The Defense of a Computer Crime Case: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
Line 121: Line 121:
==Investigating the Case==
==Investigating the Case==
===Preliminary Matters===
===Preliminary Matters===
* [[In general]]
* [[Preliminary Matters in general]]
* [[Use of discovery]]
* [[Use of discovery]]
* [[Use of private investigators]]
* [[Use of private investigators]]
Line 127: Line 127:
* [[Use of independent laboratory tests]]
* [[Use of independent laboratory tests]]
* [[Application of forensics to computers]]
* [[Application of forensics to computers]]
===Locating and Interviewing Witnesses===
===Locating and Interviewing Witnesses===
* [[In general; locating witnesses]]
* [[In general; locating witnesses]]

Revision as of 15:05, 17 February 2009

Introduction

Scope, Purpose, Procedure

Definitions and Elements

Federal Laws

State Laws

Punishments and Penalties

Auxiliary Provisions

Preliminary Considerations and Procedures

Client Interview and Planning; Evaluating the Case

Fees and Costs

The Accusatory Proceeding

Proceedings Before Grand Jury

Proceedings by Way of Preliminary Hearing

Arraignment; Pleas; Continuance of Case

Investigating the Case

Preliminary Matters

Locating and Interviewing Witnesses

Examining Police Reports, Records, and Photographs

Investigating the Scene of Crime

Discovery

Bargaining to Reduce the Charge

Preparing for Trial

Determining Defenses

Pretrial Motions

Trial Brief and Witnesses

Trial

Preliminary Tactics

Selecting the Jury

Motions During Trial

Opening Statements

The Case for the Prosecution

Presenting the Defense

Defense Summation

Jury Instructions

Proceedings After Trial