have studied this book diligently and taken every reasonable step
toward protecting your system?yet someone has still abused it.
Perhaps an ex-employee has broken in through an old account and has
deleted some records. Perhaps someone from outside continues to try
to break into your system despite warnings that they should stop.
What recourse do you have through the courts? Furthermore, what are
some of the particular dangers you may face from the legal system
during the normal operation of your computer system? What happens if
you are the target of legal action?
This chapter attempts to illuminate some of these issues. The
material we present should be viewed as general advice, and not as
legal opinion: for that, you should contact good legal counsel and
have them advise you.