Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.

Similar presentations


Presentation on theme: "1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide."— Presentation transcript:

1 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide or previous slide.

2 2 Quotes of the Day “He threatens many that hath injured one.” Ben Jonson, English Dramatist “Most of the evils of life arise from man’s being unable to sit still in a room.” Blaise Pascal, French Scientist and Religious Essayist

3 3 Civil Law vs. Criminal Law  Procedure for criminal trial -- government decides whether to prosecute; defendant has the right to a jury trial.  In a criminal suit, the court determines the guilt, so that a punishment can be given.  A felony is a serious crime, with a sentence of one year or more in prison. A misdemeanor is less serious, often with a sentence of less than a year. Civil law concerns the rights and liabilities between private parties; criminal law concerns those activities that society has outlawed.

4 4 Purpose of Punishment  Restraint -- to keep a violent criminal away from the rest of society.  Deterrence -- avoid future crimes, both by this criminal and by others “warned” by the punishment.  Retribution -- to give criminal a punishment equal to his crime.  Vengeance -- to make the criminal suffer.  Rehabilitation -- to provide training to allow the prisoner to return to normal life.

5 5 The Prosecution’s Case  Conduct Outlawed The prosecution must show that the defendant’s alleged activity is indeed illegal.  Burden of Proof The jury must believe beyond a reasonable doubt in order to convict. This is to protect innocent defendants from undeserved punishment.  Actus Reus (means “the guilty act”) The prosecution must show that the defendant committed the act (not just talked about doing it).  Mens Rea (means “guilty state of mind”) SEE NEXT SLIDE

6 6 Mens Rea The defendant must have had a “guilty state of mind.”  General Intent Required by most crimes; the defendant intended to do the illegal act they are accused of doing.  Specific Intent Some cases require that the defendant intended to do something beyond the act they are accused of.  Reckless or Negligent Conduct Consciously disregarding a substantial risk of injury.  Strict Liability Certain actions don’t require a guilty state of mind, only proof that the defendant did the illegal action.

7 7 Defenses  Insanity A defendant who can prove he was insane at the time of the crime will be declared not guilty. Two basic tests are used to determine sanity: –M’Naughten Rule: must show a serious, identifiable mental illness and that he didn’t understand the nature of his act. –Irresistible Impulse: must show that a mental defect left him unable to control his behavior. A very small percentage of defendants plead insanity and a very small percentage of those are acquitted. Those who are acquitted often spend longer in mental institutions than they would have spent in prison.

8 8 Defenses (cont’d)  Duress A defendant may plead duress if she can show that a threat by a third person caused her fear of imminent physical harm.  Entrapment If the government induces a defendant to break the law, they must prove that the defendant was predisposed to commit the crime.

9 9 Crimes That Harm Business  Larceny -- The trespassory taking of personal property with the intent to steal it. Someone else originally had the property. Applies to personal property, not services or real estate.  Fraud -- Deception for the purpose of taking money or property from someone. Includes bank fraud, wire and mail fraud, insurance fraud, Medicare fraud.  Arson – malicious use of fire or explosives to destroy property.

10 10 Go to the internet for statistics on corporate losses to computer crime. Crimes That Harm Business (cont’d)  Embezzlement -- Fraudulent conversion of someone else’s property already in the defendant’s possession.  Computer Crime -- federal statutes prohibit unauthorized access to computers: in the federal government at financial institutes involved with the government by means of an internet that crosses state lines Click here for internet links describing various computer crimes.

11 11 Computer Crime Statutes  The Computer Fraud and Abuse Act – prohibits using a computer to commit theft, espionage, trespass, fraud and damage to another computer.  The Access Device Fraud Act – outlaws the misuse of cards, codes, account numbers, etc.  The Identity Theft and Assumption Deterrence Act – bars the use of false identification to commit fraud or other crime.  The Wire and Electronic Communications Interception Act – makes it a crime to intercept most wire, oral and electronic communications.

12 12 Crimes Committed by Business  If someone commits a crime within the scope of his employment and to benefit the corporation, the company is liable.  Punishment Fines -- appropriate since this hurts the profit. Imprisonment? -- yes, in the sense of closing down the company temporarily or permanently.  Compliance programs -- if a company has a valid, functioning plan to prevent and detect criminal behavior, the judge must (according to Federal Sentencing Guidelines) reduce the penalty of a crime of an employee.

13 13 Crimes Committed by Business  Occupational Safety and Health Act OSHA sets standards for safety in the workplace. A state may set standards tougher than OSHA.  Money Laundering -- using the profits of criminal acts to promote more crime or concealing an illegal source of money. Commonly associated with the illegal drug trade.  Racketeer Influenced and Corrupt Organization Act Creates both civil and criminal law liabilities. Is aimed at organized crime -- those involved with a series of illegal acts.

14 14 Racketeer Influenced and Corrupt Organization Act  Racketeering Acts Include (among others) embezzlement, arson, mail fraud, and wire fraud. To violate RICO, there must be two or more of these acts.  Goals that Violate RICO Using criminal money to invest in or acquire a business. Maintain a business using criminal activity. Operate a business using criminal activity. RICO -- RICO prohibits using two or more racketeering acts to accomplish certain goals.

15 15 Constitutional Protections  No matter what crime a suspect is accused of, the Constitution of the United States offers protection against inhumane treatment and ensures certain human rights.  The procedures by which a suspect is investigated, arrested, interrogated and tried is controlled by the Bill of Rights.  Almost all important criminal procedure rights have been expanded beyond the federal government to law enforcement at the state and local level.

16 16 The Criminal Process  Notification to Police -- the police find out about a suspect, sometimes by an informant.  Warrant -- if a search is needed, police take an affidavit (sworn written statement from an informant) to a judge, who issues a warrant, giving permission to search a particular place, looking for particular evidence.  Probable Cause -- based on the information given, it is likely that the specified evidence will be found.  Search and Seizure -- police may search and seize only what is specified by the warrant.

17 17 The Criminal Process (cont’d)  Arrest Warrant -- based on information found in the search, the judge may issue an arrest warrant.  Arrest -- when a suspect is arrested, he is informed of his rights and booked (name, photograph and fingerprints are recorded, along with the charges).  Bail Hearing -- a judge must promptly decide what the bail (if any) will be. This is the amount that must be paid for the suspect to be set free pending trial.

18 18 The Criminal Process (cont’d)  Indictment -- if a grand jury (ordinary citizens) determines that there is probable cause to proceed to trial, the suspect is indicted (charged with the crime).  Arraignment -- the indictment is read to the suspect, who then pleads guilty or not guilty to the charges.  Discovery -- both sides gather as much evidence as possible. The prosecution must hand over to the defense any evidence favorable to the defense.

19 19 The Criminal Process (cont’d)  Motion to Suppress -- if the defense thinks the prosecution got evidence illegally, it will ask the judge to exclude that evidence.  Plea Bargaining -- in many cases, the prosecution will offer to end the case with reduced charges if the defendant will plead guilty.  Trial and Appeal -- if no plea bargain is reached, the case goes to trial. The prosecution must convince the jury beyond a reasonable doubt in order to convict. Convicted defendants may appeal.

20 20 Fourth Amendment Prohibits illegal searches and seizures.  There are six situations in which police may search without a warrant. Plain view -- the evidence is not concealed. Stop and Frisk -- may search a suspect if there is good reason to believe he may be armed. Emergencies -- such as in a chase; suspect may be searched. Automobiles -- if lawfully stopped for other reasons, and evidence is visible, police may search entire car. Lawful arrest -- anyone arrested may be searched. Consent -- if consent is given by the lawful occupant of the home, police may search it.

21 21 Fourth Amendment  A search WITH a warrant is unlawful, if: There was no probable cause. The warrant did not specify place or items. It extended beyond the scope of the warrant.  The Patriot Act of 2001 Passed after Sept. 11 attacks; gives police greater search and investigative powers. Opponents claim it also threatens privacy and individual freedoms.  Exclusionary Rule Evidence obtained illegally (without a warrant or improperly obtained with a warrant) may not be used at trial against the victim of the search. The purpose of the exclusionary rule is to make sure that the police follow proper procedures when conducting a search.

22 22 Fifth Amendment  Due Process -- procedures to ensure fairness must be followed.  Double Jeopardy -- a defendant may only be tried once for a particular offense, no matter what is found later.  Self-incrimination -- the prosecution may not use coercion to force a confession from a suspect. The suspect may refuse to answer any questions that could be used to convict him.  Miranda rights -- when arresting a suspect, the police must inform her that she has the right to remain silent, that anything she says can be used against her and that she has a right to a lawyer (for free if needed).

23 23 Other Amendments  Guarantees the right to a lawyer, and to have him present for all stages of the process.  Government must provide lawyer, at no charge, for those who cannot afford one. The Sixth Amendment  Prohibits cruel and unusual punishment.  Capital punishment has been controversial under this amendment.  “Three strikes” laws have created situations where a punishment is excessive for the crime.  Forfeiture (forced loss of property) has been allowed under this amendment, but the allowable amount has not been set. The Eighth Amendment

24 24 “Crime comes in many forms and the culprits can surprise us.” “Crime comes in many forms and the culprits can surprise us.”

25 25 Link to the Internet  Clicking on the orange button below will link you to the website for this book. (You must first have an active link to the internet on this computer.)  Once there, click: Your text cover Interactive Study Center Select a Chapter Internet Applications  You should then see web links related to that chapter. Click here! Click above to return to the slide show.


Download ppt "1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide."

Similar presentations


Ads by Google