© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.

Slides:



Advertisements
Similar presentations
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Legal Research & Writing LAW-215 Litigation Roadmaps.
Advertisements

Chapter 5 – Criminal Procedure. The Role of the Police The process by which suspected criminals are identified, arrested, accused and tried in court is.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
16.2- Criminal Cases.
Chapter 10 Criminal Law and Procedure. 2 Civil Law and Criminal Law Major differences: Civil (Tort)Criminal PreponderanceBeyond Reasonable Doubt DamagesJail.
Chapter 13: Chapter 13 Packet #1.
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Business Law I Criminal Law and Procedure Business Law I Criminal Law and Procedure.
Criminal Law and Cyber Crime
What will happen if you get arrested!. Oh man Mr. Mason I just got arrested! What is going to happen to me now?
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter 13: Criminal Justice Process ~ Proceedings Before Trial Objective: The student should be able to identify the required procedures before a trial.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 5E, by Henry R. Cheeseman Chapter 8 Business.
Chapter 07 Crime and the Business Community. Elements of a Crime “Actus Reus”—Wrongful behavior (guilty act) “Actus Reus”—Wrongful behavior (guilty act)
Students will discover and discuss the Bill of Rights
Inside Criminal Law.
U.S. Government Chapter 15 Section 3
Our Criminal Justice System
Chapter 16 Lesson 2 Civil and Criminal Law. Crime and Punishment crime  A crime is any act that harms people or society and that breaks a criminal law.
1. 2 WHY WE STUDY CRIMINAL LAW IN BUSINESS COURSES: Wrongful behavior in the business world can lead to criminal prosecution against both the individual.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Bill of Rights  The Bill of Rights was not included in the 1787 Constitution.  The first ten amendments (Bill of Rights) were ratified on December 15,
 Major Differences Between Civil and Criminal Law.  Burden of Proof. Civil is preponderance of the evidence. Criminal is proof beyond a reasonable doubt.
U.S. Constitutional Amendments 1-10
Chapter 1: Legal Ethics 1. © 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use.
Chapter 9: Criminal Law and Cyber Crimes
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
{ Criminal Trial Procedure What happens when the police arrest a criminal suspect?
Chapter 6 Criminal Law and Cyber Crimes. 2  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for.
Chapter 4 Section 2 Other Guarantees in the Bill of Rights.
Chapter 16.2 Criminal Cases.
Chapter 13 Answers to Worksheet. 1 Charges are dropped or there is a guilty plea by the criminal or lawyer representing.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 6 Criminal Law and Cyber Crimes.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2008 West Legal Studies in Business A Division of Thomson Learning 1 BUSINESS LAW TODAY Essentials 8 th Ed. Roger LeRoy Miller - Institute for University.
Criminal Law and Cyber Crimes Chapters 6 & 7. Civil and Criminal Law Compared.
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 6 Criminal Law and Cyber Crimes.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
What two elements must exist before a person can be convicted of a crime? Can a corporation commit crimes? What two elements must exist before a person.
Which of the five types of crimes are shown in the pie chart? Bell Ringer.
The Criminal Justice Process
Crime. “He threatens many that hath injured one.” Ben Jonson, English Dramatist “Most of the evils of life arise from man’s being unable to sit still.
 Crime – _______________________________ _______________________________________  Elements of a Crime: › A duty to do or not to do a certain thing ›
Due Process of the Law Requires the state and the federal government in matters of life, liberty, or property of individuals to be reasonable, fair, and.
Chapter 7 Criminal Law and Cyber Crimes. Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.7-2 What Is a Crime? An act done by an individual.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
©2005 by West Legal Studies in Business A Division of Thomson Learning Fundamentals of Business Law 6 th Edition Chapter 6 Criminal Law and Cyber Crimes.
CHAPTER 8 CRIMES AND BUSINESS DAVIDSON, KNOWLES & FORSYTHE Business Law: Cases and Principles in the Legal Environment (8 th Ed.)
The Criminal Justice System. Arrest Procedure The Arrest: To arrest a person the police must have probable cause. (reason to believe that criminal activity.
STREET LAW CHAPTER 2 Criminal Law and Juvenile Justice.
Criminal Justice Process: Proceedings Before Trial – Chp 13 Booking – Formal process of making a police record of an arrest -Give private info such as:
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
CHAPTER 13 – CRIMINAL JUSTICE PROCESS: PROCEEDINGS BEFORE TRIAL.
Copyright © 2010 South-Western Legal Studies in Business, a part of South-Western Cengage Learning. and the Legal Environment, 10 th edition by Richard.
Chapter 6 Due Process and Other Protected Rights Section 1 The Rights of Criminal Defendants.
Bell Ringer Criminal Law: Stages of a Criminal Case  Criminal prosecution develops in a series of stages.  Try to place the following stages in the correct.
Criminal Justice Process: The Investigation
CHAPTER 8 Crime Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move.
ESSENTIALS OF THE LEGAL ENVIRONMENT today, 5e
Chapter 7 Criminal Law and Cyber Crimes
Civics & Economics – Goals 5 & 6 Criminal Cases
Criminal Law ESSENTIAL QUESTIONS Why does conflict develop? How can governments ensure citizens are treated fairly?
Constitutional Rights Before a trial
Chapter 7 Crime.
Lesson 5-2 Criminal Procedure.
BUSINESS LAW TODAY Essentials 9th Ed
Presentation transcript:

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst appears behind the blue triangles, the slide is completely shown. You may click one of the blue triangles to move to the next slide or the previous slide.

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. “He threatens many that hath injured one.” Ben Jonson, English Dramatist “Most of the evils of life arise from man’s being unable to sit still in a room.” Blaise Pascal, French Scientist and Religious Essayist

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Procedure for criminal trial -- government decides whether to prosecute; defendant has the right to a jury trial.  In a criminal suit, the court determines the guilt, so that a punishment can be given.  A felony is a serious crime, with a sentence of one year or more in prison. A misdemeanor is less serious, often with a sentence of less than a year. Civil law concerns the rights and liabilities between private parties; criminal law concerns those activities that society has outlawed.

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Restraint -- to keep a violent criminal away from the rest of society.  Deterrence -- avoid future crimes, both by this criminal and by others “warned” by the punishment.  Retribution -- to give criminal a punishment equal to his crime.  Vengeance -- to make the criminal suffer.  Rehabilitation -- to provide training to allow the prisoner to return to normal life. Purpose of Punishment

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Conduct Outlawed The prosecution must show that the defendant’s alleged activity is indeed illegal.  Burden of Proof The jury must believe beyond a reasonable doubt in order to convict. This is to protect innocent defendants from undeserved punishment.  Actus Reus (means “the guilty act”) The prosecution must show that the defendant committed the act (not just talked about doing it).  Mens Rea (means “guilty state of mind”) SEE NEXT SLIDE The Prosecution’s Case

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. The defendant must have had a “guilty state of mind.”  General Intent Required by most crimes; the defendant intended to do the illegal act they are accused of doing.  Specific Intent Some cases require that the defendant intended to do something beyond the act they are accused of.  Reckless or Negligent Conduct Consciously disregarding a substantial risk of injury.  Strict Liability Certain actions don’t require a guilty state of mind, only proof that the defendant did the illegal action.

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Insanity A defendant who can prove he was insane at the time of the crime will be declared not guilty. Two basic tests are used to determine sanity: –M’Naughten Rule: must show a serious, identifiable mental illness and that he didn’t understand the nature of his act. –Irresistible Impulse: must show that a mental defect left him unable to control his behavior.  Entrapment If the government induces a defendant to break the law, they must prove that the defendant was predisposed to commit the crime. Defenses

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Justification A defendant may plead justification if he committed a criminal act in order to avoid a greater harm.  Duress A defendant may plead duress if she can show that a threat by a third person caused her fear of imminent physical harm. Defenses

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Larceny -- The trespassory taking of personal property with the intent to steal it. Someone else originally had the property. Applies to personal property, not services or real estate.  Fraud -- Deception for the purpose of taking money or property from someone. Includes bank fraud, wire and mail fraud, insurance fraud, Medicare fraud.  Arson – malicious use of fire or explosives to destroy property. Crimes that Harm Businesses

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Embezzlement -- Fraudulent conversion of someone else’s property already in the defendant’s possession.  Computer Crime -- federal statutes prohibit unauthorized access to computers: in the federal government at financial institutes involved with the government by means of an internet that crosses state lines Crimes that Harm Businesses

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  The Computer Fraud and Abuse Act – prohibits using a computer to commit theft, espionage, trespass, fraud and damage to another computer.  The Access Device Fraud Act – outlaws the misuse of cards, codes, account numbers, etc.  The Identity Theft and Assumption Deterrence Act – bars the use of false identification to commit fraud or other crime.  The Wire and Electronic Communications Interception Act – makes it a crime to intercept most wire, oral and electronic communications. Computer Crime Statutes

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Identity Theft– using someone else’s personal information to gain access to their financial accounts. This crime is growing explosively. Thieves steal personal information from company files, find it in garbage or mail or obtain it through fraudulent means. Thieves may open new accounts, drain current accounts and use your name in police investigations. Victims should notify police, credit bureaus, the Federal Trade Commission, and all account providers. Identity Theft

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  If someone commits a crime within the scope of his employment and to benefit the corporation, the company is liable.  Punishment Fines -- appropriate since this hurts the profit.  Compliance programs -- if a company has a valid, functioning plan to prevent and detect criminal behavior, the judge must (according to Federal Sentencing Guidelines) reduce the penalty of a crime. Crimes Committed by Business

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Occupational Safety and Health Act OSHA sets standards for safety in the workplace. A state may set standards tougher than OSHA.  Money Laundering -- using the profits of criminal acts to promote more crime or concealing an illegal source of money. Commonly associated with the illegal drug trade.  Racketeer Influenced and Corrupt Organization Act Creates both civil and criminal law liabilities. Is aimed at organized crime -- those involved with a series of illegal acts. Crimes Committed by Business

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Racketeer Influenced and Corrupt Organization Act  Racketeering Acts Include (among others) embezzlement, arson, mail fraud, and wire fraud. To violate RICO, there must be two or more of these acts.  Goals that Violate RICO Using criminal money to invest in or acquire a business. Maintain a business using criminal activity. Operate a business using criminal activity. RICO prohibits using two or more racketeering acts to accomplish certain goals. RICO --

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  No matter what crime a suspect is accused of, the Constitution of the United States offers protection against inhumane treatment and ensures certain human rights.  The procedures by which a suspect is investigated, arrested, interrogated and tried is controlled by the Bill of Rights. Constitutional Protections

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Notification to Police -- the police find out about a suspect, sometimes by an informant.  Warrant -- if a search is needed, police take an affidavit (sworn written statement from an informant) to a judge, who issues a warrant, giving permission to search a particular place, looking for particular evidence.  Probable Cause -- based on the information given, it is likely that the specified evidence will be found.  Search and Seizure -- police may search and seize only what is specified by the warrant. The Criminal Process

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Arrest Warrant -- based on information found in the search, the judge may issue an arrest warrant.  Arrest -- when a suspect is arrested, he is informed of his rights and booked (name, photograph and fingerprints are recorded, along with the charges).  Bail Hearing -- a judge must promptly decide what the bail (if any) will be. This is the amount that must be paid for the suspect to be set free pending trial. The Criminal Process

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Indictment -- if a grand jury (ordinary citizens) determines that there is probable cause to proceed to trial, the suspect is indicted (charged with the crime).  Arraignment -- the indictment is read to the suspect, who then pleads guilty or not guilty to the charges.  Discovery -- both sides gather as much evidence as possible. The prosecution must hand over to the defense any evidence favorable to the defense. The Criminal Process

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Motion to Suppress -- if the defense thinks the prosecution got evidence illegally, it will ask the judge to exclude that evidence.  Plea Bargaining -- in many cases, the prosecution will offer to end the case with reduced charges if the defendant will plead guilty.  Trial and Appeal -- if no plea bargain is reached, the case goes to trial. The prosecution must convince the jury beyond a reasonable doubt in order to convict. Convicted defendants may appeal. The Criminal Process

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Prohibits illegal searches and seizures.  There are six situations in which police may search without a warrant. Plain view -- the evidence is not concealed. Stop and Frisk -- may search a suspect if there is good reason to believe he may be armed. Emergencies -- such as in a chase; suspect may be searched. Automobiles -- if lawfully stopped for other reasons, and evidence is visible, police may search entire car. Lawful arrest -- anyone arrested may be searched. Consent -- if consent is given by the lawful occupant of the home, police may search it. Fourth Amendment

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  A search WITH a warrant is unlawful, if: There was no probable cause. The warrant did not specify place or items. It extended beyond the scope of the warrant.  The Patriot Act (passed in 2001; revised) Passed after Sept. 11 attacks; gives police greater search and investigative powers. Opponents claim it also threatens privacy and individual freedoms.  Exclusionary Rule Evidence obtained illegally (without a warrant or improperly obtained with a warrant) may not be used at trial against the victim of the search. The purpose of the exclusionary rule is to make sure that the police follow proper procedures when conducting a search. Fourth Amendment

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Due Process -- procedures to ensure fairness must be followed.  Double Jeopardy -- a defendant may only be tried once for a particular offense, no matter what is found later.  Self-incrimination -- the prosecution may not use coercion to force a confession from a suspect. The suspect may refuse to answer any questions that could be used to convict him.  Miranda rights -- when arresting a suspect, the police must inform her that she has the right to remain silent, that anything she says can be used against her and that she has a right to a lawyer (for free if needed). Fifth Amendment

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.  Guarantees the right to a lawyer, and to have him present for all stages of the process.  Government must provide lawyer, at no charge, for those who cannot afford one. The Sixth Amendment  Prohibits cruel and unusual punishment.  Capital punishment (death penalty) has been controversial under this amendment.  Forfeiture (forced loss of property) has been allowed under this amendment, but the allowable amount has not been set. The Eighth Amendment Other Amendments

© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.