CYBERCRIMES CERTIFICATIONS COURSE

Size: px
Start display at page:

Download "CYBERCRIMES CERTIFICATIONS COURSE"

Transcription

1 CYBERCRIMES CERTIFICATIONS COURSE TCLEOSE Course #3210 Sponsored by The Harris County Constables Office, Pct 4, 6831 Cypresswood Drive, Spring Texas 77379

2 WARNING This presentation is being given a rating of B expect excessively boring material to be discussed for the next 6 hours...unless the speaker gets on a roll in which it might be for the next 8-10 hours. 2

3 This presenter, however, has been rated 3

4 4

5 EULA Any and all statements made by the presenter are the opinion of the presenter and do not represent in any way the opinion of the Harris County Pct 4 Constable s Office, the Houston Metro ICAC, the State of Texas, The United States, the United Nations, the Planet Earth or any sane individual Any portion of this class that you like or find helpful is the sole idea and property of Eric Devlin. Any portion of this class that you dislike or find offensive is the sole idea and property of Gary Spurger & Stephen Driver. 5

6 Unit 9 Liabilities Associated with Evidence 6

7 The evidence that a Cybercrime investigator will obtain during the course of their investigation is sensitive in nature. Some evidence is contraband outright (Child Pornography) and carries significant penalties simply for possessing it Other evidence can have far reaching consequences for innocents, including personal or financial stress The evidence is not simply a Hard Drive, a Computer, or a CD, rather it is the data contained within that physical object The Investigator should never commingle evidence with other day to day digital material 7

8 Use of an Investigation Machine vs. Use of Everyday Machine An Investigation Machine is a specific device designated for use during undercover or sensitive investigations ú Removed from your Department Network ú Secured from use by individuals other than the investigator EveryDay Machine is a device used during common every day work like writing reports, department s, and other activities ú Attached to your Department Network ú No extra security other than standard for your department 8

9 Benefits of an Investigative Machine approach Your machine that you conduct investigative actions on is subject to subpoena from the defense attorney ú If subpoenaed, only the investigative machine is removed, and the daily machine is still available for use. Your investigative machine is going to need the ability to download and install programs and look at dangerous material, subjecting itself to an increased chance of infection Prevents unauthorized individuals from obtaining contraband or learning confidential processes. 9

10 Sensitivity of Data also pertains to the type of evidence an investigator seeks. Know the Bounds of Your authority to search ú ex. Search Warrant on Fraud Case and during forensic examination, child pornography is found 3 possible paths (Which one is best) Path 1- forge ahead and look for everything Path 2- forge ahead and continue your exam still looking for only the fraud information Path 3- Pause, obtain a new search warrant based upon updated information and continue exam looking for both fraud and child pornography. 10

11 Finding Contraband on a Preview or Consent Contraband is seizable without a warrant If on a consent to search, and you find child pornography, even if the consenting party withdraws their consent, the device is still taken. A search warrant needs to be obtained to continue the forensic exam. 11

12 9.2 Federal Rules of Evidence The Federal Rules of Evidence have begun to modernize in regards to computer records and cyber evidence. They have begun to move toward the concept that computer evidence has an inherent reliability and is not subject to hearsay rules. 12

13 Federal Rule of Evidence 803(6) Records of Regularly Conducted Activity A memorandum, report, record, or data compilation, in any form, of acts, events, conditions, opinions, or diagnoses, made at or near the time by, or from information transmitted by, a person with knowledge, if kept in the course of a regularly conducted business activity, and if it was the regular practice of that business activity to make the memorandum, report, record, or data compilation, all as shown by the testimony of the custodian or other qualified witness, unless the source of information or the method or circumstances of preparation indicate lack of trustworthiness. The term "business" as used in this paragraph includes business, institution, association, profession, occupation, and calling of every kind, whether or not conducted for profit. 13

14 Federal Rule of Evidence 803(6) Authenticity and the Alteration of Computer Records Computer records can be altered easily, and opposing parties often allege that computer records lack authenticity because they have been tampered with or changed after they were created. The courts have responded with considerable skepticism to such unsupported claims that computer records have been altered. Absent specific evidence that tampering occurred, the mere possibility of tampering does not affect the authenticity of a computer record. 14

15 Federal Rule of Evidence 803(6) Establishing the Reliability of Computer Programs The authenticity of computer-generated records sometimes implicates the reliability of the computer programs that create the records. For example, a computer-generated record might not be authentic if the program that creates the record contains serious programming errors. If the program's output is inaccurate, the record may not be "what its proponent claims" according to Fed. R. Evid Prosecutors may note the conceptual overlap between establishing the authenticity of a computer-generated record and establishing the trustworthiness of a computer record for the business record exception to the hearsay rule. In fact, federal courts that evaluate the authenticity of computer-generated records often assume that the records contain hearsay. 15

16 This analysis is technically incorrect in many cases: computer records generated entirely by computers cannot contain hearsay and cannot qualify for the business records exception because they do not contain human "statements." As a practical matter, however, prosecutors who lay a foundation to establish a computer-generated record as a business record will also lay the foundation to establish the record's authenticity. Evidence that a computer program is sufficiently trustworthy so that its results qualify as business records according to Fed. R. Evid. 803(6) also establishes the authenticity of the record. Compare United States v. Saputski, 496 F.2d 140, 142 (9th Cir. 1974). 16

17 Federal Rule of Evidence 803(6) Identifying the Author of Computer-Stored Records Although handwritten records may be penned in a distinctive handwriting style, computer-stored records consist of a long string of zeros and ones that do not necessarily identify their author. This is a particular problem with Internet communications, which offer their authors an unusual degree of anonymity. 17

18 For example, Internet technologies permit users to send effectively anonymous s, and Internet Relay Chat channels permit users to communicate without disclosing their real names. When prosecutors seek the admission of such computer-stored records against a defendant, the defendant may challenge the authenticity of the record by challenging the identity of its author. 18

19 How to Identify Ownership? Circumstantial evidence generally provides the key to establishing the authorship and authenticity of a computer record. For example, in United States v. Simpson, 152 F.3d 1241 (10th Cir. 1998), prosecutors sought to show that the defendant had conversed with an undercover FBI agent in an Internet chat room devoted to child pornography. The government offered a printout of an Internet chat conversation between the agent and an individual identified as "Stavron," and sought to show that "Stavron" was the defendant. 19

20 The district court admitted the printout in evidence at trial. On appeal following his conviction, Simpson argued that "because the government could not identify that the statements attributed to [him] were in his handwriting, his writing style, or his voice," the printout had not been authenticated and should have been excluded. Id. at The defendant in this case also argued on appeal that the evidence should not be admissible because the path to the suspect files was different because the files had been moved. Those files could then contain different content data. The appeal was subsequently denied on both counts. 20

21 9.3 The Patriot Act The Patriot Act was passed in 2001 in response to the terrorist attacks on 9/11. The purpose of the act was to ease the restrictions on law enforcement efforts to gather data in relation to intelligence gathering and domestic security. Important changes include: 21

22 For pen registers and trap and trace orders, the standard for issuing those orders is that it must simply be relevant to the criminal investigation, and the judge has no discretion in issuing the order, if relevance is shown, the judge MUST issue the trap and trace order. Grand Jury Subpoenas may not be issued for credit card numbers and banking information used to purchase goods and services over cyberspace. 22

23 c) Originally if you wished to receive stored electronic mail it required a federal wire tap order, which is more burdensome than other requests. The Patriot Act defined stored electronic communications as obtainable through a search warrant. d) Allowed for ISP s to provide immediate disclosure of identifying information including I.P. addresses and private customer information if it is shown that a reasonable person might believe that there is an immediate risk of death of serious bodily injury. (provides civil protection) 23

24 e) Expanded the trap and trace requirements to include cable companies that offer more than just television services. Originally in an effort to protect government from finding out what TV shows you were watched the Cable Companies were immune from trap and trace orders. Federal Cyber search warrants such as ISP s and s do not have to be executed in the jurisdiction they are signed. Ex. A California federal court can issue a search warrant for an ISP or in New Jersey. 24

25 9.4 The Electronic Communications Privacy Act Sets out the provisions for access, use, disclosure, interception and privacy protections of electronic communications. The law was enacted in 1986 and covers various forms of wire and electronic communications Title 18 of the United States Code encompasses the ECPA 25

26 According to the U.S. Code, electronic communications "means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo electronic or photo optical system that affects interstate or foreign commerce." ECPA prohibits unlawful access and certain disclosures of communication contents. Additionally, the law prevents government entities from requiring disclosure of electronic communications from a provider without proper procedure. 26

27 This Act basically spells out for ISPs the information which they may release and under what form of legal authorization. For specific information a Subpoena, Court Order or Search Warrant will be required to obtain the data the investigator seeks. Normally for a Cybercrime it will be either a Subpoena or a Search Warrant which is required. 27

28 Legal Update #1 US v. Abel Lopez The defendant is arrested during a transaction for dealing meth to an undercover officer The defendant has a cell phone on him, no evidence of use of the phone during the operation Officers search the phone, and record the numbers called, text messages, and phone list. The court reached the conclusion that the phone is not a computer but rather just like a diary or address book. This is bad law and is completely contrary to all of the other emerging trends. DO NOT FOLLOW THIS CASE. 28

29 Texas Version of Legal Update 1 State of Texas vs. Anthony Granville! a High School student was arrested for class C misdemeanor and booked into county jail (student was 17). His cellphone was placed in the jail property room, a School Resource Officer (officer was employed by municipal police officer) checked the phone out and conducted search on the device. The Texas Court of Criminal Appeals ruled that a cellphone is not like a pair of pants or bag of groceries where the owner loses all rights to privacy upon being booked in. 29

30 Texas Version of Legal Update 1 Part 2 The court found that people have a legitimate expectation of privacy in the contents of their cellphone. The court went further and talked about the a search incident to arrest. [O]nce law enforcement officers have reduced luggage or other personal property not immediately associated with the person of the arrestee to their exclusive control, and there is no longer any danger that the arrestee might gain access to the property to seize a weapon or destroy evidence, a search of that property is no longer incident to the arrest. 30

31 Texas Version of Legal Update 1 Part 3 In such circumstances, the police may legitimately seize the property and hold it while they seek a search warrant.but they may not embark upon a general, evidence-gathering search,especially of a cell phone which contains much more personal information... than could ever fit in a wallet, address book, briefcase, or any of the other traditional containers that the government has invoked! The court found that someone arrested still retains an expectation of privacy, just a reduced one and that the purpose of search incident to arrest is to be limited to promoting officer safety and preventing evidence from being destroyed 31

32 9.5 Privacy Protection Act of 1980 Title 42, Chapter 21A, Subchapter I, Part A, Section 2000aa Searches and seizures by government officers and employees in connection with investigation or prosecution of criminal offenses 32

33 Work Product Materials Notwithstanding any other law, it shall be unlawful for a government officer or employee, in connection with the investigation or prosecution of a criminal offense, to search for or seize any work product materials possessed by a person reasonably believed to have a purpose to disseminate to the public a newspaper, book, broadcast, or other similar form of public communication, in or affecting interstate or foreign commerce 33

34 but this provision shall not impair or affect the ability of any government officer or employee, pursuant to otherwise applicable law, to search for or seize such materials, if there is probable cause to believe that the person possessing such materials has committed or is committing the criminal offense to which the materials relate a government officer or employee may not search for or seize such materials under the provisions of this paragraph if the offense to which the materials relate consists of the receipt, possession, communication, or withholding of such materials or the information contained therein there is reason to believe that the immediate seizure of such materials is necessary to prevent the death of, or serious bodily injury to, a human being. 34

35 such a search or seizure may be conducted under the provisions of this paragraph if the offense consists of the receipt, possession, or communication of information relating to the national defense, classified information, or restricted data under the provisions of section 793, 794, 797, or 798 of title 18, or section 2274, 2275, or 2277 of this title, or section 783 of title 50, if the offense involves the production, possession, receipt, mailing, sale, distribution, shipment, or transportation of child pornography, the sexual exploitation of children, or the sale or purchase of children under section 2251, 2251A, 2252, or 2252A of title 18); 35

36 Other Documents Notwithstanding any other law, it shall be unlawful for a government officer or employee, in connection with the investigation or prosecution of a criminal offense, to search for or seize documentary materials, other than work product materials, possessed by a person in connection with a purpose to disseminate to the public a newspaper, book, broadcast, or other similar form of public communication, in or affecting interstate or foreign commerce; 36

37 but this provision shall not impair or affect the ability of any government officer or employee, pursuant to otherwise applicable law, to search for or seize such materials, if there is probable cause to believe that the person possessing such materials has committed or is committing the criminal offense to which the materials relate ú Provided, however, That a government officer or employee may not search for or seize such materials under the provisions of this paragraph if the offense to which the materials relate consists of the receipt, possession, communication, or withholding of such materials or the information contained therein 37

38 this provision does apply to investigations for national defense, classified information, or restricted data or offense involves the production, possession, receipt, mailing, sale, distribution, shipment, or transportation of child pornography, the sexual exploitation of children, or the sale or purchase of children 38

39 there is reason to believe that the immediate seizure of such materials is necessary to prevent the death of, or serious bodily injury to, a human being; (3) there is reason to believe that the giving of notice pursuant to a subpoena duces tecum would result in the destruction, alteration, or concealment of such materials; or (4) such materials have not been produced in response to a court order directing compliance with a subpoena deuces tecum, and (A) all appellate remedies have been exhausted; or (B) there is reason to believe that the delay in an investigation or trial occasioned by further proceedings relating to the subpoena would threaten the interests of justice. 39

40 Objections to court ordered subpoenas; affidavits In the event a search warrant is sought pursuant to paragraph (4) (B) of subsection (b) of this section, the person possessing the materials shall be afforded adequate opportunity to submit an affidavit setting forth the basis for any contention that the materials sought are not subject to seizure. ú ( ) 40

41 What does this all Mean? When in doubt, ask the person a plain and simple question to the effect do you have protected material on your computer. If they answer in the affirmative, it is up to the investigator to provide them with a copy of their work without delay. This does not mean six months from the date of seizure. The person has a right to their literary work if it is to be published in some form in a public venue. The courts have held under this act that a law enforcement official may be personally civilly liable for damages and inconvenience to the person whom the items were taken. This also extends to the employing entity of the official. 41

42 9.6 Reasonable Expectation of Privacy Unless a person is using a computer which does not belong to him/her and they have not been given notice the machine is subject to search, Individuals have a reasonable expectation to privacy just as if you were to use a pay phone in a train station. 42

43 This expectation may also transcend into the work place if the person has not been given the notice they may not perform personal functions on a work computer. This is especially true in a work environment where the employee is the only person using the computer and no ground work has been laid before as to the expectation of privacy. 43

44 In an environment where two persons use the same computer and have a unified login: either party may consent to a voluntary search of the computer as it is plain neither has an expectation of personal privacy someone else has normal access to the computer. If both parties have separate logins then the expectation of privacy is attached and one may not consent for another Think of it as a room in which the parents do not go for their teen child who now has a lock on the door. We work the reasonableness much the same ways for digital evidence as physical evidence. 44

45 LEGAL UPDATE #2 US v. Jones, No , United States Supreme Court. Installation of GPS device on suspect s car could be a search based upon circumstances surrounding the installation and monitoring Circumstances to be considered ú How the installation will be done ú What method for the installation ú What method for the monitoring ú Length of time to monitor THIS CASE DOES NOT MATTER TO US...STATE LAW REQUIRES A COURT ORDER 45

HB659 151295-1. By Representative Hall. RFD: Judiciary. First Read: 23-APR-13. Page 0

HB659 151295-1. By Representative Hall. RFD: Judiciary. First Read: 23-APR-13. Page 0 HB -1 By Representative Hall RFD: Judiciary First Read: -APR-1 Page 0 -1:n:0/0/01:JET/mfc LRS01-1 1 1 1 1 1 1 1 1 0 1 SYNOPSIS: Under existing law, a court or magistrate may issue a warrant for the search

More information

SUBSCRIBER PRIVACY NOTICE

SUBSCRIBER PRIVACY NOTICE PRIVACY AND SECURITY NewWave will provide you with a copy of its privacy notice at the time Service is installed, and annually afterwards, or as otherwise permitted by law. Customer can view the most current

More information

CYBERCRIME LAWS OF THE UNITED STATES

CYBERCRIME LAWS OF THE UNITED STATES CYBERCRIME LAWS OF THE UNITED STATES United States Code, Title 18, Chapter 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 2701. Unlawful access to stored communications

More information

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act. Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for

More information

Digital Evidence Collection and Use. CS 585 Fall 2009

Digital Evidence Collection and Use. CS 585 Fall 2009 Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers

More information

SENATE... No. 2299. The Commonwealth of Massachusetts. In the Year Two Thousand Fourteen

SENATE... No. 2299. The Commonwealth of Massachusetts. In the Year Two Thousand Fourteen SENATE.............. No. 2299 The Commonwealth of Massachusetts In the Year Two Thousand Fourteen SENATE, Wednesday, July 23, 2014 The committee on Ways and Means, to whom was referred the Senate Bill

More information

HOUSE BILL REPORT ESHB 1440

HOUSE BILL REPORT ESHB 1440 HOUSE BILL REPORT As Passed Legislature Title: An act relating to prohibiting the use of a cell site simulator device without a warrant. Brief Description: Prohibiting the use of a cell site simulator

More information

BILL ANALYSIS. Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed

BILL ANALYSIS. Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed BILL ANALYSIS Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed AUTHOR'S / SPONSOR'S STATEMENT OF INTENT Internet communications companies often hold information

More information

JAN 2 2 2016. (a) The obstruction, impairment, or hindrance of the. (b) The obstruction, impairment, or hindrance of any

JAN 2 2 2016. (a) The obstruction, impairment, or hindrance of the. (b) The obstruction, impairment, or hindrance of any ~ (c) S.B. NO. \ JAN 0 A BILL FOR AN ACT THE SENATE TWENTY-EIGHTH LEGISLATURE, 0 STATE OF HAWAII RELATING TO LAW ENFORCEMENT. BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII: ' SECTION. Section

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN RE APPLICATION OF THE : UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO : Misc. No. 01-189 (Magistrate Judge Bredar) 18 U.S.C. 2703(d)

More information

Department, Board, Or Commission Author Bill Number

Department, Board, Or Commission Author Bill Number BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain

More information

NC General Statutes - Chapter 15A Article 17 1

NC General Statutes - Chapter 15A Article 17 1 SUBCHAPTER III. CRIMINAL PROCESS. Article 17. Criminal Process. 15A-301. Criminal process generally. (a) Formal Requirements. (1) A record of each criminal process issued in the trial division of the General

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellee, v. DANNY TEAGUE, Defendant-Appellant. No. 10-10276 D.C. No. 1:05-cr-00495- LJO-1 OPINION

More information

IN THE SUPREME COURT OF THE STATE OF DELAWARE

IN THE SUPREME COURT OF THE STATE OF DELAWARE IN THE SUPREME COURT OF THE STATE OF DELAWARE KEVIN D. TALLEY, Defendant-Below No. 172, 2003 Appellant, v. Cr. ID No. 0108005719 STATE OF DELAWARE, Court Below: Superior Court of the State of Delaware,

More information

UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION. v. CASE NO. 8:15-CR-244-T-23AEP PLEA AGREEMENT

UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION. v. CASE NO. 8:15-CR-244-T-23AEP PLEA AGREEMENT Case 8:15-cr-00244-SDM-AEP Document 3 Filed 07/08/15 Page 1 of 15 PageID 6 UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION UNITED STATES OF AMERICA v. CASE NO. 8:15-CR-244-T-23AEP

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES

Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES Chapter 337-A: PROTECTION FROM HARASSMENT Table of Contents Part 12. HUMAN RIGHTS... Section 4651. DEFINITIONS... 3 Section 4652. FILING OF COMPLAINT; JURISDICTION...

More information

CHAPTER 124B COMPUTER MISUSE

CHAPTER 124B COMPUTER MISUSE 1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.

More information

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection As amended by P.L.79-2007. INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection IC 5-11-5.5-1 Definitions Sec. 1. The following definitions

More information

CRIMINAL LAW AND VICTIMS RIGHTS

CRIMINAL LAW AND VICTIMS RIGHTS Chapter Five CRIMINAL LAW AND VICTIMS RIGHTS In a criminal case, a prosecuting attorney (working for the city, state, or federal government) decides if charges should be brought against the perpetrator.

More information

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor Senate Bill No. 467 Passed the Senate September 10, 2013 Secretary of the Senate Passed the Assembly September 9, 2013 Chief Clerk of the Assembly This bill was received by the Governor this day of, 2013,

More information

ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT

ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT INTRODUCTION ARRIS may collect and receive information from you through its websites 1 as well as through the Moxi User

More information

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now Criminal Court Felonies The U.S. has the highest rate of felony conviction and imprisonment of any industrialized nation. A felony crime is more serious than a misdemeanor, but the same offense can be

More information

Information for Crime Victims and Witnesses

Information for Crime Victims and Witnesses Office of the Attorney General Information for Crime Victims and Witnesses MARCH 2009 LAWRENCE WASDEN Attorney General Criminal Law Division Special Prosecutions Unit Telephone: (208) 332-3096 Fax: (208)

More information

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT S 65/00 REVISED EDITION 2007 B.L.R.O. 3/2007 CAP. 194] LAWS OF BRUNEI Computer Misuse [2007 Ed. p. 1 LAWS OF BRUNEI REVISED EDITION 2007 CHAPTER 194 COMPUTER

More information

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised

More information

CAUSE NO. THE STATE OF TEXAS IN THE 49th DISTRICT COURT ZAPATA COUNTY, TEXAS

CAUSE NO. THE STATE OF TEXAS IN THE 49th DISTRICT COURT ZAPATA COUNTY, TEXAS CAUSE NO. STATE S EXHIBIT #1 THE STATE OF TEXAS IN THE 49th DISTRICT COURT VS. OF ZAPATA COUNTY, TEXAS PLEA OF GUILTY, ADMONISHMENTS, VOLUNTARY STATEMENTS, WAIVERS, STIPULATION & JUDICIAL CONFESSION (Defendant

More information

IAC 7/2/08 Parole Board[205] Ch 11, p.1. CHAPTER 11 PAROLE REVOCATION [Prior to 2/22/89, Parole, Board of[615] Ch 7]

IAC 7/2/08 Parole Board[205] Ch 11, p.1. CHAPTER 11 PAROLE REVOCATION [Prior to 2/22/89, Parole, Board of[615] Ch 7] IAC 7/2/08 Parole Board[205] Ch 11, p.1 CHAPTER 11 PAROLE REVOCATION [Prior to 2/22/89, Parole, Board of[615] Ch 7] 205 11.1(906) Voluntary termination of parole. Any voluntary termination of parole should

More information

2016 -- H 7542 S T A T E O F R H O D E I S L A N D

2016 -- H 7542 S T A T E O F R H O D E I S L A N D LC00 01 -- H S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO PUBLIC UTILITIES AND CARRIERS - DUTIES OF UTILITIES AND CARRIERS Introduced By: Representatives

More information

HP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act

HP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act PLEASE NOTE: Legislative Information cannot perform research, provide legal advice, or interpret Maine law. For legal assistance, please contact a qualified attorney. Be it enacted by the People of the

More information

WEST VIRGINIA STATE POLICE LEGAL SERVICES

WEST VIRGINIA STATE POLICE LEGAL SERVICES WEST VIRGINIA STATE POLICE LEGAL SERVICES 2011 Legislative Update Laws Passed that Affect Law Enforcement The following information represents both synopsis and full-text of laws passed during the 2011

More information

COMPUTER MISUSE AND CYBERCRIME ACT

COMPUTER MISUSE AND CYBERCRIME ACT COMPUTER MISUSE AND CYBERCRIME ACT Act 22 of 2003 9 August 2003 ARRANGEMENT OF SECTIONS 1. Short title 2. Interpretation PART I PRELIMINARY PART II OFFENCES 3. Unauthorised access to computer data 4. Access

More information

San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX

San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX Identity Theft Packet SAPD case # Assigned Detective: The San Antonio Police

More information

Purpose of the Victim/Witness Unit

Purpose of the Victim/Witness Unit Purpose of the Victim/Witness Unit The Victim/Witness Assistance Division of the Lake County State s Attorney s Office was formed to serve the needs of people like you. The division is meant to ensure

More information

51ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, 2013

51ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, 2013 SENATE BILL 1ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, INTRODUCED BY Joseph Cervantes 1 ENDORSED BY THE COURTS, CORRECTIONS AND JUSTICE COMMITTEE AN ACT RELATING TO CIVIL ACTIONS; CLARIFYING

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

Montana Elder and Persons With Developmental Disabilities Abuse Prevention Act

Montana Elder and Persons With Developmental Disabilities Abuse Prevention Act Montana Elder and Persons With Developmental Disabilities Abuse Prevention Act 52-3-801. Short title. This part may be cited as the "Montana Elder and Persons With Developmental Disabilities Abuse Prevention

More information

BILL ANALYSIS. C.S.S.B. 1309 By: Wentworth Civil Practices Committee Report (Substituted) BACKGROUND AND PURPOSE

BILL ANALYSIS. C.S.S.B. 1309 By: Wentworth Civil Practices Committee Report (Substituted) BACKGROUND AND PURPOSE BILL ANALYSIS C.S.S.B. 1309 By: Wentworth Civil Practices Committee Report (Substituted) BACKGROUND AND PURPOSE C.S.S.B. 1309 gives the State of Texas civil remedies to be invoked by the attorney general

More information

UNDERSTANDING THE CRIMINAL JUSTICE SYSTEM Anne Benson

UNDERSTANDING THE CRIMINAL JUSTICE SYSTEM Anne Benson UNDERSTANDING THE CRIMINAL JUSTICE SYSTEM Anne Benson What is the Criminal Justice System? The criminal justice system is the system we have in the United States for addressing situations where it is believed

More information

General District Courts

General District Courts General District Courts To Understand Your Visit to Court You Should Know: It is the courts wish that you know your rights and duties. We want every person who comes here to receive fair treatment in accordance

More information

BILL ANALYSIS. Senate Research Center C.S.S.B. 1309 By: Wentworth Jurisprudence 4/5/2007 Committee Report (Substituted)

BILL ANALYSIS. Senate Research Center C.S.S.B. 1309 By: Wentworth Jurisprudence 4/5/2007 Committee Report (Substituted) BILL ANALYSIS Senate Research Center C.S.S.B. 1309 By: Wentworth Jurisprudence 4/5/2007 Committee Report (Substituted) AUTHOR'S / SPONSOR'S STATEMENT OF INTENT C.S.S.B. 1309 gives the State of Texas civil

More information

Chapter 153. Violations and Fines 2013 EDITION. Related Laws Page 571 (2013 Edition)

Chapter 153. Violations and Fines 2013 EDITION. Related Laws Page 571 (2013 Edition) Chapter 153 2013 EDITION Violations and Fines VIOLATIONS (Generally) 153.005 Definitions 153.008 Violations described 153.012 Violation categories 153.015 Unclassified and specific fine violations 153.018

More information

Prepared by: Hon. Duncan W. Keir, Judge U.S. Bankruptcy Court for the District of Maryland. and. Richard L. Wasserman, Esq.

Prepared by: Hon. Duncan W. Keir, Judge U.S. Bankruptcy Court for the District of Maryland. and. Richard L. Wasserman, Esq. Memorandum Summarizing Procedures With Respect To Removal Of Bankruptcy-Related State Court Actions To The United States District Court And United States Bankruptcy Court In Maryland Prepared by: Hon.

More information

Domestic Violence and Protective Orders

Domestic Violence and Protective Orders Domestic Violence and Protective Orders Domestic violence (also called family violence) is a pattern of behavior and a method of control which results in physical injury or places one in reasonable apprehension

More information

Presented by: Bronson Tucker General Counsel TJCTC [email protected]

Presented by: Bronson Tucker General Counsel TJCTC bt16@txstate.edu Presented by: Bronson Tucker General Counsel TJCTC [email protected] This presentation will cover topics such as: Magistrate Warnings of persons in custody, Bond Conditions, Reasonable Suspicion/ Probable

More information

20-28.3. Seizure, impoundment, forfeiture of motor vehicles for offenses involving impaired driving while license revoked or without license and insurance, and for felony speeding to elude arrest. (a)

More information

INTRODUCTION DO YOU NEED A LAWYER?

INTRODUCTION DO YOU NEED A LAWYER? INTRODUCTION The purpose of this handbook is to provide answers to some very basic questions that inmates or inmates families might have regarding the processes of the criminal justice system. In no way

More information

California s Alternative Sentencing Law for Veterans and Members of the U.S. Military

California s Alternative Sentencing Law for Veterans and Members of the U.S. Military California s Alternative Sentencing Law for Veterans and Members of the U.S. Military You re a veteran, or maybe you re still in the military. But now you re looking at time in county jail or state prison.

More information

Please note that this Act can also be viewed online on the Illinois General Assembly website at www.ilga.gov.

Please note that this Act can also be viewed online on the Illinois General Assembly website at www.ilga.gov. Please note that this Act can also be viewed online on the Illinois General Assembly website at www.ilga.gov. SCHOOLS (105 ILCS 10/) Illinois School Student Records Act. (105 ILCS 10/1) (from Ch. 122,

More information

GOVERNMENT PROSECUTIONS AND QUI TAM ACTIONS

GOVERNMENT PROSECUTIONS AND QUI TAM ACTIONS GOVERNMENT PROSECUTIONS AND QUI TAM ACTIONS DISTRICT OF COLUMBIA OFFICIAL CODE DIVISION I. GOVERNMENT OF DISTRICT. TITLE 2. GOVERNMENT ADMINISTRATION. CHAPTER 3B. OTHER PROCUREMENT MATTERS. SUBCHAPTER

More information

SUPREME COURT OF PENNSYLVANIA DOMESTIC RELATIONS PROCEDURAL RULES COMMITTEE RECOMMENDATION 140

SUPREME COURT OF PENNSYLVANIA DOMESTIC RELATIONS PROCEDURAL RULES COMMITTEE RECOMMENDATION 140 SUPREME COURT OF PENNSYLVANIA DOMESTIC RELATIONS PROCEDURAL RULES COMMITTEE RECOMMENDATION 140 CHAPTER 1950. ACTIONS PURSUANT TO THE PROTECTION OF VICTIMS OF SEXUAL VIOLENCE OR INTIMIDATION ACT Rule 1951.

More information

Morgan County Prosecuting Attorney Debra MH McLaughlin

Morgan County Prosecuting Attorney Debra MH McLaughlin Morgan County Prosecuting Attorney Debra MH McLaughlin Directions: From Fairfax Street Entrance, Enter Main Door, turn Right through door, up the narrow staircase. Office is at top of steps. (Old Circuit

More information

4. Laying of orders and regulations before Houses of Oireachtas.

4. Laying of orders and regulations before Houses of Oireachtas. Number 27 of 2000 ELECTRONIC COMMERCE ACT, 2000 ARRANGEMENT OF SECTIONS PART 1 Preliminary and General Section 1. Short title and commencement. 2. Interpretation. 3. Regulations. 4. Laying of orders and

More information

Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000

Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000 Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000 Act No. 3 of 2000 Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000 Section TABLE OF PROVISIONS PART 1 PRELIMINARY Page 1 Short title.....................................................

More information

Senate Bill No. 38 Committee on Transportation and Homeland Security

Senate Bill No. 38 Committee on Transportation and Homeland Security Senate Bill No. 38 Committee on Transportation and Homeland Security CHAPTER... AN ACT relating to criminal records; creating the Records and Technology Division of the Department of Public Safety; enumerating

More information

Federal Criminal Court

Federal Criminal Court No person... shall be compelled in any criminal case to be a witness against himself nor be deprived of life, liberty or property without due process of law. Amendment V. Defendant may not be compelled

More information

NC General Statutes - Chapter 15A Article 48 1

NC General Statutes - Chapter 15A Article 48 1 SUBCHAPTER IX. PRETRIAL PROCEDURE. Article 48. Discovery in the Superior Court. 15A-901. Application of Article. This Article applies to cases within the original jurisdiction of the superior court. (1973,

More information

Community Legal Information Association of PEI, Inc. Sexual Assault

Community Legal Information Association of PEI, Inc. Sexual Assault Community Legal Information Association of PEI, Inc. Sexual Assault As an adult in Canada, you have the right to choose when or if you engage in sexual activity. Sexual activity without your consent is

More information

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench Glossary of Terms The Glossary of Terms defines some of the most common legal terms in easy-tounderstand language. Terms are listed in alphabetical order. A B C D E F G H I J K L M N O P Q R S T U V W

More information

CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION 12650-12656

CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION 12650-12656 CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION 12650-12656 12650. (a) This article shall be known and may be cited as the False Claims Act. (b) For purposes of this article: (1) "Claim" includes any

More information

MODEL CRIMINAL DEFENSE MENTORING PROGRAM Utah State Bar New Lawyer Training Program

MODEL CRIMINAL DEFENSE MENTORING PROGRAM Utah State Bar New Lawyer Training Program MODEL CRIMINAL DEFENSE MENTORING PROGRAM Utah State Bar New Lawyer Training Program The following is submitted as a Model Mentoring Plan for the criminal defense practice field. It was prepared by an experienced

More information

V 11.01.14. Seven areas are covered by this Notice:

V 11.01.14. Seven areas are covered by this Notice: Mediatti Broadband Communications, your local cable operator ( MBC ) is providing this Subscriber Privacy Notice ( Notice ) to inform you of its practices regarding personally identifiable information

More information

Chapter 13 Procedure (Last Updated: May 13, 2013) Chapter 13.A Speedy Trial Chapter 13.B Recorded Interrogations

Chapter 13 Procedure (Last Updated: May 13, 2013) Chapter 13.A Speedy Trial Chapter 13.B Recorded Interrogations Chapter 13 Procedure (Last Updated: May 13, 2013) Chapter 13.A Speedy Trial Chapter 13.B Recorded Interrogations Chapter 13.A Procedure Speedy Trial (Last Updated: May 13, 2013) 29-1207. Trial within six

More information

BASIC CRIMINAL LAW. Joe Bodiford. Overview of a criminal case Presented by: Board Certified Criminal Trial Lawyer

BASIC CRIMINAL LAW. Joe Bodiford. Overview of a criminal case Presented by: Board Certified Criminal Trial Lawyer BASIC CRIMINAL LAW Overview of a criminal case Presented by: Joe Bodiford Board Certified Criminal Trial Lawyer www.floridacriminaldefense.com www.blawgger.com THE FLORIDA CRIMINAL PROCESS Source: http://www.fsu.edu/~crimdo/cj-flowchart.html

More information

SEALING OF RECORDS. Conviction / Acquittal / Dismissal CLARK COUNTY DISTRICT ATTORNEY S OFFICE. DAVID ROGER District Attorney

SEALING OF RECORDS. Conviction / Acquittal / Dismissal CLARK COUNTY DISTRICT ATTORNEY S OFFICE. DAVID ROGER District Attorney SEALING OF RECORDS Conviction / Acquittal / Dismissal CLARK COUNTY DISTRICT ATTORNEY S OFFICE DAVID ROGER District Attorney NOTICE: This Website contains instructions for using the Clark County District

More information

As used in this chapter, the following words shall, unless the context clearly requires otherwise, have the following

As used in this chapter, the following words shall, unless the context clearly requires otherwise, have the following Page 1 Massachusetts General Laws Annotated Currentness Part IV. Crimes, Punishments and Proceedings in Criminal Cases (Ch. 263-280) Title II. Proceedings in Criminal Cases (Ch. 275-280) Chapter 278A.

More information

S. ll IN THE SENATE OF THE UNITED STATES A BILL

S. ll IN THE SENATE OF THE UNITED STATES A BILL TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information

More information

Chapter 813. Driving Under the Influence of Intoxicants 2013 EDITION. Title 59 Page 307 (2013 Edition)

Chapter 813. Driving Under the Influence of Intoxicants 2013 EDITION. Title 59 Page 307 (2013 Edition) Chapter 813 2013 EDITION Driving Under the Influence of Intoxicants GENERAL PROVISIONS 813.010 Driving under the influence of intoxicants; penalty 813.011 Felony driving under the influence of intoxicants;

More information

United States Court of Appeals

United States Court of Appeals United States Court of Appeals FOR THE EIGHTH CIRCUIT No. 09-1408 United States of America, * * Appellee, * * Appeal from the United States v. * District Court for the * District of Minnesota. Aaron Jay

More information

Anti-Bribery and Books & Records Provisions of. The Foreign Corrupt Practices Act. Current through Pub. L. 105-366 (November 10, 1998)

Anti-Bribery and Books & Records Provisions of. The Foreign Corrupt Practices Act. Current through Pub. L. 105-366 (November 10, 1998) [As of July 22, 2004] Anti-Bribery and Books & Records Provisions of The Foreign Corrupt Practices Act Current through Pub. L. 105-366 (November 10, 1998) UNITED STATES CODE TITLE 15. COMMERCE AND TRADE

More information

Criminal Justice Sector and Rule of Law Working Group

Criminal Justice Sector and Rule of Law Working Group Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions

More information

Family Educational Rights Privacy (FERPA) Act

Family Educational Rights Privacy (FERPA) Act F l o r i d a H o u s e o f R e p r e s e n t a t i v e s Family Educational Rights Privacy (FERPA) Act EDUCATION FACT SHEET 2010-11 What is the Family Educational Rights Privacy Act? The Family Educational

More information

EXPUNCTIONS IN TEXAS

EXPUNCTIONS IN TEXAS EXPUNCTIONS IN TEXAS Texas Young Lawyers Association Family Law Committee P.O. Box 12487, Capitol Station Austin, TX 78711-2487 (800) 204-2222 Ext. 1800 For additional family law resources, visit www.tyla.org.

More information

Troy Cablevision, Inc. Subscriber Privacy Policy

Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. ( Troy Cable ) is committed to protecting and securely maintaining our customers privacy. The following privacy policy applies to

More information

A. Asset Forfeiture Laws in Colorado

A. Asset Forfeiture Laws in Colorado Re: ASSET FORFEITURE REFORM Included: (a) Brief summary of current asset forfeiture laws in Colorado (b) History of asset forfeiture reform in Colorado (1992-legislation) (c) Proposed asset forfeiture

More information

Chapter 3. Justice Process at the County Level. Brooks County Courthouse

Chapter 3. Justice Process at the County Level. Brooks County Courthouse Chapter 3 Justice Process at the County Level Brooks County Courthouse Chapter Three: Judice Process at the County Level Developmental Assets: Life Skills: TEKS: Objectives: 10. Safety 30. Responsibility

More information

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing

More information

Comcast Cable. Law Enforcement Handbook

Comcast Cable. Law Enforcement Handbook Comcast Cable Law Enforcement Handbook Version: September, 2007 Comcast Legal Response Center Table of Contents Introduction... 3 Comcast Digital Voice Telephone Service... 4 Comcast High Speed Internet

More information

CRIME VICTIM ASSISTANCE STANDARDS

CRIME VICTIM ASSISTANCE STANDARDS V I C T I M S E R V I C E S D I V I S I O N Texas Department of Criminal Justice Victim Services Division CRIME VICTIM ASSISTANCE STANDARDS Developed and distributed by the The Texas Crime Victim Clearinghouse

More information

HIPAA Notice of Privacy Practices

HIPAA Notice of Privacy Practices This notice describes how medical information about you may be used and disclosed and how you can get access to this information. Please review this notice carefully. This practice is required by law to

More information

IN THE COURT OF APPEALS OF TENNESSEE AT KNOXVILLE

IN THE COURT OF APPEALS OF TENNESSEE AT KNOXVILLE IN THE COURT OF APPEALS OF TENNESSEE AT KNOXVILLE FILED June 24, 1999 Cecil Crowson, Jr. Appellate Court Clerk RONALD D. BOWLIN, C/A NO. 03A01-9807-CV-00243 Plaintiff-Appellee, APPEAL AS OF RIGHT FROM

More information

What is DOMESTIC VIOLENCE?

What is DOMESTIC VIOLENCE? What is DOMESTIC VIOLENCE? Domestic violence is a pattern of control used by one person to exert power over another. Verbal abuse, threats, physical, and sexual abuse are the methods used to maintain power

More information

DOMESTIC VIOLENCE Guidelines on Police Response Procedures in Domestic Violence Cases

DOMESTIC VIOLENCE Guidelines on Police Response Procedures in Domestic Violence Cases DOMESTIC VIOLENCE Guidelines on Police Response Procedures in Domestic Violence Cases Issued October 1991 Revised November 1994 Introduction. These general guidelines consolidate the police response procedures

More information

Vermont Legislative Council

Vermont Legislative Council Vermont Legislative Council 115 State Street Montpelier, VT 05633-5301 (802) 828-2231 Fax: (802) 828-2424 MEMORANDUM To: From: House Judiciary Committee Erik FitzPatrick Date: February 19, 2015 Subject:

More information

Part 2 Peace Officer Training and Certification Act

Part 2 Peace Officer Training and Certification Act Part 2 Peace Officer Training and Certification Act 53-6-201 Short title. This part is known as the "Peace Officer Training and Certification Act." Enacted by Chapter 234, 1993 General Session 53-6-202

More information

GETTING THROUGH THE CRIMINAL JUSTICE SYSTEM

GETTING THROUGH THE CRIMINAL JUSTICE SYSTEM GETTING THROUGH THE CRIMINAL JUSTICE SYSTEM ARREST An ARREST starts the criminal justice process. It is called an arrest whether the police officer hands you a summons or puts handcuffs on you and takes

More information

APPEARANCE, PLEA AND WAIVER

APPEARANCE, PLEA AND WAIVER Guide to Municipal Court What Types of Cases Are Heard in Municipal Court? Cases heard in municipal court are divided into four general categories: Violations of motor vehicle and traffic laws Violations

More information

Right to Financial Privacy Act

Right to Financial Privacy Act Background The Right to Financial Privacy Act of 1978 was enacted to provide the financial records of financial institution customers a reasonable amount of privacy from federal government scrutiny. The

More information

Chapter 15 Criminal Law and Procedures

Chapter 15 Criminal Law and Procedures Chapter 15 Criminal Law and Procedures Chapter Outline 1. Introduction 2. What Is a Crime? 3. Elements of Criminal Liability 4. Types of Crimes 5. Cyber Crime 6. Constitutional Safeguards 7. Criminal Procedures

More information

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI ST. JOSEPH DIVISION. v. Case No :09-00157-01,03,05/08-CR-W-SOW

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI ST. JOSEPH DIVISION. v. Case No :09-00157-01,03,05/08-CR-W-SOW IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI ST. JOSEPH DIVISION UNITED STATES OF AMERICA, Plaintiff, v. Case No :09-00157-01,03,05/08-CR-W-SOW GARLAND HANKINS, STACEY M. WALKER,

More information