Comment on "Students should be made aware of the legal restrictions governing the securing of evidence for prosecuting computer crime, but they should also come away with an understanding of potential vulnerabilities with their own computing environments."