... proof that the person, whose data will be accessed, is violating quarantine, another – or any – law, or is indeed under quarantine at all.
... proof that the person, whose data will be accessed, is violating quarantine, another – or any – law, or is indeed under quarantine at all.