Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

21
Criminal Law and Cyber Crime Chapter 6

Transcript of Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Page 1: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Criminal Law and Cyber Crime

Chapter 6

Page 2: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Civil and Criminal Law Compared

Page 3: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Crimes• A wrong committed against society defined

in a statute and punishable by fines and/or imprisonment -- and, in some cases, by death.

• Depending on their degree of seriousness, crimes are classified as felonies or misdemeanors.

Page 4: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Classification of Crimes• Felony

–A crime—such as murder, rape, or robbery—that carries the most severe sanction, ranging from one or more years in prison to forfeiture of one’s life.

Page 5: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Classification of Crimes• Misdemeanor

–A lesser crime—such a disorderly conduct, trespass, or petty theft—punishable by a fine and/or imprisonment for up to one year.

Page 6: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Elements of a Crime• Two elements are required for a person to

be convicted of a crime:–Performance of a prohibited act (actus

reus).–A culpable mental state (mens rea).

Page 7: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Property Crimes

• Burglary - Unlawful entry into a building with the intent to commit another crime

• Larceny - Theft - Taking another person’s property with the intent to deprive the owner of the property

• Robbery - Taking another person’s property by force or threat of force

• Cyber Fraud-Fraud using the internet

Page 8: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

White Collar Crimes• Embezzlement-Fraudulent appropriation of

property already entrusted to you • Mail and Wire Fraud-Mailing or causing to be

mailed a writing to be used to defraud or an organized scheme to defraud by false pretenses

• Bribery- Giving something of value to influence someone to create private gain (usually a public official)

• Theft of Trade Secrets (Chapter 5)• Insider Trading (Chapter 21).

Page 9: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Organized Crime

• Money Laundering-Engaging in financial transactions to conceal the identity, source or destination of illegally gained funds

• Racketeer Influenced and Corrupt Organizations Act (RICO)-In order for an offender to fall under the RICO rules and be charged with racketeering, he or she must violate two of 35 statutes within 10 years, and the violations must be linked in some way

Page 10: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Defenses• Justifiable Use of Force/Self-Defense

–The privilege to take reasonably necessary steps to protect one’s self or another person against injury by a third party.

Page 11: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Defenses

• Justifiable Use of Force-

Deadly force-only in cases where there is a reasonable belief that imminent death or major bodily harm will occur

Nondeadly force- Can use the amount of non-lethal force necessary to protect themselves, another person, or property

Page 12: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Defenses

• Duress- Unlawful pressure causing a person to perform an act that they would not otherwise perform

- Must be a threat of bodily harm or death

- Harm threatened must be greater that the harm of the crime

-Threat must be immediate and inescapable

- Defendant must be involved in a stiuation to no fault of his own

Page 13: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Defenses• Insanity

–due to mental disease or defect– a person cannot appreciate the difference

between right and wrong and– conform his/her conduct to the

requirements of the law.

Page 14: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Defenses• Entrapment

–Generally requires that the official both suggest the wrongful act and then induce the accused to commit it.

Page 15: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Constitutional Rights• The Fourth Amendment provides protection

from unreasonable searches and seizures and requires that a search or arrest warrant shall issue only upon probable cause.

Page 16: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Constitutional Rights• The Fifth Amendment guarantees

–due process of law, –protects against double jeopardy, and–prohibits self-incrimination

Page 17: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Constitutional Rights• The Sixth Amendment guarantees the rights

to: – speedy trial, – trial by jury, –public trial, – confronting witnesses, and – counsel.

Page 18: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

How Are Our Rights Protected?• The Exclusionary Rule

–Any evidence obtained in violation of the accused’s Fourth, Fifth, and/or Sixth Amendment rights, and

–Any evidence derived from illegally obtained evidence.

Page 19: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

How Are Our Rights Protected?• The Miranda Rule

– Individuals who are arrested must be informed of certain constitutional rights, including their right to remain silent (i.e., not to incriminate themselves) and their right to counsel.

Page 20: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Cyber Crime

• Cyber Theft – Identify theft and fraudulently conducting financial transactions.

• Cyber Stalking – Stalking in cyberspace putting a person in reasonable fear for safety.

• Hacking/Destructive Programming – Destruction of computer hardware or software, sending “viruses”, etc

• CAN-SPAM Act – Controlling the Assault of Non-Solicited Pornography and Marketing- Allows unsolicited emails but they cannot be misleading

Page 21: Criminal Law and Cyber Crime Chapter 6. Civil and Criminal Law Compared.

Criminal Law and Cyber Crime

Chapter 6