First off, I just made the comparison because of how pearl clutching you got about an e-mail that was likely shared by one of the participants (sounds like the ex wife was CC'd on it, so I would think her).
What makes you think the e-mail was hacked? There's a remote possibility his e-mail was accessed with his password, but without his permission. That's not hacking, but it is illegal.
That said, while hunter's laptop was legally the property of the shop owner where he left it without paying his bill, the e-mails accessed via that laptop were likely still "in the cloud", and that would be the exact same type of unauthorized access.
So actually, the comparison is pretty direct and clear.
And your analogy is bunk. The shop owner owned the laptop, may or may not have been authorized to access the data (depends on the contract, but this probably wouldn't hold up in court as you can't own someone else's PII), but absolutely did not have the right to access online accounts connected to that laptop.