I'm needing some help. I'm currently writing a scene in which someone breaks into an office, hacks into a computer, and downloads some files, including a calendar and contacts list.

I need to be able to describe how someone could tell that this had been done. Are there logs within the computer system that would tip off someone that those files were copied? I've yet to define what the operating system is, etc. So that's up for grabs.

Samantha Sommersby
www.samanthasommersby.com