Mens Rea, Concurrence, Causation 101
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Without Causation, Fraud and Subsequent Loss Are Not Adequate Grounds for Recovery Tom O'connor
Loyola Consumer Law Review Volume 9 | Issue 4 Article 4 1997 Without Causation, Fraud and Subsequent Loss are Not Adequate Grounds for Recovery Tom O'Connor Follow this and additional works at: http://lawecommons.luc.edu/lclr Part of the Consumer Protection Law Commons Recommended Citation Tom O'Connor Without Causation, Fraud and Subsequent Loss are Not Adequate Grounds for Recovery, 9 Loy. Consumer L. Rev. 309 (1997). Available at: http://lawecommons.luc.edu/lclr/vol9/iss4/4 This Recent Case is brought to you for free and open access by LAW eCommons. It has been accepted for inclusion in Loyola Consumer Law Review by an authorized administrator of LAW eCommons. For more information, please contact [email protected]. RECENT CA SES Without Causation, Fraud and Subsequent Loss Are Not Adequate Grounds for Recovery by Tom O'Connor In Mark Law v. Medco Research September 1, 1992 should have a new drug was "on track." These Inc., 113 F.3d 781 (7th Cir. 1997), provided "storm warnings" to articles reported that: (1) Defen- Mark Law ("Plaintiffs") filed a class investors and satisfied the notice dants' supplier of pharmaceuticals, action suit for similarly situated requirement. These articles called Fujisawa, was suing the company investors in Medco Research Inc. Defendants an "overpriced hype which sold Fujisawa the production ("Defendants"), claiming Defen- job" whose stock was bought by facilities for Defendants' drug, and dants defrauded their investors. The "idiots." In reviewing this argu- (2) Fujisawa's production facility United States Court of Appeals for ment, the court noted that these had quality and regulatory problems the Seventh Circuit dismissed the articles were not given credence by in producing a number of its drugs. -
The Boundaries of Vicarious Liability: an Economic Analysis of the Scope of Employment Rule and Related Legal Doctrines
University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 1987 The Boundaries of Vicarious Liability: An Economic Analysis of the Scope of Employment Rule and Related Legal Doctrines Alan O. Sykes Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Alan O. Sykes, "The Boundaries of Vicarious Liability: An Economic Analysis of the Scope of Employment Rule and Related Legal Doctrines," 101 Harvard Law Review 563 (1987). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. VOLUME 101 JANUARY 1988 NUMBER 3 HARVARD LAW REVIEW1 ARTICLES THE BOUNDARIES OF VICARIOUS LIABILITY: AN ECONOMIC ANALYSIS OF THE SCOPE OF EMPLOYMENT RULE AND RELATED LEGAL DOCTRINES Alan 0. Sykes* 441TICARIOUS liability" may be defined as the imposition of lia- V bility upon one party for a wrong committed by another party.1 One of its most common forms is the imposition of liability on an employer for the wrong of an employee or agent. The imposition of vicarious liability usually depends in part upon the nature of the activity in which the wrong arises. For example, if an employee (or "servant") commits a tort within the ordinary course of business, the employer (or "master") normally incurs vicarious lia- bility under principles of respondeat superior. If the tort arises outside the "scope of employment," however, the employer does not incur liability, absent special circumstances. -
The Senior Management Mens Rea: Another Stab at a Workable Integration of Organizational Culpability Into Corporate Criminal Liability
Case Western Reserve Law Review Volume 62 Issue 1 Article 11 2011 The Senior Management Mens Rea: Another Stab at a Workable Integration of Organizational Culpability into Corporate Criminal Liability George R. Skupski Follow this and additional works at: https://scholarlycommons.law.case.edu/caselrev Part of the Law Commons Recommended Citation George R. Skupski, The Senior Management Mens Rea: Another Stab at a Workable Integration of Organizational Culpability into Corporate Criminal Liability, 62 Case W. Rsrv. L. Rev. 263 (2011) Available at: https://scholarlycommons.law.case.edu/caselrev/vol62/iss1/11 This Note is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Law Review by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. 1/5/2012 3:02:17 PM THE SENIOR MANAGEMENT MENS REA: ANOTHER STAB AT A WORKABLE INTEGRATION OF ORGANIZATIONAL CULPABILITY INTO CORPORATE CRIMINAL LIABILITY INTRODUCTION “It is a poor legal system indeed which is unable to differentiate between the law breaker and the innocent victim of circumstances so that it must punish both alike.”1 This observation summarizes the pervasive flaw with the present standards of vicarious liability used to impose criminal liability on organizations. As in civil lawsuits, corporate criminal liability at the federal level and in many states is imposed using a strict respondeat superior standard: -
Criminal Law--Conspiracy and the Felony Murder Doctrine in Kentucky J
Kentucky Law Journal Volume 29 | Issue 1 Article 14 1940 Criminal Law--Conspiracy and the Felony Murder Doctrine in Kentucky J. Wirt Turner Jr. University of Kentucky Follow this and additional works at: https://uknowledge.uky.edu/klj Part of the Criminal Law Commons, and the State and Local Government Law Commons Right click to open a feedback form in a new tab to let us know how this document benefits you. Recommended Citation Turner, J. Wirt Jr. (1940) "Criminal Law--Conspiracy and the Felony Murder Doctrine in Kentucky," Kentucky Law Journal: Vol. 29 : Iss. 1 , Article 14. Available at: https://uknowledge.uky.edu/klj/vol29/iss1/14 This Comment is brought to you for free and open access by the Law Journals at UKnowledge. It has been accepted for inclusion in Kentucky Law Journal by an authorized editor of UKnowledge. For more information, please contact [email protected]. KENTUCKY LAw JOURNAL In conclusion, it is submitted that the felony murder doctrine in Kentucky is based on the same principles as the negligent murder doctrine, since to convict a defendant of murder for a death occuring during the commission of a felony there must first be a felony dangerous to life and, secondly, the death of the victim must be the necessary or natural consequence of the felony. J. GRiANVILLE CLARK CRIMINAL LAW-CONSPIRACY AND THE FELONY MURDER DOCTRINE IN KENTUCKY* Defendant was indicted jointly with two others for the crime of wilful murder by setting fire to a house and burning a child to death. The evidence showed that defendant was not near enough to aid and abet in the crime. -
SECOND CONCURRENCE SCHALLER, J., Concurring
****************************************************** The ``officially released'' date that appears near the beginning of each opinion is the date the opinion will be published in the Connecticut Law Journal or the date it was released as a slip opinion. The operative date for the beginning of all time periods for filing postopinion motions and petitions for certification is the ``officially released'' date appearing in the opinion. In no event will any such motions be accepted before the ``officially released'' date. All opinions are subject to modification and technical correction prior to official publication in the Connecti- cut Reports and Connecticut Appellate Reports. In the event of discrepancies between the electronic version of an opinion and the print version appearing in the Connecticut Law Journal and subsequently in the Con- necticut Reports or Connecticut Appellate Reports, the latest print version is to be considered authoritative. The syllabus and procedural history accompanying the opinion as it appears on the Commission on Official Legal Publications Electronic Bulletin Board Service and in the Connecticut Law Journal and bound volumes of official reports are copyrighted by the Secretary of the State, State of Connecticut, and may not be repro- duced and distributed without the express written per- mission of the Commission on Official Legal Publications, Judicial Branch, State of Connecticut. ****************************************************** CONNECTICUT COALITION FOR JUSTICE IN EDUCATION FUNDING, INC. v. RELLÐSECOND -
Vicarious Liability and Liability for the Actions of Others II
InDret Vicarious Liability and Liability for the Actions of Others II Pablo Salvador Coderch Professor of Law Universitat Pompeu Fabra, Barcelona (Spain) [email protected] Carlos Ignacio Gómez Ligüerre Assistant Professor of Law Universitat Internacional de Catalunya, Barcelona (Spain) [email protected] July 2002 www.indret.com InDret 03/2002 Pablo Salvador and Carlos Gómez Summary 1. Vicarious liability or liability for the actions of others as a mean of overcoming the principle of individual liability 2. Civil and Criminal Rules governing Civil liability for the actions of others 2.1. Reasons for the existence of two sets of rules that are almost identical, one in section 1903 of the Civil Code and the other in section 120 of the Criminal Code 2.2. Liability due to personal dependency: parents and tutors 2.3. Liability stemming from professional dependency: employers and school owners and teachers a) Relationship of Dependency b) Performance of their liabilities and services c) Reimbursement in favor of the principal 3. From Dependency to Control 4. Bibliography 2 InDret 03/2002 Pablo Salvador and Carlos Gómez Abstract The two traditional branches that regulate civil liability in Spain are the Spanish Civil Code of 1889 (sections 1902, 1903 and 1904) and the Spanish Criminal Code of 1995 (section 120), they determine the harm caused by actions or omissions that are neither crimes nor misdemeanors and those deemed to be, respectively. This work analyzes vicarious liability or liability for the actions of others as one of the legal mechanisms anticipated to overcome civil liability once it has been determined that the principle of individual liability –due to negligence or strict liability– is impractical given the limited solvency of the majority of individuals responsible for a damage. -
61-2G-306 Renewal of License, Certification, Or Registration. (1) To
Utah Code 61-2g-306 Renewal of license, certification, or registration. (1) To renew a license, certification, or registration, before the license, certification, or registration expires, the holder of the license, certification, or registration shall submit to the division in compliance with procedures set through the concurrence of the division and the board: (a) an application for renewal; (b) a fee established by the division and the board, in accordance with Section 63J-1-504; and (c) evidence in the form prescribed by the division of having completed the continuing education requirements for renewal specified in this chapter. (2) (a) A license, certification, or registration expires if it is not renewed on or before its expiration date. (b) For a period of 30 days after the expiration date, a license, certification, or registration may be reinstated upon: (i) payment of a renewal fee and a late fee determined through the concurrence of the division and the board; and (ii) satisfying the continuing education requirements specified in Section 61-2g-307. (c) After the 30-day period described in Subsection (2)(b), and until six months after the expiration date, a license, certification, or registration may be reinstated by: (i) paying a renewal fee and a reinstatement fee determined through the concurrence of the division and the board; and (ii) satisfying the continuing education requirements specified in Section 61-2g-307. (d) After the six-month period described in Subsection (2)(c), and until one year after the expiration date, a -
Crimes Against Property
9 CRIMES AGAINST PROPERTY Is Alvarez guilty of false pretenses as a Learning Objectives result of his false claim of having received the Congressional Medal of 1. Know the elements of larceny. Honor? 2. Understand embezzlement and the difference between larceny and embezzlement. Xavier Alvarez won a seat on the Three Valley Water Dis- trict Board of Directors in 2007. On July 23, 2007, at 3. State the elements of false pretenses and the a joint meeting with a neighboring water district board, distinction between false pretenses and lar- newly seated Director Alvarez arose and introduced him- ceny by trick. self, stating “I’m a retired marine of 25 years. I retired 4. Explain the purpose of theft statutes. in the year 2001. Back in 1987, I was awarded the Con- gressional Medal of Honor. I got wounded many times by 5. List the elements of receiving stolen property the same guy. I’m still around.” Alvarez has never been and the purpose of making it a crime to receive awarded the Congressional Medal of Honor, nor has he stolen property. spent a single day as a marine or in the service of any 6. Define forgery and uttering. other branch of the United States armed forces. The summer before his election to the water district board, 7. Know the elements of robbery and the differ- a woman informed the FBI about Alvarez’s propensity for ence between robbery and larceny. making false claims about his military past. Alvarez told her that he won the Medal of Honor for rescuing the Amer- 8. -
Digital Blackmail As an Emerging Tactic 2016
September 9 DIGITAL BLACKMAIL AS AN EMERGING TACTIC 2016 Digital Blackmail (DB) represents a severe and growing threat to individuals, small businesses, corporations, and government Examining entities. The rapid increase in the use of DB such as Strategies ransomware; the proliferation of variants and growth in their ease of use and acquisition by cybercriminals; weak defenses; Public and and the anonymous nature of the money trail will only increase Private Entities the scale of future attacks. Private sector, non-governmental organization (NGO), and government cybersecurity experts Can Pursue to were brought together by the Office of the Director of National Contain Such Intelligence and the Department of Homeland Security to determine emerging tactics and countermeasures associated Attacks with the threat of DB. In this paper, DB is defined as illicitly acquiring or denying access to sensitive data for the purpose of affecting victims’ behaviors. Threats may be made of lost revenue, the release of intellectual property or sensitive personnel/client information, the destruction of critical data, or reputational damage. For clarity, this paper maps DB activities to traditional blackmail behaviors and explores methods and tools, exploits, protection measures, whether to pay or not pay the ransom, and law enforcement (LE) and government points of contact for incident response. The paper also examines the future of the DB threat. Digital Blackmail as an Emerging Tactic Team Members Name Organization Caitlin Bataillon FBI Lynn Choi-Brewer -
12-357 Sekhar V. United States (06/26/2013)
(Slip Opinion) OCTOBER TERM, 2012 1 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus constitutes no part of the opinion of the Court but has been prepared by the Reporter of Decisions for the convenience of the reader. See United States v. Detroit Timber & Lumber Co., 200 U. S. 321, 337. SUPREME COURT OF THE UNITED STATES Syllabus SEKHAR v. UNITED STATES CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT No. 12–357. Argued April 23, 2013—Decided June 26, 2013 Investments for the employee pension fund of the State of New York and its local governments are chosen by the fund’s sole trustee, the State Comptroller. After the Comptroller’s general counsel recom- mended against investing in a fund managed by FA Technology Ven- tures, the general counsel received anonymous e-mails demanding that he recommend the investment and threatening, if he did not, to disclose information about the general counsel’s alleged affair to his wife, government officials, and the media. Some of the e-mails were traced to the home computer of petitioner Sekhar, a managing part- ner of FA Technology Ventures. Petitioner was convicted of attempt- ed extortion, in violation of the Hobbs Act, 18 U. S. C. §1951(a), which defines “extortion” to mean “the obtaining of property from an- other, with his consent, induced by wrongful use of actual or threat- ened force, violence, or fear, or under color of official right,” §1951(b)(2). -
Inchoate Offences Conspiracy, Attempt and Incitement 5 June 1973
N.B. This is a Working Paper circulated for comment and criticism only. It does not represent the final views. of the Law Commission. The Law Cominission will be grateful for comments before 1 January 1974. All correspondence should be addressed to: J.C. R. Fieldsend, Law Commission, Conquest Hoiis e, 37/38 John Street, Theobalds Road, London WC1N 2BQ. (Tel: 01-242 0861, Ex: 47) The Law Commission Working Paper No 50 Inchoate Offences Conspiracy, Attempt and Incitement 5 June 1973 LONDON HER MAJESTY’S STATIONERY OFFICE 1973 @ Crown copyright 1973 SBN 11 730081 0 THE LAW COMMISSION WORKING PAPER NO. 50 Second Programme, Item XVIII CODIFICATION OF THE CRIMINAL LAW GENERAL PRINCIPLES INCHOATE OFFENCES : CONSPIRACY, ATTEMPT AND INCITEMENT Introduction by the Law Commission 1. The Working Party' assisting the Commission in the examination of the general principles of the criminal law with a view to their codification has prepared this Working Paper on the inchoate offences. It is the fourth in a series' designed as a basis upon which to seek the views of those concerned with the criminal law. In pursuance of - its policy of wide consultation, the Law Commission is publishing the Working Paper and inviting comments upon it. 2. To a greater extent than in previous papers in this series the provisional proposals of the Working Party involve fundamental changes in the law which, we think, will prove much more controversial than those made in the other papers. The suggested limitation of the crime of conspiracy to 1. For membership see p. ix. 2. The others are "The Mental Element in Crime" (W.P. -
CRIMINAL CONSPIRACY: the STATE of MIND CRIME-INTENT, PROVING INTENT, and ANTI-FEDERAL Intentt
College of William & Mary Law School William & Mary Law School Scholarship Repository Faculty Publications Faculty and Deans 1976 Criminal Conspiracy: The tS ate of Mind Crime - Intent, Proving Intent, Anti-Federal Intent Paul Marcus William & Mary Law School, [email protected] Repository Citation Marcus, Paul, "Criminal Conspiracy: The tS ate of Mind Crime - Intent, Proving Intent, Anti-Federal Intent" (1976). Faculty Publications. 557. https://scholarship.law.wm.edu/facpubs/557 Copyright c 1976 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/facpubs CRIMINAL CONSPIRACY: THE STATE OF MIND CRIME-INTENT, PROVING INTENT, AND ANTI-FEDERAL INTENTt Paul Marcus* I. INTRODUCTION The crime of conspiracy, unlike other substantive or inchoate crimes, deals almost exclusively with the state of mind of the defendant. Although a person may simply contemplate committing a crime without violating the law, the contemplation becomes unlawful if the same criminal thought is incorporated in an agreement. The state of mind element of conspiracy, however, is not concerned entirely with this agreement. As Dean Harno properly remarked 35 years ago, "The conspiracy consists not merely in the agreement of two or more but in their intention."1 That is, in their agreement the parties not only must understand that they are uniting to commit a crime, but they also must desire to complete that crime as the result of their combination. Criminal conspiracy, therefore, involves two distinct states of mind. The first state of mind prompts the conspirators to reach an agreement; the second relates to the crime that is the object of the agreement.