Chapter 12 Legal Issues Mens Rea and Criminal Recklessness
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following best describes the role of 'mens rea' in criminal law?

  • It outlines the procedures for arresting and detaining individuals suspected of committing a crime.
  • It refers to the specific actions that constitute the physical component of a crime, regardless of intent.
  • It defines the monetary penalties associated with different classes of felonies.
  • It is a required mental state needed to commit a crime. (correct)

In the context of criminal law, what distinguishes recklessness from purely accidental actions?

  • Recklessness is determined by the severity of the outcome, while accidental actions are not.
  • Accidental actions are prosecuted more severely due to their unforeseen consequences.
  • Accidental actions are subject to criminal prosecution if they result in significant damages, regardless of intent.
  • Recklessness involves a conscious disregard for potential harm, whereas accidental actions do not. (correct)

How does the Wisconsin first-degree reckless homicide statute define the required 'mens rea'?

  • Causing death through actions that demonstrate a minor lapse in judgment.
  • Planning to cause death without explicitly stating the intention.
  • Committing actions that accidentally lead to the death of another person.
  • Recklessly causing death with utter disregard for human life. (correct)

Which scenario exemplifies a situation where the 'mens rea' of recklessness would most likely be applied?

<p>Driving well above the speed limit in a residential area, resulting in a fatal accident. (B)</p> Signup and view all the answers

What legal conclusion can be made about acts considered purely accidental regarding criminal behavior?

<p>They do not satisfy the required mental element for criminal prosecution. (C)</p> Signup and view all the answers

In what way does the legal treatment of driving under the influence (DUI) differ from crimes requiring a specific 'mens rea'?

<p>DUI is a crime regardless of the driver's mental state, unlike crimes requiring a specific 'mens rea'. (A)</p> Signup and view all the answers

Considering the Wisconsin statutes mentioned, which element is crucial in distinguishing between first-degree murder and first-degree reckless homicide?

<p>The presence or absence of intent to kill. (A)</p> Signup and view all the answers

If a person is aware that their actions could cause harm but consciously chooses to ignore the risk, what level of 'mens rea' is most likely demonstrated?

<p>Recklessness. (D)</p> Signup and view all the answers

In the context of cybercrime, what is the primary challenge that jurisdictional issues pose for law enforcement?

<p>The ease with which cybercriminals can operate across geographical boundaries, complicating investigations and evidence collection. (C)</p> Signup and view all the answers

How does the 'detrimental effects' test, as established in Strassheim v. Daily, primarily determine whether a state can exercise jurisdiction over a person who committed crimes outside of that state?

<p>By examining the intent of the defendant and the consequences of their actions within the state. (D)</p> Signup and view all the answers

Concerning cybercrime cases, what makes jurisdiction a particularly challenging issue?

<p>Geographical boundaries do not effectively limit computer networks, allowing cybercriminals to easily operate across many states and countries. (D)</p> Signup and view all the answers

Which aspect of the 'detrimental effects' test considers the direct link between an action and its harmful outcome within a state?

<p>Whether the acts were the actual cause of detrimental effects within the state. (B)</p> Signup and view all the answers

Given the principles of personal jurisdiction, under what circumstances can a state court typically exercise authority over individuals?

<p>When the act occurred within the state. (A)</p> Signup and view all the answers

In cases of criminal law, when does personal jurisdiction become relevant, particularly concerning acts committed across state lines?

<p>When criminal acts are committed in several different states or affect residents in many different states. (C)</p> Signup and view all the answers

What three key elements constitute the 'detrimental effects' test used by the U.S. Supreme Court to determine if a state can assert jurisdiction over crimes committed outside its borders?

<p>The occurrence of the act outside the state, the presence of detrimental effects within the state, and the act as the actual cause of those effects. (C)</p> Signup and view all the answers

Considering computer networks transcend geographical boundaries, what specific challenge does this pose for law enforcement in cybercrime investigations regarding the identification and apprehension of criminals?

<p>The difficulty in determining the precise location from which a cybercrime was launched and in collecting evidence across different jurisdictions. (C)</p> Signup and view all the answers

Why are Nigerian scams particularly challenging for courts to address?

<p>The perpetrators often operate outside the jurisdiction where the victims reside, complicating legal proceedings. (B)</p> Signup and view all the answers

What is the key characteristic that defines '419 scams' or 'advance fee fraud' schemes?

<p>Victims are asked to advance funds with the promise of a larger reward, only to find the underlying transaction is fraudulent. (C)</p> Signup and view all the answers

How has the evolution of technology changed the landscape of '419' or imposter scams?

<p>Scammers can now target a wider audience more easily and quickly through email and text messages. (C)</p> Signup and view all the answers

What is the primary deceptive tactic used in modern imposter scams to convince victims to send money?

<p>Impersonating a trusted authority figure to create a sense of urgency and obligation. (A)</p> Signup and view all the answers

According to the content, what is the most likely outcome for a victim who advances funds in a Nigerian or imposter scam?

<p>The victim will be further entangled in the scam, leading to additional financial losses. (B)</p> Signup and view all the answers

Considering the evolution of '419' scams, what makes them particularly insidious in the digital age?

<p>Their ability to adapt and exploit vulnerabilities in new technologies and communication channels. (C)</p> Signup and view all the answers

What is the significance of the reference to the '4-1-9' section of the Nigerian criminal code in the context of these scams?

<p>It demonstrates the scams' deep roots within the Nigerian criminal system, where they originated. (A)</p> Signup and view all the answers

Why are imposter scams difficult to prosecute when the perpetrators are operating outside the United States?

<p>Establishing jurisdiction and gathering evidence across international borders present significant legal and logistical challenges. (D)</p> Signup and view all the answers

Which scenario exemplifies a cybercrime where a computer is the target, rather than merely the tool?

<p>A group orchestrates a distributed denial-of-service (DDoS) attack against a company's servers. (D)</p> Signup and view all the answers

In the context of cybercrime legislation, why are federal laws likely to have a more significant impact than state laws?

<p>Cybercrime often transcends geographical and political boundaries, necessitating a unified legal approach at the federal level. (A)</p> Signup and view all the answers

Which of the following scenarios represents a situation where a computer serves primarily as a witness to a crime?

<p>A company's computerized record-keeping system contains evidence of fraudulent financial transactions conducted by its executives. (B)</p> Signup and view all the answers

What is the key distinction between a traditional crime committed using a computer and cybercrime?

<p>Cybercrimes involve the use of computers as a <em>medium</em> to commit a crime or target the computer itself, while traditional crimes merely use computers as a tool. (C)</p> Signup and view all the answers

Which action is the least likely to be classified as a cybercrime?

<p>Using a computer and printer to forge physical copies of valuable historical documents. (A)</p> Signup and view all the answers

Which of the following best describes the role of a computer in a Distributed Denial of Service (DDoS) attack?

<p>The computer serves as an unwitting participant, forming part of a botnet that overwhelms a target server. (D)</p> Signup and view all the answers

How does the concept of 'cyberstalking' fit into the broader framework of cybercrime?

<p>Cyberstalking represents a traditional crime facilitated or amplified through the use of electronic communication and online platforms. (A)</p> Signup and view all the answers

Which of the following is the least relevant consideration when determining whether an act constitutes a cybercrime versus a traditional crime involving a computer?

<p>The monetary value of the assets involved in the criminal activity. (D)</p> Signup and view all the answers

Which scenario would most likely be a violation of the federal Wiretap Act?

<p>An individual using a sophisticated device to intercept a neighbor's cellular phone calls in real-time, without any prior court authorization. (D)</p> Signup and view all the answers

An IT administrator discovers a sophisticated intrusion into the company's network. To identify the source, they deploy a tool that captures network packet headers in real-time. Which law governs the access to this transmission information?

<p>The Pen Register and Trap and Trace Statute (D)</p> Signup and view all the answers

A system administrator needs access to an employee's archived emails to investigate a potential data breach. Under what circumstances is accessing these emails permissible without violating the Electronic Communications Privacy Act (ECPA)?

<p>If the company obtains a valid court order or has the employee's consent, accessing the stored communications is permissible. (D)</p> Signup and view all the answers

A journalist is investigating a story and pays a hacker to intercept the real-time communications of a CEO without a court order. Which parties could potentially face legal consequences under the relevant federal laws?

<p>Both the journalist and the hacker could face consequences. (A)</p> Signup and view all the answers

A local police department wants to track the websites visited by a suspect in a kidnapping case in real-time. According to federal law, what steps must they take to legally obtain this information?

<p>They need to obtain a court order under the Pen Register and Trap and Trace Statute. (D)</p> Signup and view all the answers

An intelligence agency is monitoring international communications. They inadvertently intercept purely domestic communications. What legal restrictions apply to the use of those communications?

<p>The agency must minimize the retention and dissemination of inadvertently intercepted domestic communications to protect privacy. (B)</p> Signup and view all the answers

A disgruntled employee installs a keylogger on their supervisor's computer to gain access to performance reviews before they are officially released. Which law is the employee most likely violating?

<p>The Stored Wire and Electronic Communications and Transactional Records Access Act (C)</p> Signup and view all the answers

What is the primary distinction between the Wiretap Act and the Electronic Communications Privacy Act (ECPA)?

<p>The Wiretap Act governs real-time interception, while the ECPA governs access to stored communications. (D)</p> Signup and view all the answers

Given the interplay between federal and state jurisdictions in criminal procedure, which of the following scenarios BEST illustrates a permissible divergence in procedural rules?

<p>A state adopts a procedural rule that provides broader protections against self-incrimination than those guaranteed by the Fifth Amendment. (A)</p> Signup and view all the answers

A law enforcement agency concludes a complex fraud investigation implicating multiple individuals across different states. Which of the following actions represents the MOST appropriate next step in initiating the criminal process?

<p>The agency should present the findings to the relevant prosecutor(s) in the jurisdiction(s) where the alleged crimes occurred for review and charging decisions. (D)</p> Signup and view all the answers

A prosecutor possesses substantial evidence suggesting an individual's involvement in a crime, but also recognizes weaknesses in the case that could lead to acquittal. Considering prosecutorial discretion, what would be the MOST ethically sound approach for the prosecutor?

<p>Disclose all evidence, both inculpatory and exculpatory, to the defense and proceed only if convinced there is sufficient, admissible evidence to prove guilt beyond a reasonable doubt. (B)</p> Signup and view all the answers

In a state that utilizes both grand jury indictments and prosecutorial informations, under what circumstance is a grand jury indictment MOST likely to be required rather than an information?

<p>When the prosecutor requires the grand jury to subpoena reluctant witnesses to provide testimony under oath. (D)</p> Signup and view all the answers

A prosecutor decides to pursue charges against an individual based on evidence collected during a law enforcement investigation. Which factor would MOST significantly influence the prosecutor's decision to file a formal information or seek a grand jury indictment?

<p>The jurisdiction's legal requirements regarding the type of charges and the defendant's right to a grand jury. (C)</p> Signup and view all the answers

A state's criminal procedure law requires a grand jury indictment for all felony offenses punishable by more than ten years of imprisonment. If a prosecutor believes they have sufficient evidence to charge an individual with such a crime, what is the MOST appropriate course of action?

<p>Present the evidence to a grand jury, seeking an indictment to formally charge the individual. (A)</p> Signup and view all the answers

A law enforcement officer, during a lawful arrest for drunk driving, discovers a bag of cocaine in the suspect's pocket. This discovery leads to additional charges related to drug possession. How does the principle regarding the commencement of a criminal case apply in this scenario?

<p>The officer must present the evidence to the prosecutor, who will then decide whether to include the drug possession charge in the formal charging document. (C)</p> Signup and view all the answers

In a scenario where a prosecutor is considering charges against an individual, what BEST exemplifies an exercise of prosecutorial discretion that balances the interests of justice with resource constraints?

<p>Declining to prosecute a minor offense committed by a first-time offender to focus resources on more serious crimes. (C)</p> Signup and view all the answers

Flashcards

Mens Rea

The mental state required to commit a crime.

First-degree murder (WI)

Causing death with intent; a Class A felony in Wisconsin.

DUI (most states)

Operating a vehicle while impaired, regardless of mental state.

Purely Accidental Acts

Actions that are completely unintentional and without negligence.

Signup and view all the flashcards

Reckless Actions

Prosecuting actions performed with conscious disregard of harm.

Signup and view all the flashcards

First-degree reckless homicide (WI)

Causing death with utter disregard for human life; a Class B felony in Wisconsin.

Signup and view all the flashcards

Government Prosecution

The state needs to show the required mental state (mens rea) for the crime committed.

Signup and view all the flashcards

Showing of Recklessness

To consciously disregard whether or not harm could result from the actions.

Signup and view all the flashcards

Imposter Scams

Scams where criminals pose as someone else to trick you into sending money or sharing info.

Signup and view all the flashcards

Advance Fee Fraud

Fraudulent schemes that involve requests for upfront fees with promises of large returns.

Signup and view all the flashcards

Nigerian Scams

A type of advance fee fraud originating from Nigeria, promising large sums of money for assistance.

Signup and view all the flashcards

"419" Reference

Section of the Nigerian criminal code that addresses fraud schemes (used to name Nigerian scams).

Signup and view all the flashcards

Spanish Prisoner Con

An early 1900s scam similar to Nigerian scams, involving promises of wealth for assistance.

Signup and view all the flashcards

Solicitation Method

A common element in imposter and advance fee fraud schemes conducted via email or text.

Signup and view all the flashcards

Victim's Loss

Victims lose money by advancing their own funds, believing in the fraudulent transactions.

Signup and view all the flashcards

Jurisdiction Issues

The difficulty in prosecuting cybercriminals across different countries.

Signup and view all the flashcards

Personal Jurisdiction

The authority of a court to hear a case based on the location of the act or the parties involved.

Signup and view all the flashcards

Interstate Criminal Jurisdiction

When a criminal act happens in multiple states, or affects residents in many states.

Signup and view all the flashcards

Detrimental Effects Test

A legal test used to determine if a state can have jurisdiction over someone who committed a crime outside of the state.

Signup and view all the flashcards

Three Parts of the Detrimental Effects Test

  1. Act occurred outside the state. 2. Act had negative effects inside the state. 3. The act caused those effects.
Signup and view all the flashcards

Focus of Detrimental Effects Test

The intent of the defendant when committing the act, and the results of their actions in a specific state.

Signup and view all the flashcards

Jurisdiction via Detrimental Effects

A state court can have authority over someone outside the state if their actions caused harm inside the state.

Signup and view all the flashcards

Jurisdiction & Cybercrime

The issue of legal authority is extra tricky for crimes that happen online.

Signup and view all the flashcards

Challenges of Cybercrime Jurisdiction

Cybercrimes easily cross state and country lines, making it hard to investigate, identify criminals, and collect evidence.

Signup and view all the flashcards

Criminal Procedure Principles

Principles primarily derived from the U.S. Constitution, ensuring consistency across jurisdictions, though some rules vary by state and federal levels.

Signup and view all the flashcards

Criminal Investigation

The initial phase when law enforcement gathers evidence and investigates potential crimes.

Signup and view all the flashcards

Prosecutor

The official who reviews cases after investigation and decides whether to file charges.

Signup and view all the flashcards

Prosecutorial Discretion

The latitude a prosecutor has in deciding whether and what charges to bring against an individual.

Signup and view all the flashcards

Information (legal)

A written document filed in court by a prosecutor to formally accuse someone of a crime and begin the criminal process.

Signup and view all the flashcards

Grand Jury

A panel of citizens who review evidence and decide whether there is enough cause for an indictment.

Signup and view all the flashcards

Grand Jury Indictment

A formal accusation by a grand jury, alleging that there is enough evidence to bring criminal charges against someone.

Signup and view all the flashcards

Felony vs. Misdemeanor

A legal classification distinguishing between more serious crimes (felonies) and less serious ones (misdemeanors), impacting procedures.

Signup and view all the flashcards

Computer as Target

Crimes targeting computers, like DoS or viruses.

Signup and view all the flashcards

Computer as Witness

Computerized systems providing crime evidence.

Signup and view all the flashcards

Cybercrimes

Crimes using computers, or targeting them.

Signup and view all the flashcards

Forgery Example

Using a computer for forgery.

Signup and view all the flashcards

Cybercrime Examples

Cyberstalking, identity theft, phishing.

Signup and view all the flashcards

Denial of Service (DoS)

Attacks that disrupt a network's normal traffic by overwhelming it with a flood of incoming messages.

Signup and view all the flashcards

Distributed Denial of Service (DDoS)

A type of DoS attack where the attack comes from many different sources.

Signup and view all the flashcards

Federal Cyber Laws

Federal laws impacting cybercrime across state/national borders.

Signup and view all the flashcards

Interception of Communications Laws Definition

Federal laws that regulate the use of eavesdropping technologies and the interception of communications.

Signup and view all the flashcards

Federal Wiretap Act (1968)

Prohibits real-time interception of wire, oral, or electronic communications content without a court order.

Signup and view all the flashcards

Communications Covered by Wiretap Act

Email, radio communications, data transmissions, and telephone calls.

Signup and view all the flashcards

Pen Register and Trap and Trace Statute

Governs access to the real-time interception of headers, logs, and other transmission information.

Signup and view all the flashcards

Electronic Communications Privacy Act (ECPA)

Regulates access to stored electronic communications, including both content and transmission information.

Signup and view all the flashcards

ECPA Governs Access To:

Access to the contents of stored communications and transmission data.

Signup and view all the flashcards

Wiretap Act Focus

Contents of communication intercepted in real time.

Signup and view all the flashcards

Pen Register Focus

Headers, logs, and other transmission information intercepted in real time.

Signup and view all the flashcards

Study Notes

  • Criminal law defines unacceptable behavior, created by federal and state governments.
  • Tort law addresses wrongful acts causing harm, enabling individuals to sue.
  • The chapter focuses on how computers are involved in cybercrime and tort activities.
  • Criminal and tort law actions can sometimes be carried out against the same individual for the same actions.

General Criminal Law Concepts

  • Cybercrimes are instances that involve the internet or computers as mediums for criminal activity.
  • Crimes like computer trespass are prosecuted using existing laws extended to new tech.
  • Federal judges sentence computer hackers and those posting illicit videos to prison.
  • Hacking groups may be charged with website hijacking.
  • Cyberextortion involves attempting to extort companies through threats like spam messages.
  • A crime violates society's code of conduct.
  • The American legal system is based largely on English common law, with the U.S. Constitution as the main source of law.
  • Congress and state have laws for criminal offenses.
  • Federal government prosecutes federal law violations, while state governments handle state law.

Main Principles of Criminal Law

  • Criminal law seeks deterrence through punishment and rehabilitation, differing from civil law's compensation for injuries.
  • Substantive criminal law defines conduct constituting a crime and establishes penalties.
  • Governments can specify criminal penalties in the same statute that defines a crime or in a separate penalty statute.
  • Wrongful conduct is in two basic types: acts universally wrong and acts wrong because they are prohibited.
  • "Mala in se" refers to conduct inherently wrong like murder and rape.
  • "Mala prohibita" defines conduct society prohibits, such intellectual property and traffic law violations.
  • Cybercrimes often fall under mala prohibita.
  • Crimes are grouped into misdemeanors (less severe, punishable by up to 1 year in prision) and felonies (more serious, punishable by over a year in prision).
  • Jurisdictions can prosecute crimes as either a misdemeanor or a felony based on circumstances.

Elements of a Crime

  • Criminal law requires a guilty mind ("mens rea") alongside the criminal act ("actus reus"), and conduct harms society.
  • A government must prove "mens rea", "actus reus", and causation to show a crime.
  • "Mens rea" refers to a person's intent to commit a crime, requiring knowing, intentional, or reckless engagement.
  • "Actus reus" is the wrongful act, and must be voluntary.
  • A wrongful act also covers the failure to act when there's a responsibility to do so.

Jurisdiction

  • Courts can only hear cases within their jurisdiction which is the authority to hear, which include:
  • Subject matter: the power of a court to decide certain cases.
  • Personal: the ability to exercise power over a defendant.
  • Federal courts have jurisdiction over federal laws and disputes between citizens of different states.
  • State courts decide cases about state laws or actions within their boundaries.
  • State courts exercise personal jurisdiction over those committing acts within the state.
  • The "detrimental effects" test determines if a state can have jurisdiction over a person who committed crimes outside of the state provided that their acts caused harm within the state
  • Cybercrimes and jurisdiction is challenging, as the internet crosses many geographic boundaries.
  • International cooperation, such as the Council of Europe Convention on Cybercrime, is essential for cybercrime investigations.

Criminal procedure

  • Governs how governments prosecute individuals, ensuring due process.
  • Due process guarantees a fair and consistent process in the courts.
  • Criminal procedure safeguards defendants' constitutional rights.
  • Prosecutors play a critical role in deciding whether to press charges and file informations or get grand jury indictments.
  • The initial hearing (arraignment) begins the formal court process, informing the defendant of the charges and rights.
  • After arraignment, the defendant can enter a plea of guilty, not guilty, or nolo contendere.
  • After the arraignment, the prosecution and the defendant attorneys will begin the discovery process where each side releases evidence.
  • The government bears the highest burden of proof where its expected to prove someone's guilt beyond a reasonable doubt
  • Punishments can include jail time, probation, financial penalties, or even death sentences.

Common Criminal Laws Used in Cyberspace

Electronic devices have four roles in crime, these are:

  • Used to Commit a crime
  • Facilitate a crime
  • are the Target of the crime
  • are a witness Cybercrimes use computers as a medium or target. Federal laws have the most significant impact due to the internet's global reach. Computer Fraud and Abuse Act (CFAA) passed in 1984, identifies computer crimes as distinct offenses, providing both criminal and civil penalties. Congress addressed computer-related offenses in a single act and limited the scope of protected computers to interstate and foreign commerce. Under the CFAA essentially any computer connected to the internet is a protected computer because the internet facilitates commerce between different states. CFAA treats protected computers as crime victim.

Computer trespass or intrusion

  • The CFAA is the main federal law addressing cybercrime
  • Some laws such as the CFAA expand definition to include computers used in interstate commerce
  • State laws many also have computer trespass statutes that prohibit unauthorized access to computer systems or networks
  • Many states consider intentionally entering a computer network without permission a crime
  • Most trespass statutes don't address computer tampering or injection of viruses

Theft of information

  • Theft of information via computer networks is on the rise in financial of personal data
  • Financial gain is the motive for the crimes
  • The 1998 Identity Theft and Assumption Deterrence Act makes identity theft a federal crime
  • Investigations are lead by the U.S. Secret Service, FBI, U.S. Postal Inspection Service, and Social Security Administration's Office of the Inspector General

Interception of Communications Laws

  • Laws forbid eavesdropping technologies without a court order.
  • Communications include email, radio, electronic communications, data transmission, and telephone calls.
  • The Wiretap Act governs real-time interception of communications. -Communications covered include email, radio communications, data transmissions, and telephone calls.
  • The Electronic Communications Privacy Act (ECPA; 1986) the right to govern access to communications.
  • The ECPA governs data transmissions and access to communications content.

Spam and Phishing Laws

  • The CAN-SPAM Act covers unsolicited commercial email messages
  • Spam is unsolicited electronic junk mail
  • The CAN-SPAM Act has both civil and criminal provisions where the US department of Justice can prosecute hackers who use illegal email.
  • The FTC enforces the civil pro visions of the CAN-SPAM Act and the same way they enforce unfair trade.
  • The Act also details criminal provisions and penalties such as for accessing another's computer without permission to send spam

Cybersquatting

  • Cybersquatting involves bad-faith registration of domain names that are trademarks.
  • The Anti-Cybersquatting Consumer Protection Act (ACPA) protects trademarks names.
  • To prove cybersquatting, the plaintiff must show that it was done in bad faith, that their conduct was done in bad faith, and with the intention to profit from the registration.

Malicious Acts

Common acts consist of malware, worms, viruses, and Trojan horses that can be prosecured under the CFAA Cyberstalking: the use of the internet to stalk another in threatening way

  • State laws also tackle traditional stalking and cyberstalking in addition to:
  • The Telephone Harrassment Act
  • The Interstate Stalking and Prevention Act -The Interstate Communications Act

Well-Known Cybercrimes

  • The CFAA is the main act use for federal prosecution of cybercrime
  • The Morris worm and the Melissa virus are examples of some of the first illegal pieces of software on the web.

General Tort Law Concepts

  • A tort is a wrongful act harming a person, leading to lawsuits for damages where injuries are reasonably recoved.
  • Tort law has evolved mainly form English common law
  • Tort law follows reasonable person standards
  • There are three types of torts: strict liability, negligance and intentional

Strict Liability and Negligence Torts

  • Strict liability means being responsible for actions regardless of intent or negligance (in unreasonably dangerous situations)
  • Negligence torts means a person is reliable for anyone that their consequences could forseeably hart, and a plaintiff has to show the defendent owed a duty of due care. -Duty of due is a person's obligation to avoid acts can harm others
  • Plainfiff must also show that the defendant breached the duty of due care, caused injures, and that those injures are compensable

Intentional Torts

  • Intentional torts are when the defendant intended to perform a harmful act
  • Intentional torts have many shared elements with crime
  • A common defense to an intentional tort is that the plaintiff consented to the harmful action.

Civil Procedure

  • Used when a plaintiff has to sue in a civil lawsuit to recover for tort injuries
  • Law in procedure vary from one jurisdiction to the other
  • Civil action begins when defendant files a complaint with the court containing a short statement of the incident and showing that the person who committed the incident is entitled to relief
  • This is initiated by filing the case to begin collecting the correct information which happens in stages
  • Plaintitt must make sure that the information is being asked for in a related topic

Electronic Discovery

  • Electronic data can be important evidence, especially with information being stored digitally
  • It used to be that the party trying to find the data had to make sure that it was presented correctly
  • E-Discovery allows you to recover the data in its native state
  • If a law suit arises, parties are obligated to preserve certain types of evidence, which in the modern day includes Electronically Stored Information or ESI
  • If someone destroys the evidence to avoid penalty and a court finds out then a party can sanction a party if its determined they where maliciously avoiding paying the penalties through not following these rules

Common Tort Law Actions in Cyberspace

  • "Cybertorts" are torts arising from online interactions.
  • Traditional tort law principles apply on online interactions.
  • Defamation is an intentional tort, occurs when someone speaks or publishes a false statement about another person that injures that person's reputation.
  • Libel covers written defamation
  • Slander includes oral defamation
  • A protection for these is truth because you can call people out on the internet, making it more easy to file a lawsuit
  • Defamation doesn't cover statements of opinion, and you do have responsibility as a content provider under section 230
  • One of the biggest cases of defamation is when someone posts photos online creating another issue

Intentional Infliction of Emotional Distress

  • IIED is known as the tort of outrage from actions being offensive to a reasonable person. To prove this a plaintiff must show:
  • The defendant acted intentionally or recklessly.
  • The defendant’s conduct was extreme and outrageous.
  • The defendant’s conduct caused the plaintiff severe emotional distress.

Trespass Torts

Trespass torts involve trespass on land and trespass to chattels which consists of personal property damages. Court have also extended these to online situations like spam.

Privacy Torts

  • Four are :
    • Intrusion into seclusion
    • Portrayal in a false light.
    • Appropriation of likeness or identity.
    • Public disclosure of private facts.
  • Courts recognize privacy rights in electronic communication and equipment.
  • Some questions that stay consistant with all privacy torts are:
    • a people having a true right of privacy in their use of the internet
    • people staying being responsible and not going to far
    • the court cases or laws that could apply in specific situations

Case Studies and Examples

  • A CAN-SPAM act case the US government tried in 2004 involved an LLC sending spam about phony diet products which resulted in over a million messages getting sent out and years of prison time
  • There were tons of websites that have defamed a-lot of people with "gossip websites"

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Explore the role of 'mens rea' in criminal law, focusing on recklessness and its implications. Distinguish recklessness from accidental actions, examining relevant statutes like Wisconsin's first-degree reckless homicide law. Analyze scenarios and legal conclusions regarding intent and criminal behavior.

More Like This

Use Quizgecko on...
Browser
Browser