Preview

Case 2: Soliciting Funds

Good Essays
Open Document
Open Document
730 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case 2: Soliciting Funds
Scenario 2 – Soliciting Funds
1. The crime in which Tarrance committed had a specific intent (mens rea – guilty mind) when he copied his employer’s customer database on a USB drive and created a fictional business.
“Under the federal Industrial Espionage Act of 1996, knowingly stealing, soliciting, or obtaining trade secrets by copying, downloading, or uploading via electronic means or otherwise with the intention that it will benefit a foreign government or agent is a crime. This act also applies to the stealing or purchasing of trade secrets by U.S. companies or individuals who intend to convert trade secrets to the economic benefit of anyone other than the owner” (Twomey & Jennings, 2017, p.172).
“The Economic Espionage Act (EEA) is a
…show more content…
§1693(n.)) makes it a crime to use any counterfeit, stolen, fraudulently obtained card, code, or devise to obtain money or goods in excess of specified amount through an electronic fund transfer system” (Twomey & Jennings, 2017 p.123).
Tarrance committed this infringement, with the intent to utilize the donor’s funds. In addition, he intentionally (actus rues – guilty act) committed robbery, forgery under false pretense to utilize several donors credit card. By knowingly committing a criminal liability (act of omission), Tarrance foreseeability of his action was also an act of negligence (causation). (Twomey & Jennings, 2017, p. 143).
2. Yes, there is a correspondent civil action between the company in which Tarrance worked for and Donors. A private dispute can be initiated and pursued by the Donors, for the company negligence on not providing/ensuring that their personal information, was protected. The Federal Trade Commission Act is the federal consumer protection statute which prohibits unfair or deceptive practices. The FTC goal is to protect consumers, prevent fraud, deception and unfair business practices in the marketplace. In addition, The Consumer Privacy Protection Act of 2015 was introduced in the Senate in April 2015,
…show more content…
Authorizes the Department of Justice (DOJ) to commence a civil action to enjoin unauthorized persons or entities from accessing or transmitting computer commands commonly referred to as botnets that would impair the integrity or availability of 100 or more computers used by financial institutions or the federal government or that affect interstate or foreign commerce or communications during any one-year period, including by denying access to the computers, installing unwanted software, or obtaining information without authorization. Allows DOJ to enjoin the alienation or disposal of, or to seek restraining orders prohibiting the disposal of, property obtained as a result of such a violation” (congress.gov

You May Also Find These Documents Helpful

  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    Federal cybercrime law dealing with terrorism is based primarily in Title 18 U.S. Code§ 2331. Under title 18, terrorism is defined as “acts dangerous to human life that violate the criminal laws of the United States; (b) appear to be intended to intimidate of coerce a civilian population…occur primarily within the territorial jurisdiction of the United States”(Brenner, 2004). Terrorists can use computers to perform acts which might be harmful or intimidate individuals and when this is the case, the Federal government has jurisdiction. According to Gordon and Ford, computers can perform important functions for terrorists above and beyond being potential targets (2002). Terrorist’s computer usage is an important issue facing governments around the world. Terrorism is an important issue facing governments today and under United States Federal law, cyber-terrorism falls under the jurisdiction of the Federal…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Better Essays

    Which type of antivirus program is most effective in spotting an infection soon after it starts?…

    • 1397 Words
    • 6 Pages
    Better Essays
  • Best Essays

    July at the Multiplex

    • 3341 Words
    • 14 Pages

    The analysis for liability of fraud will explain in detail the offer, acceptance, and possible misrepresentation involved in the contract between Tommy and the Royal 16 Theater. The analysis will also cover the Cao and Cao v. Nguyen and Pham case and draw conclusions based on the prima facie case. Assuming that a…

    • 3341 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Aiu Cr Js 205 Unit 2

    • 574 Words
    • 3 Pages

    Yes, a victim can sue his/or her offender, after the rape has occurred the victim can proceed civilly, even if there were no criminal charges filed. Brody, et al., (2008) it is helpful if criminal charges were filed because convictions for criminal cases make it much easier to predetermine liability in civil cases. In other words, if there is a guilty verdict, then there is no need to litigate liability for a civil case because the civil burden of proof is lower than the criminal burden. Brody, et al., (2008)…

    • 574 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Role of the Judiciary: Cyber crime and cyber terrorism are currently the fastest growing threats to individuals in the States. Cyber-attacks and other security breaches…

    • 237 Words
    • 1 Page
    Good Essays
  • Best Essays

    Birks, P, ‘Misdirected funds: Restitution from the Recipient’ (1989) Lloyds Maritime & Commercial LQ 296…

    • 3483 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    Bis 220 Week 1 Checkpoint

    • 603 Words
    • 3 Pages

    In 1978 the U.S. Congress passed and President Jimmy Carter signed the Electronic Funds Act into effect. This act is a “federal law that protects consumers engaged in the transfer of funds through electronic methods.” ("Electronic Funds Transfer Act," 2013) It covers the use of debit cards, ATM’s, and ACH withdrawals from bank accounts. It also offers a means of improving transaction errors and limits the liability from any loss that may occur from the loss of a card or if the card was stolen. The Electronic Funds Act was passed because of the steady increase in electronic ATM and the growing popularity of electronic banking. Since then the use of paper checks slowly have declined over the years. The paper checks were a source of hard evidence that a payment was made so with the growing popularity of electronic financial transactions a law needed to be created give customers a level of confidence that they have with there traditional check system. This would allow customers to challenge any errors and correct them with a 60-day period; it also limits the liability on lost cards up to fifty dollars only upon the customer reporting the lost card within two business days.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Au2 Question 4 Assignment 4

    • 5257 Words
    • 22 Pages

    The three conditions of fraud referred to as the “fraud triangle” are (1) Incentives/Pressures; (2) Opportunities; and (3) Attitudes/Rationalization. Incentives/Pressures are incentives of management or other employees to commit fraud. Opportunities are circumstances that allow management or employees to commit fraud. Attitudes/Rationalization are indications that an attitude, character, or set of ethical values exist that allow management or employees to commit a dishonest act or they are in an environment that imposes sufficient pressure that causes them to rationalize committing a dishonest act.…

    • 5257 Words
    • 22 Pages
    Powerful Essays
  • Better Essays

    This research paper analyzes the degree of an auditor's liability to clients and third parties under applicable law. Specifically, it focuses on accountants in their professional role engaged by contract to express an opinion about a company's financial statements and the professional commitment to exercise due care in providing those services. An accountant's failure to comply with the promised obligations can result in the accountant being held liable to clients for fraud, negligence, and breach of contract. In some cases, accountants may have a potential legal obligation to third parties as a result of not following established professional standards.…

    • 7118 Words
    • 29 Pages
    Better Essays
  • Better Essays

    Cressey however, took his own studies in a different direction from Sutherland’s research. He was intrigued by embezzlers, whom he called “trust violators”. He was especially interested in the circumstances that led them to be overcome by temptation. Upon completion of his research, he developed what still remains as the classic model for the occupational offender. His research was published in "Other People’s Money: As Study in the Social Psychology of Embezzlement.”…

    • 961 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Crime has always been a shadow upon societies image, these learned behaviors can be seen in all shapes and sizes, in the cities, in the streets and even in homes. The media has controlled the image of what is perceived as crime. But what truly stalks the streets at night, is it the sadistic men who care so little about human dignity they travel from coast to coast sexually assaulting women? Or is this just a small portion of the true offender/victim population. Also there are many different forms of crime the most publicly known violent and property crime make up the larger fraction of crimes in Australia, although crimes such as internet and white-collar crime accounts for a significant part of the total crime costs. Then there is also the “dark figure” of crime, which forms the significant inaccuracies that are found especially in sexual assault offences. The most important aspect of all crime statistics are the trends which only within the last 30 years have been successfully recorded in such a way that can be effectively used to provide evidence for the prevalence of some crimes in society.…

    • 1573 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    In this study we will analyze why companies and individuals decide to embezzle money from companies and or people from sales that work is not yet completed. We will discuss what embezzlement is and who commits these types of crimes. This is a very sticky subject to many people as it can really affect their life in a negative manner. I believe this is a serious topic to look at and gain awareness of so we can stop these criminals from hurting us and our companies that provide jobs for so many.…

    • 358 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Also stating that criminal behavior is not an innate characteristic in any given individual but a product of the social environment. This theory can best explain the actions of the corrupt account. Say for instance the accountant had a great childhood and young adult life, never got into trouble at school or with the law, had impeccable grades, and was a very honest person. Such an upbringing doesn’t generate a criminal. However if when this individual was struggling midway through his accounting degree in college and started associating with people who was cheating their way through school, through this association the well brought up individual became swayed and accepting of dishonest behavior, first step in the criminal direction. The second step being that when he went over the files of his predecessor in the company, he found subtle bits of information the showed money had been syphoned. Curious about the information he speaks with his predecessor and learns about what was going on and is eager to learn how he can do the same, seeing as how the company pays decent but not enough to support his needs and wants in…

    • 695 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The impact cyber crimes and terrorism are having on interrupting the fourth amendment is that the government is able to search and seize without a warrant at any time. They fall back on the part of the fourth amendment that states they most have probable cause and reason to search. The government states that it feels the security of the country is in jeopardy which gives them right to an unwarranted search and seizure of those in question of terrorism or cyber crimes. The government also has the right to arrest an individual when provided with information via…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Case 3 Flight Of Funds

    • 4242 Words
    • 19 Pages

    C A S E 3 Asian Journal of Case Research 4(S): 27 – 44 (2011) Flight of Funds MOHD NOOR ABU BAKARa, MARIATI NORHASHIMb* AND ABDUL HAMID MOHAMED GHOWSc ABSTRACT In 2006, Malaysian Travels Sdn Bhd, a subsidiary of a public listed company, purchased 40% equity in Turkistan Global Services Sdn Bhd on the basis of a project paper which outlined a potential travel business to exploit opportunities in Turkistan.…

    • 4242 Words
    • 19 Pages
    Powerful Essays