Criminal Law

Total Page:16

File Type:pdf, Size:1020Kb

Criminal Law Fraud From Wikipedia, the free encyclopedia Criminal law Part of the common law series Elements Actus reus Mens rea Causation Concurrence Scope of criminal liability Complicity Corporate Vicarious Seriousness of offense Felony Infraction (also called Violation) Misdemeanor Inchoate offenses Attempt Conspiracy Incitement Solicitation Offence against the person Alienation of affection Assassination Assault Battery Bigamy Criminal negligence False imprisonment Home invasion Homicide Kidnapping Manslaughter (corporate) Mayhem Murder corporate Negligent homicide Public indecency Rape Robbery Sexual assault Statutory rape Vehicular homicide Crimes against property Arson Blackmail Bribery Burglary Embezzlement Extortion False pretenses Fraud Larceny Payola Pickpocketing Possessing stolen property Robbery Smuggling Tax evasion Theft Crimes against justice Compounding Malfeasance in office Miscarriage of justice Misprision Obstruction Perjury Perverting the course of justice Victimless crimes Adultery Apostasy Blasphemy Buggery Providing Contraception information(Comstock law) Criminal conversation Dueling Fornication Gambling Adult Incest Interracial marriage Lewd and lasciviousbehavior Masturbation Creation ofObscenity Prostitution Recreational drug use (including alcohol, when prohibited) Sale of sex toys Sodomy Labor strike Suicide Crimes against animals Cruelty to animals Wildlife smuggling Bestiality Defences to liability Automatism Consent Defence of property Diminished responsibility Duress Entrapment Ignorantia juris non excusat Infancy Insanity Justification Mistake (of law) Necessity Provocation Self-defence Other common-law areas Contracts Evidence Property Torts Wills, trusts and estates Portals Criminal justice Law v t e Part of the common law series Tort law Intentional torts Assault Battery False imprisonment Intentional infliction of emotional distress Transferred intent Property torts Trespass land chattels Conversion Detinue Replevin Trover Defenses Assumption of risk Comparative negligence Contributory negligence Consent Necessity Statute of limitations Self-defense Defense of others Defense of property Shopkeeper's privilege Negligence Duty of / standard of care Proximate cause Res ipsa loquitur Calculus of negligence Rescue doctrine Duty to rescue Negligent infliction of emotional distress Employment-related Entrustment Malpractice legal medical Liability torts Product liability Quasi-tort Ultrahazardous activity Nuisance Public nuisance Rylands v Fletcher Dignitary torts Defamation Invasion of privacy False light Breach of confidence Abuse of process Malicious prosecution Alienation of affections Criminal conversation Seduction Breach of promise Economic torts Fraud Tortious interference Conspiracy Restraint of trade Liability and remedies Last clear chance Eggshell skull Vicarious liability Volenti non fit injuria Ex turpi causa non oritur actio Neutral reportage Damages Injunction Torts and conflict of laws Joint and several liability Comparative responsibility Market share liability Duty to visitors Trespassers Licensees Invitees Attractive nuisance Other common law areas Contracts Criminal law Evidence Property Wills, trusts, and estates Law portal v t e In law, fraud is deliberate deception to secure unfair or unlawful gain. Fraud is both a civil wrong (i.e., a fraud victim may sue the fraud perpetrator to avoid the fraud and/or recover monetary compensation) and a criminal wrong (i.e., a fraud perpetrator may be prosecuted and imprisoned by governmental authorities). The purpose of fraud may be monetary gain or other benefits, such as obtaining a drivers license by way of false statements.[1] A hoax is a distinct concept that involves deception without the intention of gain or of materially damaging or depriving the victim. Contents [hide] 1 As a civil wrong 2 As a criminal offence 3 In non-common law systems 4 By region o 4.1 Canada o 4.2 United Kingdom . 4.2.1 England and Wales and Northern Ireland . 4.2.2 Serious Fraud Office . 4.2.3 National Fraud Authority . 4.2.4 CIFAS - The UK's Fraud Prevention Service o 4.3 United States 5 Cost 6 Types of fraudulent acts 7 Anti-fraud movements 8 Detection 9 Notable fraudsters 10 Related 11 See also 12 References 13 Further reading 14 External links As a civil wrong[edit] In common law jurisdictions, as a civil wrong, fraud is referred to as a tort. While the precise definitions and requirements of proof vary among jurisdictions, the requisite elements of fraud as a tort generally are the intentional misrepresentation or concealment of an important fact upon which the victim is meant to rely, and in fact does rely, to the harm of the victim.[2] Proving fraud in a court of law is often said to be difficult.[3] That difficulty is found, for instance, in that each and every one of the elements of fraud must be proven, that the elements include proving the states of mind of the perpetrator and the victim, and that some jurisdictions require the victim to prove fraud with so- called clear and convincing evidence.[4] The remedies for fraud may include rescission (i.e., reversal) of a fraudulently obtained agreement or transaction, the recovery of a monetary award to compensate for the harm caused, punitive damages to punish or deter the misconduct, and possibly others.[4] In cases of a fraudulently induced contract, fraud may serve as a defense in a civil action for breach of contract or specific performance of contract. Fraud may serve as a basis for a court to invoke its equitable jurisdiction. As a criminal offence[edit] In common law jurisdictions, as a criminal offence, fraud takes many different forms, some general (e.g., theft by false pretense) and some specific to particular categories of victims or misconduct (e.g., bank fraud,insurance fraud, forgery). The elements of fraud as a crime similarly vary. The requisite elements of perhaps most general form of criminal fraud, theft by false pretense, are the intentional deception of a victim by false representation or pretense with the intent of persuading the victim to part with property and with the victim parting with property in reliance on the representation or pretense and with the perpetrator intending to keep the property from the victim.[5] In non-common law systems[edit] In civil law systems and other legal systems, the concept of fraud seems to exist, but its elements and application may or may not vary substantially from the common law system concepts discussed in this article. By region[edit] Canada[edit] Section 380(1) of the Criminal Code provides the general definition for fraud in Canada: 380. (1) Every one who, by deceit, falsehood or other fraudulent means, whether or not it is a false pretence within the meaning of this Act, defrauds the public or any person, whether ascertained or not, of any property, money or valuable security or any service, (a) is guilty of an indictable offence and liable to a term of imprisonment not exceeding fourteen years, where the subject-matter of the offence is a testamentary instrument or the value of the subject-matter of the offence exceeds five thousand dollars; or (b) is guilty (i) of an indictable offence and is liable to imprisonment for a term not exceeding two years, or (ii) of an offence punishable on summary conviction, where the value of the subject-matter of the offence does not exceed five thousand dollars.[6] In addition to the penalties outlined above, the court can also issue a prohibition order under s. 380.2 (preventing a person from "seeking, obtaining or continuing any employment, or becoming or being a volunteer in any capacity, that involves having authority over the real property, money or valuable security of another person"). It can also make a restitution order under s. 380.3.[7] The Canadian courts have held that the offence consists of two distinct elements: A prohibited act of deceit, falsehood or other fraudulent means. In the absence of deceit or falsehood, the courts will look objectively for a "dishonest act"; and The deprivation must be caused by the prohibited act, and deprivation must relate to property, money, valuable security, or any service.[8] The Supreme Court of Canada has held that deprivation is satisfied on proof of detriment, prejudice or risk of prejudice; it is not essential that there be actual loss. [9] Deprivation of confidential information, in the nature of atrade secret or copyrighted material that has commercial value, has also been held to fall within the scope of the offence.[10] United Kingdom[edit] England and Wales and Northern Ireland[edit] Main article: Fraud Act 2006 The BBC World service reported in 2012 that the estimated value lost through fraud in the UK was $100 billion (£66 billion) a year.[11] The Fraud Act 2006 (c 35) is an Act of the Parliament of the United Kingdom. It affects England and Wales and Northern Ireland. It was given Royal Assent on 8 November 2006, and came into effect on 15 January 2007.[12] The Act gives a statutory definition of the criminal offence of fraud, defining it in three classes—fraud by false representation, fraud by failing to disclose information, and fraud by abuse of position. It provides that a person found guilty of fraud was liable to a fine or imprisonment for up to twelve months on summary conviction (six months in Northern Ireland), or a fine or imprisonment
Recommended publications
  • Niall Palmer
    EnterText 1.1 NIALL PALMER “Muckfests and Revelries”: President Warren G. Harding in Fact and Fiction This article will assess the development of the posthumous reputation of President Warren Gamaliel Harding (1921-23) through an examination of key historical and literary texts in Harding historiography. The article will argue that the president’s image has been influenced by an unusual confluence of factors which have both warped history’s assessment of his administration and retarded efforts at revisionism. As a direct consequence, the stereotypical, deeply negative, portrait of Harding remains rooted in the nation’s consciousness and the “rehabilitation” afforded to many presidents by revisionist writers continues to be denied to the man still widely-regarded as the worst president of the twentieth century. “Historians,” Eugene Trani and David Wilson observed in 1977, “have not been gentle with Warren G. Harding.”1 In successive surveys of American political scientists, historians and journalists, undertaken to rank presidents by achievement, vision and leadership skills, the twenty-ninth president consistently comes last.2 The Chicago Sun- Times, publishing the findings of fifty-eight presidential historians and political scientists in November 1995, placed Warren Harding at the head of the list of “The Ten Worst” Niall Palmer: Muckfests and Revelries 155 EnterText 1.1 Presidents.3 A 1996 New York Times poll branded Harding an outright “failure,” alongside two presidents who presided over the pre-Civil War crisis, Franklin Pierce and James Buchanan. The academic merit and methodological underpinnings of such surveys are inevitably flawed. Nonetheless, in most cases, presidential status assessments are fluid, reflecting the fluctuations of contemporary opinion and occasional waves of academic revisionism.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Joint Appendix (Volume 2 of 2) -- Ritchie Capital Management, LLC V. Costco (Second Circuit).Pdf
    Case 15-3294, Document 40, 01/29/2016, 1694672, Page1 of 154 15-3294-cv United States Court of Appeals for the Second Circuit RITCHIE CAPITAL MANAGEMENT, L.L.C., RITCHIE CAPITAL MANAGEMENT, LTD., RITCHIE SPECIAL CREDIT INVESTMENTS, LTD., Plaintiffs-Appellants, – v. – COSTCO WHOLESALE CORPORATION, Defendant-Appellee. –––––––––––––––––––––––––––––– ON APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK JOINT APPENDIX Volume 2 of 2 (Pages A-166 to A-314) GREGG L. WEINER ALEXANDRA A.E. SHAPIRO ADAM M. HARRIS CYNTHIA S. ARATO ROPES & GRAY LLP FABIEN THAYAMBALLI 1211 Avenue of the Americas SHAPIRO ARATO LLP New York, New York 10036 500 Fifth Avenue, 40th Floor (212) 596-9000 New York, New York 10110 (212) 257-4880 Attorneys for Defendant-Appellee – and – LEO V. LEYVA JAMES T. KIM COLE SCHOTZ P.C. 1325 Avenue of the Americas, 19th Floor New York, New York 10019 (212) 752-8000 Attorneys for Plaintiffs-Appellants Case 15-3294, Document 40, 01/29/2016, 1694672, Page2 of 154 i TABLE OF CONTENTS Page District Court Docket Entries .................................... A-1 Transcript of Proceedings of the Honorable Vernon S. Broderick, dated October 10, 2014 .................... A-9 First Amended Complaint, dated October 17, 2014 .. A-20 Exhibit A to Complaint - Letter from GECC to Costco, dated October 23, 2000 ................................................... A-56 Exhibit B to Complaint - Letter from Petters to Costco, dated October 24, 2000 ................................................... A-58 Exhibit C to Complaint - E-mail from David Baer, dated February 14, 2007 .................................................. A-60 Declaration of Adam M. Harris, in Support of Costco Wholesale Corporation’s Motion to Dismiss the First Amended Complaint, dated November 13, 2014 ..............................................
    [Show full text]
  • (Ponzi's Scheme) That Enabled Him to Get Very Rich. He
    then early 1920s, Charles Ponzi created a scheme (Ponzi's scheme) that enabled him to get very rich. He promised investors unreasonably high rates of return, and used the money of new investors to pay the ear- Ilier investors and himself. Inevitably, the scheme collapsed because people stopped investing. Ponzi's name became forever linked to the thousands of Ponzi schemes in which an enormous number of investors have been cheated out of millions, if not billions, of dollars. Creditors and investors are increasingly forcing the perpetra- tors of the fraud and the entities the perpetrator owns and controls into bankruptcy court. When the individual perpetrator of the scheme and the entities which he owns and controls are forced into bankruptcy, creditors and investors sometime ask the judge to combine all of the separate cases into one. If the judge grants the request, there are major impacts on the bankruptcy trustee's ability to recover money. Before asking the bankruptcy judge to combine the cases, creditors should carefully consider whether they really want what they ask for. 58· THE FEDERAL LAWYER· JANUARy/FEBRUARY 2013 The Original Ponzi Scheme relinquished all investment authority to Madoff. Madoff collected Charles Ponzi was born in Italy in 1882, and died in Rio de Janeiro funds from investors, claiming to invest their funds in a "split-strike in 1949. In 1903, he arrived in Boston. It is believed that Ponzi had as conversion strategy" for producing consistently high rates of return little as $2.50 in cash when he arrived in the United States. on investments.
    [Show full text]
  • Kevin Mitnick and I Were Intensely Curious About the World and Eager to Prove Ourselves
    Scanned by kineticstomp THE ART OF DECEPTION Controlling the Human Element of Security KEVIN D. MITNICK & William L. Simon Foreword by Steve Wozniak For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello For Arynne, Victoria, and David, Sheldon,Vincent, and Elena. Social Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources Acknowledgments Foreword We humans are born with an inner drive to explore the nature of our surroundings. As young men, both Kevin Mitnick and I were intensely curious about the world and eager to prove ourselves.
    [Show full text]
  • Hbo Premieres New Season of Boardwalk Empire
    HBO PREMIERES NEW SEASON OF BOARDWALK EMPIRE Miami, September 25, 2012 – HBO Latin America announced that it will premiere the third season of the four-time Emmy® winning, highly acclaimed series, Boardwalk Empire, on October 14. Created by Terrence Winter (Emmy® Award-winning writer of The Sopranos) and directed and produced by Martin Scorsese (Academy Award® winning director), this one-hour drama series chronicles the life and times of Enoch “Nucky” Thompson (Emmy® nominee and Golden Globe® winner Steve Buscemi), Atlantic City’s undisputed czar at a time when Prohibition proved to be a major catalyst in the rise of organized crime in America. At the end of the second season, Margaret (Kelly Macdonald) married Nucky to avoid being forced to testify against him. After a prosecution witness was found dead with a “confession” next to his body, the judge declared a mistrial and Nucky was freed. Van Alden (Michael Shannon), with the feds in pursuit and his baby and nanny in tow, moved to Cicero, IL, under an assumed name. Jimmy (Michael Pitt), regretting his role in the failed hit on Nucky, tried to get back in his former boss’ good graces, but Nucky was unmoved; using Manny Horvitz (William Horsythe) as bait, Nucky called Jimmy out in the rain and killed him. The next day, he told Margaret that Jimmy had reenlisted in the Army, then celebrated a windfall with cronies on the highway site he thought he owned. Little did he realize that Margaret had just signed the deed over to the Church. Consisting of 12 episodes, season 3 is set 16 months later on New Year’s Eve 1922-23.
    [Show full text]
  • INTEGRATOR's JOURNAL by Wayne M
    INTEGRATOR'S JOURNAL by Wayne M. Krakau - Chicago Computer Guide, March 1992 Wayne Krakau welcomes all calls, comments, and questions from basement businesses to corporate MIS. Wayne is a partner in Krakau Business Computer Systems, a systems integration firm and a Novell Gold authorized and Lantastic 5 Star Dealer. He has been working with computers for 15 years. He has an MBA in Marketing and a BS in Information Science and was originally educated in Computer and Information Systems Analysis Engineering. He holds Novell CNE and CNI ratings, and LANDA Certifications in LAN Installation, Architecture, Connectivity, Maintenance, and Program Development. Wayne can be reached for questions, comments, or topic suggestions at (708)298-7695 or through the Computer Guide. This is a new column that will provide information on the products, people, news, and situations, encountered in the life of a systems integrator (yours truly). Since a large part of my work involves "res- cues" of people after they've been victims of botched integration attempts or abuse or abandonment by vendors, the slant of this commentary may sometimes be a bit cynical. As an experienced street cop might tell you, that's a hazard of constant exposure to the seamier side of the beat. Due to popular demand (via faxes to the Computer Guide -- Yes, we do read them!) LANs (Local Area Networks) and other connectivity issues will be prominently, though not exclusively, featured. Upon reading this column, my dedication to defining terminology will soon become apparent. I would rather err on the side of over-explaining and have technically oriented readers skip over the explanations than leave some people in the dark.
    [Show full text]
  • Studying the Lindbergh Case
    Studying the Lindbergh Case A Guide to the Files and Resources Available at the New Jersey State Police Museum By Mark W. Falzini Archivist II April 2006 Table of Contents Introduction..........................................................1 Studying the Lindbergh Case...........................................4 Obstacles.......................................................5 Who Studies the Lindbergh Case?.................................6 A Brief History of the Sources........................................8 Archival Collections Original Investigation Files...................................11 Correspondence & DJ Files......................................13 The “L”, “M” and “P” Collections...............................13 The Binders and Statements.....................................14 The Hoffman Collection.........................................15 Colonel H. Norman Schwarzkopf “Personal File”..................16 Captain J. J. Lamb Collection..................................17 Lieutenant Arthur Keaten Collection............................17 Corporal Wolf Collection.......................................18 Louis Salz Collection..........................................18 Wilentz Collection.............................................19 Robert Peacock Collection......................................19 Bronx District Attorney Collection.............................19 Violet Sharp Collection........................................20 Parker/Wendel Collection.......................................20 Irene Springer Collection......................................21
    [Show full text]
  • Organized Crime on Wall Street Hearing Committee on Commerce House of Representatives
    ORGANIZED CRIME ON WALL STREET HEARING BEFORE THE SUBCOMMITTEE ON FINANCE AND HAZARDOUS MATERIALS OF THE COMMITTEE ON COMMERCE HOUSE OF REPRESENTATIVES ONE HUNDRED SIXTH CONGRESS SECOND SESSION SEPTEMBER 13, 2000 Serial No. 106–156 Printed for the use of the Committee on Commerce ( U.S. GOVERNMENT PRINTING OFFICE 67–115CC WASHINGTON : 2000 VerDate 11-MAY-2000 15:08 Jan 04, 2001 Jkt 068011 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 E:\HEARINGS\67115 pfrm02 PsN: 67115 COMMITTEE ON COMMERCE TOM BLILEY, Virginia, Chairman W.J. ‘‘BILLY’’ TAUZIN, Louisiana JOHN D. DINGELL, Michigan MICHAEL G. OXLEY, Ohio HENRY A. WAXMAN, California MICHAEL BILIRAKIS, Florida EDWARD J. MARKEY, Massachusetts JOE BARTON, Texas RALPH M. HALL, Texas FRED UPTON, Michigan RICK BOUCHER, Virginia CLIFF STEARNS, Florida EDOLPHUS TOWNS, New York PAUL E. GILLMOR, Ohio FRANK PALLONE, Jr., New Jersey Vice Chairman SHERROD BROWN, Ohio JAMES C. GREENWOOD, Pennsylvania BART GORDON, Tennessee CHRISTOPHER COX, California PETER DEUTSCH, Florida NATHAN DEAL, Georgia BOBBY L. RUSH, Illinois STEVE LARGENT, Oklahoma ANNA G. ESHOO, California RICHARD BURR, North Carolina RON KLINK, Pennsylvania BRIAN P. BILBRAY, California BART STUPAK, Michigan ED WHITFIELD, Kentucky ELIOT L. ENGEL, New York GREG GANSKE, Iowa TOM SAWYER, Ohio CHARLIE NORWOOD, Georgia ALBERT R. WYNN, Maryland TOM A. COBURN, Oklahoma GENE GREEN, Texas RICK LAZIO, New York KAREN MCCARTHY, Missouri BARBARA CUBIN, Wyoming TED STRICKLAND, Ohio JAMES E. ROGAN, California DIANA DEGETTE, Colorado JOHN SHIMKUS, Illinois THOMAS M. BARRETT, Wisconsin HEATHER WILSON, New Mexico BILL LUTHER, Minnesota JOHN B. SHADEGG, Arizona LOIS CAPPS, California CHARLES W. ‘‘CHIP’’ PICKERING, Mississippi VITO FOSSELLA, New York ROY BLUNT, Missouri ED BRYANT, Tennessee ROBERT L.
    [Show full text]
  • Declaration of James W. Johnson (With Exhibits)
    1 James S. Christian (SBN 023614) CHRISTIAN ANDERSON PLC 2 5050 North 40th Street, Suite 320 Phoenix, Arizona 85018 3 Telephone: (602) 478-6828 [email protected] 4 James W. Johnson (admitted pro hac vice) 5 Michael H. Rogers (admitted pro hac vice) James T. Christie (admitted pro hac vice) 6 LABATON SUCHAROW LLP 140 Broadway 7 New York, New York 10005 Telephone: (212) 907-0700 8 [email protected] [email protected] 9 [email protected] 10 Counsel for Plaintiff Public Employees’ Retirement System of Mississippi 11 12 IN THE SUPERIOR COURT OF THE STATE OF ARIZONA 13 IN AND FOR THE COUNTY OF MARICOPA 14 PUBLIC EMPLOYEES’ RETIREMENT ) SYSTEM OF MISSISSIPPI, individually ) 15 and on behalf of all others similarly situated, ) Case No.: CV2016-050480 ) 16 Plaintiffs ) Declaration of James W. Johnson in v. ) Support of Lead Plaintiff’s Motion 17 ) for Approval of Class Action SPROUTS FARMERS MARKET, INC., et ) Settlement and Plan of Allocation and 18 al., ) an Award of Attorneys’ Fees and ) Payment of Expenses 19 Defendants. ) ) (Complex case) 20 ) ) 21 ) (Assigned to the Hon. Roger Brodman) ____________________________________ ) 22 23 24 25 26 27 28 DECLARATION OF JAMES W. JOHNSON 1 I, JAMES W. JOHNSON, declare as follows, under penalty of perjury: 2 1. I am a partner of the law firm of Labaton Sucharow LLP (“Labaton 3 Sucharow”). Labaton Sucharow serves as Court-appointed Lead Counsel for Lead 4 Plaintiff the Public Employees’ Retirement System of Mississippi (“PERS” or “Lead 5 Plaintiff”), and the proposed Settlement Class in the Action.1 I have been actively 6 involved throughout the prosecution and resolution of the Action, am familiar with its 7 proceedings, and have personal knowledge of the matters set forth herein based upon my 8 close supervision of the material aspects of the Action.
    [Show full text]
  • False Claims Reform Act
    S. HRG.99-452 FALSE CLAIMS REFORM ACT Legislative Office MAIN LIBRARY HEARING U.S. Dept. of Justice BEFORE THE SUBCOMMITTEE ON ADMINISTRATIVE PRACTICE AND PROCEDURE OF THE COMMITTEE ONTHE JUDICIARY UNITED STATES SENATE NINETY-NINTH CONGRESS FIRST SESSION ON S. 1562 A BILL TO AMEND THE FALSE CLAIMS ACT, AND TITLE 18 OF THE UNITED STATES CODE REGARDING PENALTIES FOR FALSE CLAIMS, AND FOR OTHER PURPOSES SEPTEMBER 17, 1985 Serial No. J-99-52 Printed for the use of the Committee on the Judiciary U.8. GOVERNMENT PRINTING OFFICE 56-637 O WASHINGTON : 1986 SENATE COMMITTEE ON THE JUDICIARY STROM THURMOND, South Carolina, Chairman CHARLES McC. MATHIAS, JR., Maryland JOSEPH R. BIDEN, JR., Delaware PAUL LAXALT, Nevada EDWARD M. KENNEDY, Massachusetts ORRIN G. HATCH, Utah ROBERT C. BYRD, West Virginia ALAN K. SIMPSON, Wyoming HOWARD M. METZENBAUM, Ohio JOHN P. EAST, North Carolina DENNIS DECONCINI, Arizona CHARLES E. GRASSLEY, Iowa PATRICK J. LEAHY, Vermont JEREMIAH DENTON, Alabama HOWELL HEFLIN, Alabama ARLEN SPECTER, Pennsylvania PAUL SIMON, Illinois MITCH McCONNELL, Kentucky DENNIS W. SHEDD, Chief Counsel and Staff Director DIANA L. WATERMAN, General Counsel DEBORAH G. BERNSTEIN, Chief Clerk MARK H. GITENSTEIN, Minority Chief Counsel SUBCOMMITTEE ON ADMINISTRATIVE PRACTICE AND PROCEDURE CHARLES E. GRASSLEY, Iowa, Chairman ARLEN SPECTER, Pennsylvania HOWARD M. METZENBAUM, Ohio JOHN P. EAST, North Carolina HOWELL HEFLIN, Alabama ALICE R. MILDER, Chief Counsel and Staff Director (II) CONTENTS STATEMENTS OF MEMBERS Page Grassley, Hon. Charles E., a U.S. Senator from the State of Iowa 1 Metzenbaum, Hon. Howard M., a U.S. Senator from the State of Ohio 13 DeConcini, Hon.
    [Show full text]
  • Landlocked 2.2
    LandLocked 2.2 i LandLocked Cultural Boundaries by Rachel Berkowitz Faculty Advisor Kij Johnson LandLocked, Issue 2.2, Summer 2020. Copyright © 2020 the contributors. No part of LandLocked may be reproduced without permission from the contributor. LandLocked is published by the graduate students in the Department of English at the University of Kansas. Unsolicited manuscripts are welcome through Submittable. Guidelines for submission are available online. LandLocked Wescoe Hall, Rm. 3001 1445 Jayhawk Blvd. Lawrence, KS 66045 http://www.landlockedmagazine.com [email protected] Contents Poetry Haley Lasché Abort 1 Abort 2 Abort 3 Devolver 4 Ashley Cline to tend the garden that is my throat, 16 suddenly in bloom knuckle teeth, with lines from Carly 17 Rae Jepsen MICHAEL CHANG you're out of touch i'm out of time 39 狮子山隧道 //////: lion rock tunnel 41 María DeGuzmán Memory of the Dance 47 Dani Putney Angeligender 54 Michelangelo 55 Technological Dismemberment 56 Madison Zehmer Unearthly 68 Preston Smith In Which You're A Spineless Monolith 80 To Earn Garden Merit 81 Riley Morsman Only Bones 86 Of Prairie 87 Charlotte Newbury Weeping Madonna // Anatomical 96 Venus Mycelium 98 Lauren Annette Boulton Takotsubo 105 Foundation, Summer 2002 107 Randi Clemens The American Daughter in the 121 Diorama Rapunzel Birthing 122 Hysterectomy 123 Nonfiction Maggie Argiro Highway Song 5 Mikala Stubley Postcard from the places I 33 haven't been Vilune Sestokaite Steps of Service 99 Anannya Uberoi To Shimla, from Madrid 111 Harrison Pyros The Question
    [Show full text]