The Defense of a Computer Crime Case: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
Line 78: Line 78:
* [[Illustrative form—Order for release on own recognizance]]
* [[Illustrative form—Order for release on own recognizance]]
==Client Interview and Planning; Evaluating the Case==
==Client Interview and Planning; Evaluating the Case==
* [[In general]]
* [[Client Interview and Planning; Evaluating the Case in general]]
* [[Dealing with difficult technical information]]
* [[Dealing with difficult technical information]]
* [[Tape recording initial client interview]]
* [[Tape recording initial client interview]]
Line 88: Line 88:
* [[Client interview checklist]]
* [[Client interview checklist]]
* [[Obtaining information about alleged codefendants; checklist]]
* [[Obtaining information about alleged codefendants; checklist]]
==Fees and Costs==
==Fees and Costs==
* [[In general]]
* [[In general]]

Revision as of 15:03, 17 February 2009

Introduction

Scope, Purpose, Procedure

Definitions and Elements

Federal Laws

State Laws

Punishments and Penalties

Auxiliary Provisions

Preliminary Considerations and Procedures

Client Interview and Planning; Evaluating the Case

Fees and Costs

The Accusatory Proceeding

Proceedings Before Grand Jury

Proceedings by Way of Preliminary Hearing

Arraignment; Pleas; Continuance of Case

Investigating the Case

Preliminary Matters

Locating and Interviewing Witnesses

Examining Police Reports, Records, and Photographs

Investigating the Scene of Crime

Discovery

Bargaining to Reduce the Charge

Preparing for Trial

Determining Defenses

Pretrial Motions

Trial Brief and Witnesses

Trial

Preliminary Tactics

Selecting the Jury

Motions During Trial

Opening Statements

The Case for the Prosecution

Presenting the Defense

Defense Summation

Jury Instructions

Proceedings After Trial