StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

(computer Crime) - Case Study Example

Cite this document
Summary
His charges were the production, assisting, and taking part in the production of a visual representation of a minor engaging in sexually unequivocal behavior, and using materials that…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Study Case (computer Crime)
Read Text Preview

Extract of sample "(computer Crime)"

number Computer Crime Defendant was put into conviction in court and tried in the United s District Court. His charges were the production, assisting, and taking part in the production of a visual representation of a minor engaging in sexually unequivocal behavior, and using materials that were mailed, and shipped in interstates which violated the 18 U.S.C.S. § 2251(a); the sexual exploitation of children’s act (Jordan 120).The law protects children against sexual exploitation. In the case, the defendant is accused of possessing a computer hard drive, which contained visual depiction of a minor engaged in sexually explicit conduct, and a webcam.

According to the sexual exploitation of children’s act, the accused is guilty of transporting visual depiction a sexual misconduct against children. The accused had the duty to verify that the material transported was safe for use and free of any sexual exploitation. However, failure to observe this measure makes the defendant an accomplice to children sexual exploitation. Furthermore, the defendant claimed that the evidence used against him was insufficient to confirm him as guilty. The defendant states that the goods were part of a foreign interstate commerce.

The hard drives, as well as the webcam were probably made from Korea or China. However, he depended on his experience and assumed that they originated from Korea or China; thus, free of any sexual videos. It is unlawful to transport videos of sexual exploitation on children. The government requires that individuals trading in foreign computer hardware must be keen to avoid the sale of hardware with consisting of videos that sexually exploit children. The defendant is guilty as he failed to do his job professionally assuming that the place of origin of the hard drive and webcam were safe.

On the other, the defendant’s trial was delayed, which is against the sixth amendment. This amendment requires that an accused must face immediate trial when accused of criminal activities. Delayed trial is a violation of an accused sixth amendment’s right (Jordan 123). Nevertheless, violation of the defendant does not make him less guilty or free from the crime committed. The court was provided with adequate evidence to prove that the defendant was guilty. It is rightful for the court to convict the defendant to avoid similar carelessness in future.

In the case of Acevado, the defendant was sentenced following a panel of adjudicators’ trial of aiding, and producing and assisting in the creation of a visual portrayal of a minor taking part in explicit sexual behavior with materials shipped, mailed or transported in foreign commerce or expressway. Defendant appealed, affirming that the proof that the Government had with regard to the crimes law element - namely that the equipment were part of interstate or foreign commerce - depended on uncertain barred hearsay, which sullied his right to challenge in the Sixth Amendment.

Acevedo disputed that the testimony provided by the Governments witness concerning the source of the webcam and hard drive constituted barred hearsay as it depended on statements enclosed in the tags stuck to the same. The First Court of Appeals declared Defendants sentence, sticking that the tribunal court did not evidently state error in owning up the disputed testimony, since the eyewitness could have depended on his individual expert understanding slightly than the tags in shaping an judgment regarding the objects source.

As an inception matter, Acevedo challenge that the appraisal is acceptable since he voiced a Confrontation Clause case during his Rule motion. Conversely, the appropriate typical of evaluation is plain fault given that Acevedo botched to contemporaneously oppose to the depositions in question plus he admit as much in his succinct. It is noted that Acevedo does not plea the refutation of his Rule motion. Acevedo confronts his guilty verdict instead. As a result, plain error appraisal is appropriate.

To institute plain error, Acevedo is required to show “plain” “error” that “affect” substantial rights. If Acevedo is able to assure all the three essentials, the prudence court, in its discretion, can spot a penalty error. This analysis is significantly related to the standard followed in risk-free fault analysis, in addition to the added crinkle that the activist, not the Government, endures the load of conviction with regard to prejudice. Works CitedJordan , David. Free Law Supplement 4: Statutory and Administrative Law Glossary for U.S. Intelligence Law.

New York: David Alan Jordan, 2000. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Study Case (computer Crime) Example | Topics and Well Written Essays - 500 words”, n.d.)
Study Case (computer Crime) Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/law/1605583-study-case-computer-crime
(Study Case (computer Crime) Example | Topics and Well Written Essays - 500 Words)
Study Case (computer Crime) Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/law/1605583-study-case-computer-crime.
“Study Case (computer Crime) Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/law/1605583-study-case-computer-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Study Case (computer Crime)

Professional skill

In this case, the data was "personal" because the data subjects could be identified from the data.... (1) The data was used for the new application without the consent of the data subjects for which the company was responsible along with the contractor.... The UK Data protection Act 1998, Chapter 9, Part I, (a) and (b), The Data Protection Act 1998, Chapter 9, Part II, Section 4, (a) and (b), the First Principle and the Second principle of the Act were breached....
4 Pages (1000 words) Case Study

British Airports Authority, Terminal 5 - Information System

Some workers also said that they could not log into the computer system and those who could log into it, did not know how to operate it properly.... The case study talks about the problems and features of terminal 5 and how they resulted in bigger problems for the passengers.... This report tells about the various information systems that could have been used in this case study....
9 Pages (2250 words) Case Study

Role of Social Media on Cyber Stalking

The paper "Role of Social Media on Cyber Stalking" highlights that as much as Facebook, Twitter and Instagram let others connect and share ideas socially through technology, cyberstalking is treated as a crime because the victims feel intimidated and insecure by the actions of the perpetrators.... The study explains the concept of cyberstalking in greater theoretical depth and uses qualitative data to examine the practice and effects of individuals surveying each other using social media sites....
4 Pages (1000 words) Case Study

The Privacy and Surveillance in Relation to the Internet

However, this function is not equally developed in all web browsers, meaning that specific browsers cannot identify the attempts of malware to harm the computer of the Internet user (King 6).... is an example of such a case, trying to show to its customers that it values their relationship the firm has introduced in its website a series of applications that increase safety of personal data during online transactions or while browsing the organizational website (Khosrowpour 304)....
5 Pages (1250 words) Case Study

The Application Process to the Online Virtual World

The paper 'The Application Process to the Online Virtual World' focuses on 21st-century technology that has opened the gateway for businesses to explore new opportunities.... However, with growing opportunities, businesses are also exposed to the threats that are associated with extending operations....
8 Pages (2000 words) Case Study

Training and Intervention Program

A good example in today's society is most computer geeks who would rather spend the whole of their lives interacting with computers than with people (Meisels, & Shonkoff, 2000).... This paper critically analyzes a case study of a psychologically disturbed child, giving possible training and solutions to the condition.... n this case study, there is an example of a teenager named Jay who feels suppressed and oppressed by his single parent (father) to do college courses that he seems not to be interested in....
6 Pages (1500 words) Case Study

Systems Architecture and Integration

The sheet is further saved in computer hardware for processing purposes.... Due to the presence of the computer network, the computed information is displayed across the network system so that it is visible to authorized personnel including the employees.... In this case, interfaces are platform-independent.... This study purposes to address The paper "Systems Architecture and Integration" is an outstanding example of an essay on information technology....
3 Pages (750 words) Case Study

Ballistic Analysis of Crime Scene

This paper ''Ballistic Analysis of crime Scene'' tells that from the description of the crime scene, the firearm that had been used to inflict the bullet wounds on the victims was recovered at the scene.... The initial step would then be to either identify or eliminate it as the firearm that had been used in the crime.... 8 special revolver had been used in the crime as it was still loaded, as discovered.... n carrying out the ballistic forensic examinations in this crime scene, an establishment has to be made that the weapon in question is safe to handle....
5 Pages (1250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us