SlideShare ist ein Scribd-Unternehmen logo
1 von 29
CRIMINAL LAW
CYBER CRIMES
What two elements must exist before a person

    can be held liable for a crime? Can a
    corporation commit crimes?
    What are five broad categories of crimes?

    What is white-collar crime?
    What defenses might be raised by criminal

    defendants to avoid liability for criminal acts?
    What constitutional safeguards exist to protect

    persons accused of crimes? What are the
    basic steps in the criminal process?
    What is a cyber crime? What laws apply to

    crimes committed in cyberspace?
Civil Law         Criminal Law
Preponderance of         Beyond a
  the evidence       reasonable doubt
    Remedy is         Punishment is
    damages            incarceration
  Injured party      State represents
represents herself       the victim


                                        3
A person’s wrongful act may hold him liable (or

    guilty) in civil actions (tort) and criminal actions.
    Classification of Crimes:

      Felony: serious crimes punished by death or
    
      imprisonment for at least 1 year.
     Misdemeanor: punished by fine or confinement for
      less than 1 year.




                                                            4
Classification of Crimes

    Crimes are classified as felonies or misde-meanors.

    Felonies are punishable by death or by imprisonment in a
    federal or state penitentiary for more than a year. Felonies
    can be sub-divided by type of punishment—capital offenses
    (punishable by death)
    First degree felonies (punishable by life impris-onment), and

    so on.
     Misdemeanors are crimes punishable by a fine or by

    confinement for up to a year in a local jail.
    Some states classify misdemeanors according to lengths of

    confinement.
    Petty offenses are a subset of misdemeanors. A party guilty

    of a petty offense may be put in jail for a few days or fined,
    or both.
To be convicted of a crime, the State must

    show beyond a reasonable doubt that the
    Defendant:
        Performed an illegal act (actus reus) AND
    
        While performing the act, had the required intent or
    
        specific state of mind (mens rea).
    Without the required intent there can be no

    conviction.
    Crime requires (1) performance of a proh. act

    and (2) a specified state of mind. All criminal
    statutes prohibit certain behavior.
                                                               6
A. CRIMINAL ACT



       Most crimes require an act of commis-sion—an actus

    reus, or guilty act. Some acts of omission are crimes.
    Attempting certain acts (murder, for example, or robbery)
    may also be crimes, if substantial steps toward a criminal
    objective are taken.

    B. CRIMINAL INTENT



        What constitutes a wrongful mental state—mens rea—

    varies according to the act. For murder, the act is the taking
    of a life, and the mental state is the intent to take life. For
    theft, the act is the taking of another person’s property, and
    the mental state involves both the knowledge that the
    property is another’s and the intent to deprive the owner of
    it.
A corporation may be held liable for crimes

    committed by its agents or employees within
    the course and scope of their employment.
    Obviously, corporations cannot be imprisoned,
    but they can be fined or denied certain legal
    privileges. Corporate directors and officers are
    personally liable for the crimes they commit,
    and may be liable for the actions of employees
    under their supervision under the ―responsible
    corporate officer‖ doctrine.
A corporation is a legal ―person.‖


    A corporation can be fined or denied legal

    privileges (license) for criminal activity.
    ―Responsible Corporate Officer‖ Doctrine:

    officers and directors can be criminally liable.




                                                       9
Assume that Ace committed a crime by giving

    politicians comps. Can the casino, Tangiers
    Corporation, be held liable for that crime? Why
    or why not? How could a court punish the
    corporation?
    The Tangiers Corporation could probably be held

    liable for Ace’s crimes. Corporations normally are
    liable for the crimes committed by their agents and
    employees within the course and scope of their
    employment. The corporation obviously cannot be
    imprisoned, but it could be fined or denied certain
    legal privileges.
What two elements must exist before a person

    can be held liable for a crime? Can a
    cor-poration commit crimes?
    Two elements must exist simultaneously for a

    person to be convicted of a crime:
    (1) the performance of a prohibited act and


     (2) a specified state of mind or intent on the part of

    the actor.
    A corporation may be held liable for crimes that

    their agents and employees commit within the
    course and scope of their employment.
Violent Crimes.

      Crimes against persons (murder, rape).
    
     Robbery is a violent crime.
    Property Crimes - Most common, involves

    money or property:
        Burglary.
    
        Larceny.
    
        Receiving Stolen Goods.
    
        Arson.
    
        Forgery.
    




                                               12
White Collar Crimes: non-violent crimes

    involving a business transaction:
      Embezzlement.
    
     Mail and Wire Fraud.
     Bribery.
     Theft of Trade Secrets.
     Insider Trading.

    Organized Crime – RICO and Money

    Laundering.


                                              13
Infancy (juvenile).   Duress.
Intoxication.         Justifiable Use of
                      Force.
Insanity.             Entrapment.
Mistake.              Immunity.
Consent.              Statute of
                      Limitations.

                                           14
What are five broad categories of crimes? What

    is white-collar crime?

    Violent crime (crimes against persons)

    Property crime

    Public order crime

    White-collar crime

    Organized crime.



     White-collar crime is an illegal act or series of acts

    committed by an individual or business entity using
    some nonviolent means, usually in the course of a
    legitimate occupation.
Fourth Amendment.

        Search Warrants:
    
         Officer must have Probable Cause.
         Exceptions to Warrant.
        Search and Seizure in Businesses.
    
         Warrant required in some cases.
         No warrant required for contaminated food or highly
         regulated liquor or gun businesses.




                                                                16
Sixth and Eighth Amendments.

      Right to Speedy Trial.
    
     Right to Jury Trial.
     Right to Public Trial.
     Right to Confront Witnesses.
     Right to Counsel.
     Prohibition on cruel and unusual punishment.
     CASE 6.1 Fellers v. United States (2004).




                                                     17
Evidence obtained in violation of constitutional

    procedures must be excluded.
    Evidence derived from illegal evidence is ―fruit

    of the poisonous tree.‖
        Deters police from misconduct.
    
        CASE 6.2 People v. McFarlan (2002).
    
    Miranda Rule.

        Inform suspect of his rights.
    
        Exceptions: coercion, illegally obtained evidence.
    




                                                             18
Initial    Prelim
  Arrest      Booking
                          Appear     Hearing


   Trial                  Arraign-   Charges
 Case 6.3
                           ment       Filed
US v. Yates


  Guilty         Plea
   Plea         Bargain




                                               19
What defenses might be raised by criminal

    defendants to avoid liability for criminal
    acts?
    Among the most defenses to criminal liability

    are
    infancy, intoxication, insanity, mistake, con-sent
    , duress, justifiable use of
    force, entrapment, the statute of
    limitations, and immunity.
In most criminal cases, defendants plead guilty.

    Usually, this is after the prosecutor promises that
    concessions will be granted (or at least sought).
    Sometimes a defendant agrees to plead guilty to a
    charge less serious than the evidence supports
    because the consequences are not as undesirable.
    A lesser penalty will result, for example.
    In other cases, a defendant pleads guilty to the

    original charge in exchange for the prosecutor’s
    promise to seek leniency, or at least not to oppose
    the defendant’s request for leniency, or to drop
    other charges.
    Downfall - undeserved leniency and innocent

    persons plead guilty due to cost of
    litigation/State/Federal Pressures
Cyber crimes involve the use of computers in

    cyberspace to injure a person or property.
    Most cyber crimes are based on existing common

    law crimes, with exceptions:
        Identity Theft.
    
        Cyber Stalking.
    
        Hacking.
    
        Cyber Terrorism.
    
    Computer Fraud and Abuse Act helps prosecute

    computer crime.


                                                22
A. CYBER THEFT


       Cyber theft is accessing a computer online,

    without authority, to obtain classified, restricted, or
    protected data, or attempting to do so. This
    includes financial crimes, such as transferring
    funds via computer without authorization, and
    identity theft, which occurs when a form of
    identification is stolen and used illegitimately.


    B. CYBERSTALKING


    Cyberstalking—harassing a person in cyberspace

    (via e-mail, for example)—is prohibited by all
    states. Some states require a physical act.
C. HACKING AND CYBERTERRORISM

    Hacking consists of using one computer to break into

    another. Cyberterrorism is exploiting com-puters for serious
    impacts, such as the exploding of an internal data ―bomb‖ to
    shut down a central computer or spreading a virus to cripple
    a computer network.

    D. PROSECUTING CYBER CRIMES

    Jurisdictional issues and the anonymous nature of

    technology can hamper investigation and prosecution of
    cyber crimes. Cyber theft is prohibited by the federal
    National Information Infrastructure Protection Act of 1996
    (an amendment to the Counterfeit Access Device and
    Computer Fraud and Abuse Act of 1984). The crime consists
    of (1) accessing a computer without authority and (2) taking
    data. Penalties include fines and imprisonment for up to
    twenty years (and civil suits). The text also notes other
    federal statutes that may apply.
What is cyber crime? What laws apply to

    crimes committed in cyberspace?
    Cyber crime consists of crimes committed in

    cyberspace with the use of computers. This
    category does not represent new crimes but new
    ways to commit crimes. Traditional (existing) laws
    apply to crimes committed in cyberspace.
    Newer laws include the Counterfeit Access Device

    and Computer Fraud and Abuse Act of 1984 (also
    known as the Computer Fraud and Abuse Act, or
    CFAA), as amended by the National Information
    Infrastructure Protection Act of 1996; the Electronic
    Fund Transfer Act of 1978; the Anti-counterfeiting
    Consumer Protection Act of 1996; and the National
    Stolen Property Act of 1988.
Criminal liability is not imposed for merely thinking

    about a crime (if it was, we might all be guilty of
    something)
    An accused’s mental state is determined by

    examining what happens after it happens—in other
    words, the law uses hindsight to discern intent,
    which may be evident from an individual’s stated
    purpose, his or her knowledge, or his or her acting
    in spite of certain knowledge or in spite of
    something that he or she should have known

    There are some crimes for which an individual will

    be held strictly liable (selling liquor to a minor, for
    example).
The objectives of criminal law are:




    (1) to protect persons and property




    (2) to deter criminal behavior




    (3) to punish criminal conduct and




    (4) to rehabilitate criminals.

Is punishment is more important than

    rehabilitation

    What are appropriate punishments? What

    is an appropriate standard for determining
    that a criminal has been rehabilitated? How
    should that standard be met—that is, how
    should a criminal be rehabilitated (if
    education is the means, for example,
    should prisons become trade schools and
    colleges)?
Law is not so frozen that there is no room for

    disagreement. Attorneys, and even judges,
    often disagree with each other over the
    interpretation and application of the law

    Does the Fourth Amendment prevent the

    seizure, without cause, of email messages?
    Does the propagator of a virus violate
    traditional criminal laws?

Weitere ähnliche Inhalte

Was ist angesagt?

Competition law & policy
Competition law & policyCompetition law & policy
Competition law & policy
Altacit Global
 
Partnership act 1932
Partnership act 1932Partnership act 1932
Partnership act 1932
Renjini2014
 

Was ist angesagt? (20)

Takeover code exemptions
Takeover code exemptionsTakeover code exemptions
Takeover code exemptions
 
Insider trading
Insider tradingInsider trading
Insider trading
 
Fire ins.
Fire ins.Fire ins.
Fire ins.
 
Competition law & policy
Competition law & policyCompetition law & policy
Competition law & policy
 
Requirement of insurable interest for life insurance
Requirement of insurable interest for life insurance Requirement of insurable interest for life insurance
Requirement of insurable interest for life insurance
 
Limited Liability Partnership
Limited Liability PartnershipLimited Liability Partnership
Limited Liability Partnership
 
Life insurance act 1956
Life insurance act 1956Life insurance act 1956
Life insurance act 1956
 
Doctrine of caveat emptor - Legal Environment of Business - Business Law - Co...
Doctrine of caveat emptor - Legal Environment of Business - Business Law - Co...Doctrine of caveat emptor - Legal Environment of Business - Business Law - Co...
Doctrine of caveat emptor - Legal Environment of Business - Business Law - Co...
 
Life insurance and its types
Life insurance and its typesLife insurance and its types
Life insurance and its types
 
Functions of insurance
Functions of insuranceFunctions of insurance
Functions of insurance
 
Anti competitive agreements under the competition act
Anti competitive agreements under the competition actAnti competitive agreements under the competition act
Anti competitive agreements under the competition act
 
Partnership Act 1961
Partnership Act 1961Partnership Act 1961
Partnership Act 1961
 
Agency
AgencyAgency
Agency
 
Contract Damages
Contract Damages Contract Damages
Contract Damages
 
Difference between huf and partnership
Difference between huf and partnership Difference between huf and partnership
Difference between huf and partnership
 
1.Basics Of Contract Act
1.Basics Of Contract Act1.Basics Of Contract Act
1.Basics Of Contract Act
 
The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)
 
Flow Chart on Enforcement of Foreign Arbitration Awards in China
Flow Chart on Enforcement of Foreign Arbitration Awards in ChinaFlow Chart on Enforcement of Foreign Arbitration Awards in China
Flow Chart on Enforcement of Foreign Arbitration Awards in China
 
Fire insurance
Fire insuranceFire insurance
Fire insurance
 
Partnership act 1932
Partnership act 1932Partnership act 1932
Partnership act 1932
 

Andere mochten auch

Bai trang tri dia tron chuan1
Bai trang tri dia tron chuan1Bai trang tri dia tron chuan1
Bai trang tri dia tron chuan1
truongblack92
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
ferrer01
 
Rights of the Accused: The 5th Amendment
Rights of the Accused: The 5th AmendmentRights of the Accused: The 5th Amendment
Rights of the Accused: The 5th Amendment
Lina Nandy
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
guest2495ca5
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Literatura del descubrimiento, la colonia y la conquista...
Literatura del descubrimiento, la colonia y la conquista...Literatura del descubrimiento, la colonia y la conquista...
Literatura del descubrimiento, la colonia y la conquista...
eftirados1996
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 

Andere mochten auch (20)

Bai trang tri dia tron chuan1
Bai trang tri dia tron chuan1Bai trang tri dia tron chuan1
Bai trang tri dia tron chuan1
 
Chapter 4 Detailed
Chapter 4 DetailedChapter 4 Detailed
Chapter 4 Detailed
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 5 Crimes
Chapter 5 CrimesChapter 5 Crimes
Chapter 5 Crimes
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Rights of the Accused: The 5th Amendment
Rights of the Accused: The 5th AmendmentRights of the Accused: The 5th Amendment
Rights of the Accused: The 5th Amendment
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Cyber law
Cyber lawCyber law
Cyber law
 
INTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAWINTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAW
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Traditional marketing vs e-marketing..
Traditional marketing vs e-marketing..Traditional marketing vs e-marketing..
Traditional marketing vs e-marketing..
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
it act 2000
it act 2000it act 2000
it act 2000
 
Literatura del descubrimiento, la colonia y la conquista...
Literatura del descubrimiento, la colonia y la conquista...Literatura del descubrimiento, la colonia y la conquista...
Literatura del descubrimiento, la colonia y la conquista...
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 

Ähnlich wie Business Law Chater 6

CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docxCHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
bissacr
 
The HeartObjectives· Identify the anatomical structures of the.docx
The HeartObjectives· Identify the anatomical structures of the.docxThe HeartObjectives· Identify the anatomical structures of the.docx
The HeartObjectives· Identify the anatomical structures of the.docx
rtodd33
 
· With a Penn in HandResearch the Jerry Sandusky sexual Assaults.docx
· With a Penn in HandResearch the Jerry Sandusky sexual Assaults.docx· With a Penn in HandResearch the Jerry Sandusky sexual Assaults.docx
· With a Penn in HandResearch the Jerry Sandusky sexual Assaults.docx
oswald1horne84988
 
Criminal &civil law
Criminal &civil lawCriminal &civil law
Criminal &civil law
Duyen Cao
 

Ähnlich wie Business Law Chater 6 (20)

Business Torts and crimes
Business Torts and   crimesBusiness Torts and   crimes
Business Torts and crimes
 
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docxCHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
 
The HeartObjectives· Identify the anatomical structures of the.docx
The HeartObjectives· Identify the anatomical structures of the.docxThe HeartObjectives· Identify the anatomical structures of the.docx
The HeartObjectives· Identify the anatomical structures of the.docx
 
The Elements of a Crime
The Elements of a CrimeThe Elements of a Crime
The Elements of a Crime
 
· With a Penn in HandResearch the Jerry Sandusky sexual Assaults.docx
· With a Penn in HandResearch the Jerry Sandusky sexual Assaults.docx· With a Penn in HandResearch the Jerry Sandusky sexual Assaults.docx
· With a Penn in HandResearch the Jerry Sandusky sexual Assaults.docx
 
BASIC LAW CONCEPTS: OFFENCES & DEFENSES
BASIC LAW CONCEPTS: OFFENCES & DEFENSESBASIC LAW CONCEPTS: OFFENCES & DEFENSES
BASIC LAW CONCEPTS: OFFENCES & DEFENSES
 
The Elements of a Crime
The Elements of a CrimeThe Elements of a Crime
The Elements of a Crime
 
National criminallawyersproceeds of crime
National criminallawyersproceeds of crimeNational criminallawyersproceeds of crime
National criminallawyersproceeds of crime
 
Ch 8 crimes
Ch 8 crimesCh 8 crimes
Ch 8 crimes
 
Chapter3
Chapter3Chapter3
Chapter3
 
Lecture-1, Crime and Criminal, types of crime, classification of crime
Lecture-1, Crime and Criminal, types of crime, classification of crimeLecture-1, Crime and Criminal, types of crime, classification of crime
Lecture-1, Crime and Criminal, types of crime, classification of crime
 
Ch. 3 CJ
Ch. 3 CJCh. 3 CJ
Ch. 3 CJ
 
Instant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate Background Check Glossary
Instant Checkmate Background Check Glossary
 
1-131118073532-phpapp02.pdf
1-131118073532-phpapp02.pdf1-131118073532-phpapp02.pdf
1-131118073532-phpapp02.pdf
 
Crimes and punishment
Crimes and punishmentCrimes and punishment
Crimes and punishment
 
A Comprehensive Review By the Law 2.0 Conference.pptx
A Comprehensive Review By the Law 2.0 Conference.pptxA Comprehensive Review By the Law 2.0 Conference.pptx
A Comprehensive Review By the Law 2.0 Conference.pptx
 
Criminal &civil law
Criminal &civil lawCriminal &civil law
Criminal &civil law
 
Criminal law and cyber
Criminal law and cyberCriminal law and cyber
Criminal law and cyber
 
Chapter 4 - Updated
Chapter 4 - UpdatedChapter 4 - Updated
Chapter 4 - Updated
 
California Theft Crimes: Understanding the Offenses and Penalties
California Theft Crimes: Understanding the Offenses and PenaltiesCalifornia Theft Crimes: Understanding the Offenses and Penalties
California Theft Crimes: Understanding the Offenses and Penalties
 

Mehr von Roland Cyr

Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
Roland Cyr
 
Business Law Ch 3
Business Law Ch 3Business Law Ch 3
Business Law Ch 3
Roland Cyr
 
American Form Of Gov
American Form Of GovAmerican Form Of Gov
American Form Of Gov
Roland Cyr
 
Property And Protection
Property And ProtectionProperty And Protection
Property And Protection
Roland Cyr
 
Bus Law Chap 1 Powerpoint Presentation
Bus Law Chap 1 Powerpoint PresentationBus Law Chap 1 Powerpoint Presentation
Bus Law Chap 1 Powerpoint Presentation
Roland Cyr
 

Mehr von Roland Cyr (7)

Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Business Law Ch 3
Business Law Ch 3Business Law Ch 3
Business Law Ch 3
 
Contracts
ContractsContracts
Contracts
 
American Form Of Gov
American Form Of GovAmerican Form Of Gov
American Form Of Gov
 
Property And Protection
Property And ProtectionProperty And Protection
Property And Protection
 
Business Law Chapter 4
Business Law Chapter 4Business Law Chapter 4
Business Law Chapter 4
 
Bus Law Chap 1 Powerpoint Presentation
Bus Law Chap 1 Powerpoint PresentationBus Law Chap 1 Powerpoint Presentation
Bus Law Chap 1 Powerpoint Presentation
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 

Business Law Chater 6

  • 2. What two elements must exist before a person  can be held liable for a crime? Can a corporation commit crimes? What are five broad categories of crimes?  What is white-collar crime? What defenses might be raised by criminal  defendants to avoid liability for criminal acts? What constitutional safeguards exist to protect  persons accused of crimes? What are the basic steps in the criminal process? What is a cyber crime? What laws apply to  crimes committed in cyberspace?
  • 3. Civil Law Criminal Law Preponderance of Beyond a the evidence reasonable doubt Remedy is Punishment is damages incarceration Injured party State represents represents herself the victim 3
  • 4. A person’s wrongful act may hold him liable (or  guilty) in civil actions (tort) and criminal actions. Classification of Crimes:  Felony: serious crimes punished by death or  imprisonment for at least 1 year.  Misdemeanor: punished by fine or confinement for less than 1 year. 4
  • 5. Classification of Crimes  Crimes are classified as felonies or misde-meanors.  Felonies are punishable by death or by imprisonment in a federal or state penitentiary for more than a year. Felonies can be sub-divided by type of punishment—capital offenses (punishable by death) First degree felonies (punishable by life impris-onment), and  so on. Misdemeanors are crimes punishable by a fine or by  confinement for up to a year in a local jail. Some states classify misdemeanors according to lengths of  confinement. Petty offenses are a subset of misdemeanors. A party guilty  of a petty offense may be put in jail for a few days or fined, or both.
  • 6. To be convicted of a crime, the State must  show beyond a reasonable doubt that the Defendant: Performed an illegal act (actus reus) AND  While performing the act, had the required intent or  specific state of mind (mens rea). Without the required intent there can be no  conviction. Crime requires (1) performance of a proh. act  and (2) a specified state of mind. All criminal statutes prohibit certain behavior. 6
  • 7. A. CRIMINAL ACT  Most crimes require an act of commis-sion—an actus  reus, or guilty act. Some acts of omission are crimes. Attempting certain acts (murder, for example, or robbery) may also be crimes, if substantial steps toward a criminal objective are taken. B. CRIMINAL INTENT  What constitutes a wrongful mental state—mens rea—  varies according to the act. For murder, the act is the taking of a life, and the mental state is the intent to take life. For theft, the act is the taking of another person’s property, and the mental state involves both the knowledge that the property is another’s and the intent to deprive the owner of it.
  • 8. A corporation may be held liable for crimes  committed by its agents or employees within the course and scope of their employment. Obviously, corporations cannot be imprisoned, but they can be fined or denied certain legal privileges. Corporate directors and officers are personally liable for the crimes they commit, and may be liable for the actions of employees under their supervision under the ―responsible corporate officer‖ doctrine.
  • 9. A corporation is a legal ―person.‖  A corporation can be fined or denied legal  privileges (license) for criminal activity. ―Responsible Corporate Officer‖ Doctrine:  officers and directors can be criminally liable. 9
  • 10. Assume that Ace committed a crime by giving  politicians comps. Can the casino, Tangiers Corporation, be held liable for that crime? Why or why not? How could a court punish the corporation? The Tangiers Corporation could probably be held  liable for Ace’s crimes. Corporations normally are liable for the crimes committed by their agents and employees within the course and scope of their employment. The corporation obviously cannot be imprisoned, but it could be fined or denied certain legal privileges.
  • 11. What two elements must exist before a person  can be held liable for a crime? Can a cor-poration commit crimes? Two elements must exist simultaneously for a  person to be convicted of a crime: (1) the performance of a prohibited act and  (2) a specified state of mind or intent on the part of  the actor. A corporation may be held liable for crimes that  their agents and employees commit within the course and scope of their employment.
  • 12. Violent Crimes.  Crimes against persons (murder, rape).   Robbery is a violent crime. Property Crimes - Most common, involves  money or property: Burglary.  Larceny.  Receiving Stolen Goods.  Arson.  Forgery.  12
  • 13. White Collar Crimes: non-violent crimes  involving a business transaction: Embezzlement.   Mail and Wire Fraud.  Bribery.  Theft of Trade Secrets.  Insider Trading. Organized Crime – RICO and Money  Laundering. 13
  • 14. Infancy (juvenile). Duress. Intoxication. Justifiable Use of Force. Insanity. Entrapment. Mistake. Immunity. Consent. Statute of Limitations. 14
  • 15. What are five broad categories of crimes? What  is white-collar crime? Violent crime (crimes against persons)  Property crime  Public order crime  White-collar crime  Organized crime.  White-collar crime is an illegal act or series of acts  committed by an individual or business entity using some nonviolent means, usually in the course of a legitimate occupation.
  • 16. Fourth Amendment.  Search Warrants:   Officer must have Probable Cause.  Exceptions to Warrant. Search and Seizure in Businesses.   Warrant required in some cases.  No warrant required for contaminated food or highly regulated liquor or gun businesses. 16
  • 17. Sixth and Eighth Amendments.  Right to Speedy Trial.   Right to Jury Trial.  Right to Public Trial.  Right to Confront Witnesses.  Right to Counsel.  Prohibition on cruel and unusual punishment.  CASE 6.1 Fellers v. United States (2004). 17
  • 18. Evidence obtained in violation of constitutional  procedures must be excluded. Evidence derived from illegal evidence is ―fruit  of the poisonous tree.‖ Deters police from misconduct.  CASE 6.2 People v. McFarlan (2002).  Miranda Rule.  Inform suspect of his rights.  Exceptions: coercion, illegally obtained evidence.  18
  • 19. Initial Prelim Arrest Booking Appear Hearing Trial Arraign- Charges Case 6.3 ment Filed US v. Yates Guilty Plea Plea Bargain 19
  • 20. What defenses might be raised by criminal  defendants to avoid liability for criminal acts? Among the most defenses to criminal liability  are infancy, intoxication, insanity, mistake, con-sent , duress, justifiable use of force, entrapment, the statute of limitations, and immunity.
  • 21. In most criminal cases, defendants plead guilty.  Usually, this is after the prosecutor promises that concessions will be granted (or at least sought). Sometimes a defendant agrees to plead guilty to a charge less serious than the evidence supports because the consequences are not as undesirable. A lesser penalty will result, for example. In other cases, a defendant pleads guilty to the  original charge in exchange for the prosecutor’s promise to seek leniency, or at least not to oppose the defendant’s request for leniency, or to drop other charges. Downfall - undeserved leniency and innocent  persons plead guilty due to cost of litigation/State/Federal Pressures
  • 22. Cyber crimes involve the use of computers in  cyberspace to injure a person or property. Most cyber crimes are based on existing common  law crimes, with exceptions: Identity Theft.  Cyber Stalking.  Hacking.  Cyber Terrorism.  Computer Fraud and Abuse Act helps prosecute  computer crime. 22
  • 23. A. CYBER THEFT  Cyber theft is accessing a computer online,  without authority, to obtain classified, restricted, or protected data, or attempting to do so. This includes financial crimes, such as transferring funds via computer without authorization, and identity theft, which occurs when a form of identification is stolen and used illegitimately.  B. CYBERSTALKING  Cyberstalking—harassing a person in cyberspace  (via e-mail, for example)—is prohibited by all states. Some states require a physical act.
  • 24. C. HACKING AND CYBERTERRORISM  Hacking consists of using one computer to break into  another. Cyberterrorism is exploiting com-puters for serious impacts, such as the exploding of an internal data ―bomb‖ to shut down a central computer or spreading a virus to cripple a computer network. D. PROSECUTING CYBER CRIMES  Jurisdictional issues and the anonymous nature of  technology can hamper investigation and prosecution of cyber crimes. Cyber theft is prohibited by the federal National Information Infrastructure Protection Act of 1996 (an amendment to the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984). The crime consists of (1) accessing a computer without authority and (2) taking data. Penalties include fines and imprisonment for up to twenty years (and civil suits). The text also notes other federal statutes that may apply.
  • 25. What is cyber crime? What laws apply to  crimes committed in cyberspace? Cyber crime consists of crimes committed in  cyberspace with the use of computers. This category does not represent new crimes but new ways to commit crimes. Traditional (existing) laws apply to crimes committed in cyberspace. Newer laws include the Counterfeit Access Device  and Computer Fraud and Abuse Act of 1984 (also known as the Computer Fraud and Abuse Act, or CFAA), as amended by the National Information Infrastructure Protection Act of 1996; the Electronic Fund Transfer Act of 1978; the Anti-counterfeiting Consumer Protection Act of 1996; and the National Stolen Property Act of 1988.
  • 26. Criminal liability is not imposed for merely thinking  about a crime (if it was, we might all be guilty of something) An accused’s mental state is determined by  examining what happens after it happens—in other words, the law uses hindsight to discern intent, which may be evident from an individual’s stated purpose, his or her knowledge, or his or her acting in spite of certain knowledge or in spite of something that he or she should have known There are some crimes for which an individual will  be held strictly liable (selling liquor to a minor, for example).
  • 27. The objectives of criminal law are:  (1) to protect persons and property  (2) to deter criminal behavior  (3) to punish criminal conduct and  (4) to rehabilitate criminals. 
  • 28. Is punishment is more important than  rehabilitation What are appropriate punishments? What  is an appropriate standard for determining that a criminal has been rehabilitated? How should that standard be met—that is, how should a criminal be rehabilitated (if education is the means, for example, should prisons become trade schools and colleges)?
  • 29. Law is not so frozen that there is no room for  disagreement. Attorneys, and even judges, often disagree with each other over the interpretation and application of the law Does the Fourth Amendment prevent the  seizure, without cause, of email messages? Does the propagator of a virus violate traditional criminal laws?