I'm a technical person, and understand the argument being made in the question. But before I start to side with these arguments to assert the insecurity of the password storage system, past or present, I'd need to be convinced that when 28 ASCII characters was accepted, a password typed with an error past the 20th character was refused. If not, it's entirely possible that since the origin only the first 20 characters of the password have been significant, and that is limit now enforced, and for the rest the password was and is stored properly password-hashed.
Even then, I won't be convinced "that the password is stored in the plain". It's entirely possible that he password now is stored properly password-hashed, with the conversion from an old format to a new one when the password, or it's first 20 characters, are first used in the new system. Such seamless conversion from legacy to new password format is standard procedure.
I won't even be convinced that the password was stored in the plain. It's entirely possible that the password was stored encrypted with a reversible encryption and some secret key. That would not be properly password-hashed, but still better than "in the plain" (and even quite satisfactory if the password decryption and handling occurs only in a secure environment, like an HSM).
I'm not saying it's impossible to use "Jedi mind tricks" and convince the legal person of something, as was done for the certification of a plane. But that's something I do not condone. Beside, it's off-topic.