legal aspects of cybersecurity Taissa, Sophie, Natalie, Misty, and Jackie all share a house in downtown Dayton. During the great blizzard of 2023, all five co-habitants were snowed in and quickly ran out of food. Jackie tried to leave the house to get food, but quickly fell in the snow. Jackie’s roommates then murdered Jackie, and ate some of her remains to survive. Now the snow has melted, and the girls are worried about the police finding out what they did. Taissa wants to keep some evidence to blackmail her friends just in case things turn sour in the future. Whenever the girls discuss Jackie’s murder, Taissa surreptitiously records the discussions on her iPhone without anyone else knowing. Which of the following best describes Taissa’s actions? A. Taissa committed an unconstitutional act. B. Taissa violated the Wiretap Act C. Taissa violated the Electronic Communications Privacy Act D. Taissa’s actions recording her friends are legal in most states.

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter10: Planning For Contingencies
Section: Chapter Questions
Problem 1EDM
icon
Related questions
Question

legal aspects of cybersecurity

Taissa, Sophie, Natalie, Misty, and Jackie all share a house in downtown Dayton. During
the great blizzard of 2023, all five co-habitants were snowed in and quickly ran out of
food. Jackie tried to leave the house to get food, but quickly fell in the snow. Jackie’s
roommates then murdered Jackie, and ate some of her remains to survive. Now the snow
has melted, and the girls are worried about the police finding out what they did.

Taissa wants to keep some evidence to blackmail her friends just in case things turn
sour in the future. Whenever the girls discuss Jackie’s murder, Taissa surreptitiously
records the discussions on her iPhone without anyone else knowing. Which of the
following best describes Taissa’s actions?
A. Taissa committed an unconstitutional act.
B. Taissa violated the Wiretap Act
C. Taissa violated the Electronic Communications Privacy Act
D. Taissa’s actions recording her friends are legal in most states.

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
System Management Strategies
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,