Search results
Jump to navigation
Jump to search
- As to pretrial negotiations generally, see Defending Minor Felony Cases, 13 Am. Jur. Trials 465. ...417 bytes (60 words) - 11:12, 26 February 2009
- ...t is preferable to have the defendant plead to a misdemeanor rather than a felony. ...594 bytes (99 words) - 17:55, 22 February 2009
- ...must be present in court for the arraignment where the crime charged is a felony. The plea entered may take the form of an admission, a denial, a demurrer, ...559 bytes (97 words) - 13:53, 22 February 2009
- Cross-examination of prosecution witnesses, Defending Minor Felony Cases, 13 Am. Jur. Trials 465. Right of defendant in criminal case to inspe ...631 bytes (82 words) - 02:56, 5 March 2009
- As to the preparation of witnesses, see Defending Minor Felony Cases, 13 Am. Jur. Trials 465. ...624 bytes (90 words) - 10:49, 26 February 2009
- ...shments. In California, for example, access to defraud can be treated as a felony, involving punishment of up to three years and a fine of up to $10,000, or ...or example, computer damage in the first degree is classified as a class C felony. Computer damage in the fifth degree, involving the least damage, is classi ...4 KB (680 words) - 12:52, 18 February 2009
- Calling the defendant to testify may be particularly damaging where prior felony convictions may be introduced as evidence to impeach the defendant's testim ...1 KB (232 words) - 20:58, 22 February 2009
- The terms "modifying," "altering," and "copying" used in statute defining a felony computer crime as "intentionally exceeding the limits of authorization and ...to third-party server exceeded $200, as required to support conviction for felony computer fraud; president of defendant's former employer testified that two ...4 KB (562 words) - 12:09, 18 February 2009
- ...ility to care for and protect another's assets (a fiduciary duty). It is a felony, a crime punishable by a prison sentence. ...976 bytes (155 words) - 13:46, 26 April 2011
- ...uter and related materials extortion and classifies the crime as a Class H felony. Therefore, a threat, to erase a number of computer files if the operator o ...2 KB (344 words) - 12:48, 18 February 2009
- ...for the victim's client to get what it was entitled to? Computer crime, a felony as it is defined in the statutes, requires an intent to defraud or to obtai ...6 KB (1,154 words) - 21:04, 22 February 2009
- * What was the charge at the time of arrest? Felony or misdemeanor? ...6 KB (951 words) - 18:43, 22 February 2009
- ...e conduct involved an interstate or foreign communication," and makes it a felony to intentionally transmit malware to a protected computer if more than $500 ...5 KB (773 words) - 11:40, 27 August 2011
- ...cause to believe that the interception will reveal evidence of a predicate felony offense listed in § 2516. 18 U.S.C. § 2518(3)(a)-(b). ...9 KB (1,342 words) - 18:26, 13 April 2011
- ...nic communications, a request for interception may be based on any Federal felony, pursuant to 18 U.S.C. § 2516(3). ...dicate offenses (or, in the case of electronic communications, any Federal felony), that they are using the target facility or premises in furtherance thereo ...29 KB (4,458 words) - 12:24, 16 October 2014
- * Adding a provision to [[USC 18 1030 | USC 18 1030(c)(4)]] that makes it a felony to cause damage to ten or more computers; ...14 KB (2,101 words) - 11:35, 27 August 2011
- ...America Medicare (United States) fraud. Columbia/HCA pleaded guilty to 14 felony counts and paid out more than $2 billion to settle lawsuits arising from th ...15 KB (2,222 words) - 15:20, 12 November 2011
- ...rated in § 2516(1)(a)-(s) to intercept wire communications, or any federal felony to intercept electronic communications. See 18 U.S.C. § 2516(3). The predic ...97 KB (14,928 words) - 13:21, 5 August 2011
- ...ity Theft"), allowing for a consecutive sentence under specific enumerated felony violations as defined in § 1028A(c)(1) through (11). ...37 KB (5,577 words) - 14:50, 12 November 2011
- ...ated the need for Plaintiff’s loss to be greater than $5,000 and made it a felony for a user to cause damage to ten or more computers. Thus, while the $5,000 ...53 KB (7,910 words) - 21:25, 13 April 2011