs officials’ action was justified. - WRONG. Slight language and its correct or wrong. Confiscation means the owner knew and thus authorization was there. But the scenario here is way different than what we have in passage. 

(E) Against the company owner’s wishes, a police officer accessed some of the files on one of the company’s computers. Although the computer was typically used in the operation of the company’s business, the particular files accessed by the police officer were personal letters written by one of the company’s employees. Thus, the police officer’s unauthorized use of the computer was not justified. - WRONG. Like C here too a different situation is being dealt. 

Got it wrong for it length that played with my patience.  :roll:
The crux of the passage is -
1. No authorization is required for accessing the computer used typically in business. The action is justified.
2. If suspicion exists then data that is perceived reasonable for leagal action can be accessed without authorization. The action is justified.

Answer B.
User avatar
Raman109
Joined: 17 Aug 2009
Last visit: 28 Jul 2025
Posts: 706
Own Kudos:
Given Kudos: 33
Posts: 706
Kudos: 212
Kudos
Add Kudos
Bookmarks
Bookmark this Post
­Lawyer: One is justified in accessing information in computer files without securing authorization from the computer’s owner only if the computer is typically used in the operation of a business. If, in addition, there exist reasonable grounds for believing that such a computer contains data usable as evidence in a legal proceeding against the computer’s owner, then accessing the data in those computer files without the owner’s authorization is justified.

Condition 1 - Used for business operations.
Condition 2 - reasonable legal evidence that the computer contains data usable as evidence against the computer owner. 

The principles stated by the lawyer most strongly support which one of the following judgments?

(A) Rey gave his friend Sunok a key to the store where he worked and asked her to use the store owners’ computer to look up their friend Jim’s phone number, which Rey kept on the computer. Because Sunok had Rey’s permission, her action was justified. - out of scope. 

(B) Police department investigators accessed the electronic accounting files of the central computer owned by a consulting firm that was on trial for fraudulent business practices without seeking permission from the firm’s owners. Contrary to the investigators’ reasonable beliefs, however, the files ultimately provided no evidence of wrongdoing. Nevertheless, the investigators’ action was justified. - ok. As it met both the conditions. 

(C) A police officer accessed, without Natalie’s permission, files on the computer that Natalie owned and used exclusively in the operation of her small business. Since the police officer’s search of the files on Natalie’s computer produced no evidence usable in any legal proceeding against Natalie, the police officer’s action was clearly not justified. - Didn't meet 2nd condition. 

(D) Customs officials examined all of the files stored on a laptop computer confiscated from an importer whom they suspected of smuggling. Because there were reasonable grounds for believing that the computer had typically been used in the operation of the importer’s legitimate business, the customs officials’ action was justified. - Distortion. We need reasonable legal evidence that the computer contains data usable as evidence against the computer owner AND not to find out that it was used for operations. 

(E) Against the company owner’s wishes, a police officer accessed some of the files on one of the company’s computers. Although the computer was typically used in the operation of the company’s business, the particular files accessed by the police officer were personal letters written by one of the company’s employees. Thus, the police officer’s unauthorized use of the computer was not justified. - out of scope.­ Our scope is limited to finding the argument that meets both conditions; if it meets both conditions, the access is justified.­
Moderators:
GMAT Club Verbal Expert
7391 posts
499 posts
358 posts