The Defense of a Computer Crime Case: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
Line 51: Line 51:
* [[Facilitating crime]]
* [[Facilitating crime]]
* [[Computer pornography]]
* [[Computer pornography]]
* [[Child pornography legislation]]
* [[State Child pornography legislation]]
* [[Child protection legislation; solicitation and importuning]]
* [[State Child protection legislation; solicitation and importuning]]
* [[Trade secret statutes]]
* [[Trade secret statutes]]
* [[Spam]]
* [[Spam]]

Revision as of 12:35, 18 February 2009

Introduction

Scope, Purpose, Procedure

Definitions and Elements

Federal Laws

State Laws

Punishments and Penalties

Auxiliary Provisions

Preliminary Considerations and Procedures

Client Interview and Planning; Evaluating the Case

Fees and Costs

The Accusatory Proceeding

Proceedings Before Grand Jury

Proceedings by Way of Preliminary Hearing

Arraignment; Pleas; Continuance of Case

Investigating the Case

Preliminary Matters

Locating and Interviewing Witnesses

Examining Police Reports, Records, and Photographs

Investigating the Scene of Crime

Discovery

Bargaining to Reduce the Charge

Preparing for Trial

Determining Defenses

Pretrial Motions

Trial Brief and Witnesses

Trial

Preliminary Tactics

Selecting the Jury

Motions During Trial

Opening Statements

The Case for the Prosecution

Presenting the Defense

Defense Summation

Jury Instructions

Proceedings After Trial