Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

E-commerce and Cyberlaw (p6); Summarize the case, and answer the question: Was Heckenkamp correct? Was his privacy breached? E-COMMERCE & CYBERLAW A University's Access to

E-commerce and Cyberlaw (p6); Summarize the case, and answer the question: Was Heckenkamp correct? Was his privacy breached?"

image text in transcribed

E-COMMERCE & CYBERLAW A University's Access to Your Computer Scott Kennedy, a computer system administrator for Qual- comm Corporation in San Diego, California, discovered that somebody had obtained unauthorized access (or "hacked into," in popular parlance) the company's computer net- work. Kennedy contacted the Federal Bureau of Investiga- tion (FBI). Working together, Kennedy and the FBI were able to trace the intrusion to a computer on the University of Wisconsin at Madison network. They contacted Jeffrey Savoy, the University of Wisconsin computer network inves- tigator, who found evidence that someone using a computer on the university network was in fact hacking into the Qual- comm system and that the user had gained unauthorized access to the university's system as well. Savoy traced the source of intrusion to a computer located in university housing, the room of Jerome Heckenkamp, a computer sci- ence graduate student at the university. Savoy knew that Heckenkamp had been terminated from his job at the uni- versity computer help desk two years earlier for similar unauthorized activity. While Heckenkamp was online and logged into the uni- versity's system, Savoy, along with detectives, went to Heck- enkamp's room. The door was ajar, and nobody was in the room. Savoy entered the room and disconnected the network cord that attached the computer to the network. In order to be sure that the computer he had disconnected from the net- work was the computer that had gained unauthorized access to the university server, Savoy wanted to run some commands on the computer. Detectives located Heckenkamp, explained the situation, and asked for Heckenkamp's password, which Heckenkamp voluntarily provided. Savoy then ran tests on the computer and copied the hard drive without a warrant. When Heckenkamp was charged with several federal computer crimes, he challenged the university's access to his account and Savoy's steps that night, including the copy of the hard drive, as a breach of his privacy. Was Heckenkamp correct? Was his privacy breached? [U.s. v. Heckenkamp, 482 F.3d 1142 (9th Cir. 2007)]

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Contract Law

Authors: Roger Halson

2nd Edition

1405858788, 978-1405858786

More Books

Students also viewed these Law questions