ESSENTIALS OF THE LEGAL ENVIRONMENT today, 5e

Slides:



Advertisements
Similar presentations
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Advertisements

Business Law and the Regulation of Business Chapter 6: Criminal Law
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Crimes Twomey Jennings Anderson’s Business Law and the Legal.
Criminal Law and Procedure
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Chapter 8 Criminal Law and Cyber Crimes. 2 §1: Civil vs. Criminal Law Major differences: Civil (Tort)Criminal PreponderanceBeyond Reasonable Doubt DamagesJail.
Chapter 10 Criminal Law and Procedure. 2 Civil Law and Criminal Law Major differences: Civil (Tort)Criminal PreponderanceBeyond Reasonable Doubt DamagesJail.
Chapter Two LAW and CRIME
Chapter 8 Crimes Twomey, Business Law and the Regulatory Environment (14th Ed.)
Criminal Law and Cyber Crime
© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
{ Chapter 8 Criminal Law and Business. U.S. criminal law system  Person charged is presumed innocent until proven guilty  The burden of proof is on.
© 2004 West Legal Studies in Business A Division of Thomson Learning 1 Chapter 8 Criminal Law and Cyber Crimes Chapter 8 Criminal Law and Cyber Crimes.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 5E, by Henry R. Cheeseman Chapter 8 Business.
Chapter 07 Crime and the Business Community. Elements of a Crime “Actus Reus”—Wrongful behavior (guilty act) “Actus Reus”—Wrongful behavior (guilty act)
Inside Criminal Law.
1. 2 WHY WE STUDY CRIMINAL LAW IN BUSINESS COURSES: Wrongful behavior in the business world can lead to criminal prosecution against both the individual.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Miller Cross 4 th Ed. © 2005 by West Legal Studies in Business / A Division of Thomson Learning Chapter 7 Criminal Law and Cyber Crimes.
 Major Differences Between Civil and Criminal Law.  Burden of Proof. Civil is preponderance of the evidence. Criminal is proof beyond a reasonable doubt.
Chapter 1: Legal Ethics 1. © 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Chapter 9: Criminal Law and Cyber Crimes
© 2005 West Legal Studies in Business, a division of Thompson Learning. All Rights Reserved.1 PowerPoint Slides to Accompany The Legal, Ethical, and International.
Chapter 6 Criminal Law and Cyber Crimes. 2  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for.
1 Chapter Outline 1. Civil Law and Criminal Law 2. Classification of Crimes 3. The essentials of Criminal Liability 4. Corporate Criminal Liability 5.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 6 Criminal Law and Cyber Crimes.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2008 West Legal Studies in Business A Division of Thomson Learning 1 BUSINESS LAW TODAY Essentials 8 th Ed. Roger LeRoy Miller - Institute for University.
Criminal Law and Cyber Crimes Chapters 6 & 7. Civil and Criminal Law Compared.
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 6 Criminal Law and Cyber Crimes.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 22 Criminal Law and Procedure in Business.
Criminal & Civil Law Chapter 15. Where do our laws come from? The Constitution – Constitutional Law The Legislature – Statutory law The Decisions of Judges.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 7 Business.
What two elements must exist before a person can be convicted of a crime? Can a corporation commit crimes? What two elements must exist before a person.
CRIMES Used by permission. For Educational purposes only.
COPYRIGHT © 2006 West Legal Studies in Business, a part of The Thomson Corporation. Thomson, the Star logo, and West Legal Studies in Business are trademarks.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Chapter 3 Criminal Law. Crime: An act against the public good.
5-1Criminal Law 5-2Criminal Procedure 1Chapter 5 CHAPTER 5 Business Law Mrs. A.
Comprehensive Volume, 18 th Edition Chapter 8: Crimes.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 5 Criminal Law and Business.
Chapter 7 Criminal Law and Cyber Crimes. Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.7-2 What Is a Crime? An act done by an individual.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
©2001 West Legal Studies in Business. All Rights Reserved. 1 Chapter 8: Criminal Law and Procedures.
©2005 by West Legal Studies in Business A Division of Thomson Learning Fundamentals of Business Law 6 th Edition Chapter 6 Criminal Law and Cyber Crimes.
CHAPTER 8 CRIMES AND BUSINESS DAVIDSON, KNOWLES & FORSYTHE Business Law: Cases and Principles in the Legal Environment (8 th Ed.)
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Law for Business and Personal Use © Thomson South-Western CHAPTER 4 Criminal Law and Procedure 4-1 Criminal Law 4-2 Criminal Procedure.
Copyright © 2010 South-Western Legal Studies in Business, a part of South-Western Cengage Learning. and the Legal Environment, 10 th edition by Richard.
Chapter 6 Due Process and Other Protected Rights Section 1 The Rights of Criminal Defendants.
©2001 West Legal Studies in Business. All Rights Reserved. 1 Chapter 7: Criminal Law.
Criminal Law and Procedures
Chapter 7 Criminal Law and Cyber Crimes
CRIMINAL LAW AND BUSINESS
Part 2 Crimes and Torts Ch. 5 Crimes Ch. 6 Intentional Torts
Chapter 8 Criminal Law and Cyber Crimes
Fundamentals of Business Law
The Criminal Law And Business
LS311 Business Law Wednesdays 8:00 p.m. – 9:00 p.m.
Copyright 2011 Curriculum Technology, LLC. All Rights Reserved.
Rights when arrested.
Essentials of the Legal Environment today, 5E
BUSINESS LAW TODAY Essentials 9th Ed
Law For Business And Personal Use
Presentation transcript:

ESSENTIALS OF THE LEGAL ENVIRONMENT today, 5e ROGER LEROY MILLER © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

CRIMINAL LAW AND CYBER CRIME Chapter 7 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

LEARNING OBJECTIVES What two elements must exist before a person can be held liable for a crime? What are five broad categories of crimes? What is white-collar crime? What defenses can be raised to avoid liability for criminal acts? What constitutional safeguards exist to protect persons accused of crimes? How has the Internet expanded opportunities for identity theft? © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Civil Law and Criminal Law Key Differences between Civil Law and Criminal Law Burden of proof Civil case: Plaintiff must prove case by a preponderance of the evidence Criminal case: Prosecution must prove case beyond a reasonable doubt Criminal sanctions Sanctions imposed in criminal cases are harsher than civil cases. Civil Liability for Criminal Acts © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Exhibit 7.1 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Criminal Liability For a person to be convicted of a criminal act, two elements must exist simultaneously: The performance of a prohibited act A specified state of mind or intent on the part of the actor LO-1 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Criminal Liability The Criminal Act State of Mind Actus reus – prohibited act Most are acts of commission, but in some situations, failure to do something can be a criminal act, e.g., not filing a tax return. State of Mind Mens rea – wrongful mental state Recklessness and criminal negligence Strict liability and overcriminalization © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Criminal Liability Corporate Criminal Liability Liability of the corporate entity Crimes must occur within scope of employment. Corporations can be held criminally liable when they fail to fulfill certain statutory duties. Liability of corporate officers and directors © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Types of crimes Violent crime Property crime Public order crime White-collar crime Organized crime LO-2 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Types of Crimes Violent Crime Robbery Murder Rape Assault and battery Crimes against persons further classified by degree depending on the circumstances Robbery Murder Rape Assault and battery © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Types of Crimes Property Crime Most common, involves money or property Burglary Larceny Obtaining goods by false pretenses Receiving stolen goods Arson Forgery © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Types of Crimes Public Order Crime Public drunkenness Prostitution Gambling Illegal drug use © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Types of crimes White-Collar Crime Embezzlement Mail and wire fraud Bribery Theft of trade secrets Insider trading © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Types of Crimes Organized Crime Money Laundering Racketeer Influenced and Corrupt Organizations Act (RICO) Criminal provisions (includes 26 different types of felonies with fines up to $25,000 and 20 years in prison for each offense) Civil penalties include forfeiture, and treble damages © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Defenses to criminal liability Justifiable Use of Force Necessity Insanity Mistake Duress Entrapment Statute of Limitations Immunity LO-3 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Criminal procedures Constitutional Safeguards Fourth Amendment – unreasonable searches and seizures Fourth Amendment – no warrant without probable cause Fifth Amendment – due process of law Fifth Amendment – double jeopardy Fifth Amendment – self-incrimination Sixth Amendment – speedy trial, trial by jury, public trial, right to confront witnesses, right to counsel Eighth Amendment – excessive bail and fines, cruel and unusual punishment LO-4 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Criminal Procedures Fourth Amendment Protections The Exclusionary Rule Probable cause Reasonable grounds for believing that a search should be conducted or an arrest made Reasonable expectation of privacy The Exclusionary Rule Prevents evidence obtained illegally or without a proper search warrant from being admissible in court © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Criminal procedures The Miranda Rule Criminal Process 1966 Miranda v. Arizona Criminal Process Arrest Indictment or information Trial Federal Sentencing Guidelines Sentencing Reform Act © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Cyber Crime Computer crime: The unlawful use of a computer or network to take or alter data, or to gain the use of computers or services without authorization Cyber crime: A crime that occurs in the online environment rather than in the physical world © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Cyber Crime Cyber Fraud Fraud committed over the Internet with the intention to deceive for the purpose of obtaining property or funds Online auction fraud Online retail fraud © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Cyber Crime Cyber Theft Identify theft Phishing Employment fraud Internet provides easier access to private data Phishing E-mail fraud scam Employment fraud Asks job seekers to reveal information for identity theft by posing as employment officer Credit-card numbers Companies take risks storing online customers’ credit-card numbers for repeat purchases LO-5 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Cyber Crime Hacking Hacker: uses one computer to break into another Malware Worm Virus Cyberterrorism © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Cyber Crime Prosecuting Cyber Crime Determining the “location” of a cyber crime and identifying criminals are significant challenges for law enforcement Jurisdiction and identification challenges The Computer Fraud and Abuse Act (CFAA) Counterfeit Access Device and Computer Fraud and Abuse Act Provides criminal prosecution for cyber crimes © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.