Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • As to pretrial negotiations generally, see Defending Minor Felony Cases, 13 Am. Jur. Trials 465. ...
    417 bytes (60 words) - 11:12, 26 February 2009
  • ...t is preferable to have the defendant plead to a misdemeanor rather than a felony. ...
    594 bytes (99 words) - 17:55, 22 February 2009
  • ...must be present in court for the arraignment where the crime charged is a felony. The plea entered may take the form of an admission, a denial, a demurrer, ...
    559 bytes (97 words) - 13:53, 22 February 2009
  • Cross-examination of prosecution witnesses, Defending Minor Felony Cases, 13 Am. Jur. Trials 465. Right of defendant in criminal case to inspe ...
    631 bytes (82 words) - 02:56, 5 March 2009
  • As to the preparation of witnesses, see Defending Minor Felony Cases, 13 Am. Jur. Trials 465. ...
    624 bytes (90 words) - 10:49, 26 February 2009
  • ...shments. In California, for example, access to defraud can be treated as a felony, involving punishment of up to three years and a fine of up to $10,000, or ...or example, computer damage in the first degree is classified as a class C felony. Computer damage in the fifth degree, involving the least damage, is classi ...
    4 KB (680 words) - 12:52, 18 February 2009
  • Calling the defendant to testify may be particularly damaging where prior felony convictions may be introduced as evidence to impeach the defendant's testim ...
    1 KB (232 words) - 20:58, 22 February 2009
  • The terms "modifying," "altering," and "copying" used in statute defining a felony computer crime as "intentionally exceeding the limits of authorization and ...to third-party server exceeded $200, as required to support conviction for felony computer fraud; president of defendant's former employer testified that two ...
    4 KB (562 words) - 12:09, 18 February 2009
  • ...ility to care for and protect another's assets (a fiduciary duty). It is a felony, a crime punishable by a prison sentence. ...
    976 bytes (155 words) - 13:46, 26 April 2011
  • ...uter and related materials extortion and classifies the crime as a Class H felony. Therefore, a threat, to erase a number of computer files if the operator o ...
    2 KB (344 words) - 12:48, 18 February 2009
  • ...for the victim's client to get what it was entitled to? Computer crime, a felony as it is defined in the statutes, requires an intent to defraud or to obtai ...
    6 KB (1,154 words) - 21:04, 22 February 2009
  • * What was the charge at the time of arrest? Felony or misdemeanor? ...
    6 KB (951 words) - 18:43, 22 February 2009
  • ...e conduct involved an interstate or foreign communication," and makes it a felony to intentionally transmit malware to a protected computer if more than $500 ...
    5 KB (773 words) - 11:40, 27 August 2011
  • ...cause to believe that the interception will reveal evidence of a predicate felony offense listed in § 2516. 18 U.S.C. § 2518(3)(a)-(b). ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • ...nic communications, a request for interception may be based on any Federal felony, pursuant to 18 U.S.C. § 2516(3). ...dicate offenses (or, in the case of electronic communications, any Federal felony), that they are using the target facility or premises in furtherance thereo ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • * Adding a provision to [[USC 18 1030 | USC 18 1030(c)(4)]] that makes it a felony to cause damage to ten or more computers; ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...America Medicare (United States) fraud. Columbia/HCA pleaded guilty to 14 felony counts and paid out more than $2 billion to settle lawsuits arising from th ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...rated in § 2516(1)(a)-(s) to intercept wire communications, or any federal felony to intercept electronic communications. See 18 U.S.C. § 2516(3). The predic ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...ity Theft"), allowing for a consecutive sentence under specific enumerated felony violations as defined in § 1028A(c)(1) through (11). ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...ated the need for Plaintiff’s loss to be greater than $5,000 and made it a felony for a user to cause damage to ten or more computers. Thus, while the $5,000 ...
    53 KB (7,910 words) - 21:25, 13 April 2011
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)