The Defense of a Computer Crime Case: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
Line 164: Line 164:
==Preparing for Trial==
==Preparing for Trial==
===Determining Defenses===
===Determining Defenses===
* [[In general]]
* [[Determining Defenses in general]]
* [[Notice of defenses]]
* [[Notice of defenses]]
* [[Identity]]
* [[Identity]]
Line 176: Line 176:
* [[Impossibility]]
* [[Impossibility]]
* [[Insanity]]
* [[Insanity]]
===Pretrial Motions===
===Pretrial Motions===
* [[Motion to dismiss charge]]
* [[Motion to dismiss charge]]

Revision as of 15:06, 17 February 2009

Introduction

Scope, Purpose, Procedure

Definitions and Elements

Federal Laws

State Laws

Punishments and Penalties

Auxiliary Provisions

Preliminary Considerations and Procedures

Client Interview and Planning; Evaluating the Case

Fees and Costs

The Accusatory Proceeding

Proceedings Before Grand Jury

Proceedings by Way of Preliminary Hearing

Arraignment; Pleas; Continuance of Case

Investigating the Case

Preliminary Matters

Locating and Interviewing Witnesses

Examining Police Reports, Records, and Photographs

Investigating the Scene of Crime

Discovery

Bargaining to Reduce the Charge

Preparing for Trial

Determining Defenses

Pretrial Motions

Trial Brief and Witnesses

Trial

Preliminary Tactics

Selecting the Jury

Motions During Trial

Opening Statements

The Case for the Prosecution

Presenting the Defense

Defense Summation

Jury Instructions

Proceedings After Trial