brokerages, and large corporate entertainment and information sites, for several hours. The attack
is traced to one of the following perpetrators. Do you think different penalties are appropriate,
depending on which it is? Explain why. If you would impose different penalties, how would they
(a) A foreign terrorist who launched the attack to cause billions of dollars in damage to the U.S.
(b) An organization publicizing its opposition to commercialization of the Web and corporate
manipulation of consumers.
(c) A teenager using hacking tools he found on a website.
(d) A hacker group showing off to another hacker group about how many sites it could shut down
in one day.
6.27 The ECPA does not prohibit universities from reading student email on its computers, just as
it does not prohibit businesses from reading employee email on company computers. Find your
university’s policy about access to student computer accounts and email (on university computers)
by professors and university administrators.Describe the policy. Tell what parts you think are good
and what should change.
6.28 Find a decision made in a lawsuit by an employee who was fired because of photos or other material
the employer found on the employee’s social network pages. Summarize the case and the result.
Do you think the result was reasonable? Why?