I have a debate on the foolowing scenario:
A manager in a computer facility quit her job and went into business as a consultant.
She had been frustrated because she thought that her employer ignored her many
suggestions for needed improvements, including better security to protect data and
programs stored in a large multi-access computer system. While employed by the
company she had authorised password access to all parts of the system. At
termination, the company did not tell her that she was no longer authorised to use the
system, and did not invalidate her password.
She later returned to the company, offering her consultancy services to assist with
improving computer security. The offer was refused. She then used her knowledge
of the system and her former password to gain access to the computer from her new
office and downloaded large quantities of data and programs for the only purpose of
presenting them to the company to demonstrate to them that their operation was
can anyone help me to identify the points I can use to say that this practice is appropriate and not appropriate?