 Major Differences Between Civil and Criminal Law.  Burden of Proof. Civil is preponderance of the evidence. Criminal is proof beyond a reasonable doubt.

Slides:



Advertisements
Similar presentations
Business Law and the Regulation of Business Chapter 6: Criminal Law
Advertisements

Criminal Law and Procedure
The American Legal System
Copyright © 2009 by Pearson Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Chapter 8 Criminal Law and Cyber Crimes. 2 §1: Civil vs. Criminal Law Major differences: Civil (Tort)Criminal PreponderanceBeyond Reasonable Doubt DamagesJail.
Chapter 10 Criminal Law and Procedure. 2 Civil Law and Criminal Law Major differences: Civil (Tort)Criminal PreponderanceBeyond Reasonable Doubt DamagesJail.
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Business Law I Criminal Law and Procedure Business Law I Criminal Law and Procedure.
Chapter Two LAW and CRIME
Criminal Law and Cyber Crime
© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
{ Chapter 8 Criminal Law and Business. U.S. criminal law system  Person charged is presumed innocent until proven guilty  The burden of proof is on.
© 2004 West Legal Studies in Business A Division of Thomson Learning 1 Chapter 8 Criminal Law and Cyber Crimes Chapter 8 Criminal Law and Cyber Crimes.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 5E, by Henry R. Cheeseman Chapter 8 Business.
Chapter 07 Crime and the Business Community. Elements of a Crime “Actus Reus”—Wrongful behavior (guilty act) “Actus Reus”—Wrongful behavior (guilty act)
Chapter 3 Criminal Law: Substance and Procedure
Inside Criminal Law.
1. 2 WHY WE STUDY CRIMINAL LAW IN BUSINESS COURSES: Wrongful behavior in the business world can lead to criminal prosecution against both the individual.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Introduction to Criminal Justice
Miller Cross 4 th Ed. © 2005 by West Legal Studies in Business / A Division of Thomson Learning Chapter 7 Criminal Law and Cyber Crimes.
Winning, until proven guilty …. Searches and Seizures The Fourth Amendment protects from unreasonable searches and seizures Searches must be conducted.
The Judicial Branch The Criminal Justice Process.
Chapter 1: Legal Ethics 1. © 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use.
Chapter 9: Criminal Law and Cyber Crimes
3.1 Chapter 3 Crimes and Torts © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Business Law Mr. Smith. CRIMINAL LAW A crime is a punishable offense against ________________ or the public It disrupts the __________________ we depend.
© 2005 West Legal Studies in Business, a division of Thompson Learning. All Rights Reserved.1 PowerPoint Slides to Accompany The Legal, Ethical, and International.
Chapter 6 Criminal Law and Cyber Crimes. 2  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for.
Chapter 4: Inside Criminal Law. The Development of American Law Laws consist of enforceable rules governing relationships among individuals and between.
1 Chapter Outline 1. Civil Law and Criminal Law 2. Classification of Crimes 3. The essentials of Criminal Liability 4. Corporate Criminal Liability 5.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 6 Criminal Law and Cyber Crimes.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2008 West Legal Studies in Business A Division of Thomson Learning 1 BUSINESS LAW TODAY Essentials 8 th Ed. Roger LeRoy Miller - Institute for University.
Criminal Law and Cyber Crimes Chapters 6 & 7. Civil and Criminal Law Compared.
Chapter 3 Section 1 What is a Crime?. What Is a Crime? An act against the public good The state or federal government represents the public good as the.
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 6 Criminal Law and Cyber Crimes.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Rights of Criminal Defendants Are the due process rights and the procedural guarantees provided by the Fourth, Fifth, Sixth, and Eighth Amendments.
PA Kaplan University1 PA 106 – Unit 3. Civil and Criminal Law Major differences: PA Kaplan University2 Civil (Tort)Criminal Preponderance.
Chapter 4 Criminal Law. Categories Business Related.
Criminal & Civil Law Chapter 15. Where do our laws come from? The Constitution – Constitutional Law The Legislature – Statutory law The Decisions of Judges.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 7 Business.
What two elements must exist before a person can be convicted of a crime? Can a corporation commit crimes? What two elements must exist before a person.
Chapter 6. The Nature of Crimes  Crimes are public wrongs, and are classified as being:  Felonies  Misdemeanors  Summary or petty offenses.
COPYRIGHT © 2006 West Legal Studies in Business, a part of The Thomson Corporation. Thomson, the Star logo, and West Legal Studies in Business are trademarks.
5-1Criminal Law 5-2Criminal Procedure 1Chapter 5 CHAPTER 5 Business Law Mrs. A.
Crime. “He threatens many that hath injured one.” Ben Jonson, English Dramatist “Most of the evils of life arise from man’s being unable to sit still.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 5 Criminal Law and Business.
Chapter 7 Criminal Law and Cyber Crimes. Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.7-2 What Is a Crime? An act done by an individual.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
©2001 West Legal Studies in Business. All Rights Reserved. 1 Chapter 8: Criminal Law and Procedures.
©2005 by West Legal Studies in Business A Division of Thomson Learning Fundamentals of Business Law 6 th Edition Chapter 6 Criminal Law and Cyber Crimes.
CHAPTER 8 CRIMES AND BUSINESS DAVIDSON, KNOWLES & FORSYTHE Business Law: Cases and Principles in the Legal Environment (8 th Ed.)
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Law for Business and Personal Use © Thomson South-Western CHAPTER 4 Criminal Law and Procedure 4-1 Criminal Law 4-2 Criminal Procedure.
Copyright © 2010 South-Western Legal Studies in Business, a part of South-Western Cengage Learning. and the Legal Environment, 10 th edition by Richard.
©2001 West Legal Studies in Business. All Rights Reserved. 1 Chapter 7: Criminal Law.
Chapter 2 – Criminal Law A body of laws that deal with crime and the punishment of criminal offenses.
Criminal Law and Procedures
ESSENTIALS OF THE LEGAL ENVIRONMENT today, 5e
Chapter 7 Criminal Law and Cyber Crimes
Chapter 8 Criminal Law and Cyber Crimes
Common Criminal Defenses
Fundamentals of Business Law
LS311 Business Law Wednesdays 8:00 p.m. – 9:00 p.m.
BUSINESS LAW TODAY Essentials 9th Ed
Presentation transcript:

 Major Differences Between Civil and Criminal Law.  Burden of Proof. Civil is preponderance of the evidence. Criminal is proof beyond a reasonable doubt.  Criminal Sanctions. Harsher than those applied in civil cases. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 2

3

 Civil Liability for Criminal Acts.  Assault and Battery, can provide basis for both civil and criminal prosecution.  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 4

5

 Classification of Crimes.  Felonies: punishable by death or imprisonment over 1 year.  Misdemeanors: punishable by fine or jail for less than 1 year. Petty offenses are minor violations such as jaywalking or violations of building codes. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 6

 To be convicted of a crime, a person must:  Commit a guilty act (actus reus).  Have the guilty mind (mens rea) during commission of the guilty act.  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7

 State of Mind.  Required intent (or mental state) is indicated in the applicable statute or law.  Criminal Negligence or Recklessness (unjustified, substantial and foreseeable risk that results in harm).  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8

 State of Mind: Strict Liability and Overcriminalization.  Federal code lists over 4,000 criminal offenses, many do not list a “mental state” for conviction.  Strict liability crimes are found in environmental, drug laws that affect public health, safety, and welfare. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9

 A corporation itself cannot be imprisoned but can be convicted of crime through acts of its officers.  Liability of the Corporate Entity.  Crime is within agent/employee’s scope of employment;  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 10

 Liability of the Corporate Entity (continued).  Corporation fails to perform a legally required duty; or  Crime authorized or requested by corporate principal/officer. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 11

 Liability of Corporate Officers and Directors.  Corporate officers and directors are personally liable for crimes they commit.  They may be criminally liable for acts under the “Responsible Corporate Officer” doctrine. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 12

 Violent Crime.  Murder, sexual assault, rape, robbery.  Property Crime.  Burglary, larceny, theft of trade secrets, theft of services, arson, receipt of stolen goods, forgery.  Public Order Crime. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 13

 Occur in a business context using non-violent means to obtain personal or business advantage.  Embezzlement.  CASE 7.1 People v. Sisuphan (2010). Is the intent to return stolen property a defense? © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 14

 Crimes occurring in the business context (continued):  Mail and Wire Fraud (federal).  Bribery.  Bankruptcy Fraud (federal).  Insider Trading (federal).  Theft of Intellectual Property. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 15

 Operates illegitimately by providing illegal goods and services:  Money Laundering.  RICO: Government must prove a “pattern of racketeering activity” and defendant committed at least two offenses. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 16

 Justifiable Use of Force: Self- Defense of People and Property can use deadly force if reasonable belief of imminent death or serious injury; cannot use deadly force to protect property alone. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 17

 Necessity : criminal act necessary to prevent greater harm.  Insanity. Person who suffers from mental illness may be incapable of the state of mind required for the crime.  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 18

 Mistake: of fact may excuse crime.  Duress: wrongful threat induces another to perform a criminal act.  Entrapment. Key issue: was the defendant pre-disposed to commit the act?  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 19

 Statute of Limitations: state must initiate criminal proceedings within statutory period of time (except for murder).  Immunity: government grants immunity from prosecution in exchange for assistance. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 20

 U.S. Constitution provides specific safeguards for those accused of crimes at federal and state level.  Criminal procedures are designed to protect against the arbitrary use of power by the government.  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 21

 Fourth Amendment.  Protection from unreasonable searches and seizures.  Requirement that no warrant for a search or an arrest be issued without probable cause. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 22

 Fifth Amendment.  Requires that no one be deprived of “life, liberty, or property without due process of law.”  Prohibits double jeopardy (trying someone twice for the same criminal offense).  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 23

 Fifth Amendment.  Requires that no person be required to be a witness against (incriminate) himself.  Sixth Amendment.  Guarantees of a speedy trial, public trial by jury, right to confront witnesses, and the right to a lawyer. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 24

 Eighth Amendment.  Prohibits excessive bail and fines and against cruel and unusual punishment. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 25

 Evidence obtained in violation of the Fourth Amendment is excluded from trial, including “Fruit of the Poisonous Tree.”  Case 7.2 Herring v. United States (2009 ). Is evidence inadmissible when seized based on mistaken belief of police? © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 26

 CASE 7.3 Miranda v. Arizona (1966) required police to inform suspects of their constitutional rights.  Exceptions to Miranda: public safety, certain confessions, suspect must unequivocally assert right to counsel. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 27

Arrest Booking Initial Appearance Grand JuryPreliminary Hearing IndictmentInformation Arraignment Plea Bargain Guilty PleaTrial © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 28

 Federal Sentencing Guidelines.  Shift Away from Mandatory Sentencing.  Increased Penalties for Certain Crimes. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 29

 Any act directed against computers or that uses computers as an instrumentality of a crime.  Cyber Fraud: fraud committed over the internet (e.g., Nigerian letter scam).  Online Auction Fraud.  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 30

 Cyber Fraud (continued).  Online Retail Fraud.  Cyber Theft.  Identity Theft.  Phishing.  Vishing.  Employment Fraud.  Credit-Card Crime on the Web.  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 31

 Hacking.  Malware and Worms.  New Service-Based Hacking Available at Low Cost.  Cyber Terrorism. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 32

 Prosecution of Cyber Crime.  “Location” of crime is an issue.  Jurisdiction of courts is an issue.  Computer Fraud and Abuse Act.  Person is liable if he accesses a computer online, without authority, to obtain classified, private, or protected information. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 33