These are fact sensitive cases and the key to success is proving what happened and the intent to harm you. Was this the employer's computer ? Was the email work related ? Who maintains the program ? By way of example, our law firm owns the computer and program and controls all the activities with regard to the computer. This is allowed by the law. Ed Dimon, Esq. 732-797-1600
Answered on Feb 07th, 2021 at 5:09 AM