FN35: Difference between revisions
(New page: Computer Law Forms Handbook § 13.2.) |
No edit summary |
||
Line 1: | Line 1: | ||
Computer Law Forms Handbook § 13.2. | Computer Law Forms Handbook § 13.2. | ||
Cal P 502(c). | |||
A checklist for discovery is provided in § 111. | |||
Pretrial Procedures and Motions in Criminal Cases, 5 Am. Jur. Trials 27; Excluding Illegally Obtained Evidence, 5 Am. Jur. Trials 331. Violation of federal constitutional rule (Mapp v. Ohio) excluding evidence obtained through unreasonable search or seizure, as constituting reversible or harmless error, 30 A.L.R. 3d 128. Guilty plea as waiver of right to attack legality of search and seizure, 21 Am. Jur. 2d, Criminal Law § 495. Suppression of evidence, 8 Am. Jur. Pleading and Practice Forms, Criminal Procedure, Form 171 (notice of motion), 8 Am. Jur. Pleading and Practice Forms, Criminal Procedure, Form 172–178 (supporting affidavit). | |||
A variety of methods are discussed in the literature. See BloomBecker, Rifkin—A Documentary History, II Computer LJ 471 (Summer 1980); BloomBecker, Modem Macho in Milwaukee, 1 Computer Crime Dig 1 (Oct 1983); W Landreth, Out of the Inner Circle (Microsoft Press, Bellevue WA 1985). |
Latest revision as of 11:08, 3 March 2009
Computer Law Forms Handbook § 13.2.
Cal P 502(c).
A checklist for discovery is provided in § 111.
Pretrial Procedures and Motions in Criminal Cases, 5 Am. Jur. Trials 27; Excluding Illegally Obtained Evidence, 5 Am. Jur. Trials 331. Violation of federal constitutional rule (Mapp v. Ohio) excluding evidence obtained through unreasonable search or seizure, as constituting reversible or harmless error, 30 A.L.R. 3d 128. Guilty plea as waiver of right to attack legality of search and seizure, 21 Am. Jur. 2d, Criminal Law § 495. Suppression of evidence, 8 Am. Jur. Pleading and Practice Forms, Criminal Procedure, Form 171 (notice of motion), 8 Am. Jur. Pleading and Practice Forms, Criminal Procedure, Form 172–178 (supporting affidavit).
A variety of methods are discussed in the literature. See BloomBecker, Rifkin—A Documentary History, II Computer LJ 471 (Summer 1980); BloomBecker, Modem Macho in Milwaukee, 1 Computer Crime Dig 1 (Oct 1983); W Landreth, Out of the Inner Circle (Microsoft Press, Bellevue WA 1985).