TIBRS Data Collection Manual 14Th Edition 8-26-19.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

TIBRS Data Collection Manual 14Th Edition 8-26-19.Pdf TIBRS DATA COLLECTION AN INSTRUCTIONAL MANUAL FOR THE IMPLEMENTATION OF THE TENNESSEE INCIDENT BASED REPORTING SYSTEM PREPARED BY: TENNESSEE BUREAU OF INVESTIGATION CJIS SUPPORT CENTER 14TH EDITION DECEMBER 2018 TIBRS DATA COLLECTION AN INSTRUCTIONAL MANUAL FOR THE IMPLEMENTATION OF THE TENNESSEE INCIDENT BASED REPORTING SYSTEM PREPARED BY: TENNESSEE BUREAU OF INVESTIGATION CJIS SUPPORT CENTER 14TH EDITION DECEMBER 2018 TABLE OF CONTENTS CHAPTER 1 INTRODUCTION TO TIBRS .................................................... 1 HOW DOES TIBRS WORK? ............................................................................... 1 JURISDICTIONAL REPORTING GUIDELINES ........................................................ 1 DEFINITION OF AN “INCIDENT” ........................................................................ 2 CLASSIFYING AN OFFENSE ................................................................................ 3 OFFENSE CATEGORIES AND COUNTING METHODOLOGY .................................. 4 CHAPTER 2 ELEMENTS OF DATA COLLECTION ....................................... 7 GROUP A INCIDENT REPORT .......................................................................... 7 ADMINISTRATIVE DATA .................................................................................. 7 ORI NUMBER ......................................................................................... 7 INCIDENT NUMBER ................................................................................ 7 INCIDENT DATE ..................................................................................... 7 REPORT DATE ........................................................................................ 7 INCIDENT TIME ...................................................................................... 8 MILITARY TIME TABLE .......................................................................... 8 CLEARING AN INCIDENT ....................................................................... 8 ARREST CLEARANCES ............................................................................ 8 EXCEPTIONAL CLEARANCES .................................................................. 9 EXCEPTIONAL CLEARANCE CODES ........................................................ 9 EXCEPTIONAL CLEARANCE DATE ........................................................ 10 CLEARING MULTIPLE-OFFENSE INCIDENTS ......................................... 10 LATITUDE AND LONGITUDE................................................................. 10 INCIDENT ADDRESS ............................................................................. 10 CARGO THEFT ...................................................................................... 11 APPLICABLE OFFENSES FOR CARGO THEFT ......................................... 11 USE OF FORCE ...................................................................................... 11 USE OF FORCE INCIDENT NUMBER ............................................... 11 OFFENSE DATA .............................................................................................. 11 TIBRS OFFENSE CODE ........................................................................ 11 BIAS MOTIVATION ............................................................................... 11 BIAS MOTIVATION CODES ................................................................... 12 OFFENSE LOCATION ............................................................................. 13 LOCATION CATEGORIES AND CODES ................................................... 13 LOCATION CATEGORY GUIDELINES AND EXAMPLES ........................... 14 OFFENSE STATUS ................................................................................ .17 OFFENDER SUSPECTED OF USING ......................................................... 18 TYPE OF CRIMINAL ACTIVITY OFFENSES ............................................. 18 TYPE OF CRIMINAL ACTIVITY CODES .................................................. 18 TYPE OF WEAPON/FORCE INVOLVED ................................................... 18 TYPE OF WEAPON CODES .................................................................... 19 METHOD OF ENTRY FOR BURGLARY ................................................... 20 NUMBER OF PREMISES ENTERED ......................................................... 20 HOME INVASION .................................................................................. 20 TABLE OF CONTENTS (CONTINUED) IDENTITY THEFT FLAG ................................................................................ 20 TIBRS DEFINITION OF IDENTITY THEFT ................................................... 21 APPLICABLE OFFENSES FOR IDENTITY THEFT FLAG ............................ 21 GANG ACTIVITY ............................................................................................ 21 GANG TYPE .......................................................................................... 22 GANG NAME ........................................................................................ 22 DRUG-RELATED OFFENSES, DRUG ORIGINS AND PRECURSORS ................. 22 DRUG-RELATED/DRUG MOTIVATED OFFENSES ................................... 22 DRUG TYPE .......................................................................................... 22 DRUG ORIGIN TYPE ............................................................................. 22 DRUG ORIGIN CODES ........................................................................... 23 POSSIBLE DRUG ORIGIN CODES ................................................................. 23 PRECURSOR .................................................................................................. 23 PRECURSOR CODES ..................................................................................... 23 COMMON COMPONENT/DRUG USES .......................................................... 24 COMMON METHAMPHETAMINE DRUG EQUIPMENT ................................. 24 PROPERTY DATA ........................................................................................... 25 OFFENSES REQUIRING PROPERTY DATA ................................................... 25 PROPERTY LOSS TYPE CODES .................................................................... 25 PROPERTY CATEGORIES .............................................................................. 26 PROPERTY CATEGORIES AND CODES ......................................................... 26 PROPERTY CATEGORY GUIDELINES .......................................................... 27 VALUE OF PROPERTY .................................................................................... 32 GUIDELINES FOR PROPERTY VALUATION ................................................. 32 DATE RECOVERED ....................................................................................... 33 RECOVERED VALUE .................................................................................... 33 SUSPECTED DRUG TYPE .............................................................................. 34 DRUG QUANTITY/MEASUREMENT ............................................................. 34 DRUG MEASUREMENT CODES .............................................................. 34 WHERE WERE THE MARIJUANA PLANTS BEING GROWN? ................... 34 DRUG TYPES, CODES AND EXAMPLES ................................................. 35 OFFENDER DATA ........................................................................................... 36 OFFENDER SEQUENCE NUMBER ........................................................... 36 OFFENDER SEX CODES ......................................................................... 36 OFFENDER RACE CODES ……… ..................... …….……………………..36 GUIDELINES FOR OFFENDER RACE CODES .......................................... 36 OFFENDER AGE CODES ........................................................................ 37 OFFENDER ETHNICITY CODES .............................................................. 37 OFFENDER ETHNICITY GUIDELINES ..................................................... 37 ARRESTEE DATA ............................................................................................ 37 ARRESTEE SEQUENCE NUMBER ................................................................. 38 ARRESTEE SEX CODES ................................................................................ 38 ARRESTEE RACE CODES ............................................................................. 38 ARRESTEE DATE OF BIRTH ........................................................................ 38 ARRESTEE AGE CODES ............................................................................... 38 TABLE OF CONTENTS (CONTINUED) STATE CONTROL NUMBER .......................................................................... 38 ARRESTEE NAME ......................................................................................... 38 ETHNICITY OF ARRESTEE CODES ............................................................... 39 ARRESTEE ETHNICITY GUIDELINES ..................................................... 39 PREVIOUS DOMESTIC VIOLENCE FLAG ..................................................... 39 RESIDENT STATUS OF ARRESTEE ............................................................... 39 ARRESTEE RESIDENT STATUS CODES ....................................................... 39 TYPE OF ARREST CODES ............................................................................ 40 ARREST CODE GUIDELINES .......................................................................
Recommended publications
  • Charging Language
    1. TABLE OF CONTENTS Abduction ................................................................................................73 By Relative.........................................................................................415-420 See Kidnapping Abuse, Animal ...............................................................................................358-362,365-368 Abuse, Child ................................................................................................74-77 Abuse, Vulnerable Adult ...............................................................................78,79 Accessory After The Fact ..............................................................................38 Adultery ................................................................................................357 Aircraft Explosive............................................................................................455 Alcohol AWOL Machine.................................................................................19,20 Retail/Retail Dealer ............................................................................14-18 Tax ................................................................................................20-21 Intoxicated – Endanger ......................................................................19 Disturbance .......................................................................................19 Drinking – Prohibited Places .............................................................17-20 Minors – Citation Only
    [Show full text]
  • People V Gillis, Unpublished Opinion Per Curiam of the Court of Appeals, Issued
    Michigan Supreme Court Lansing, Michigan Chief Justice: Justices: Clifford W. Taylor Michael F. Cavanagh Elizabeth A. Weaver Marilyn Kelly Opinion Maura D. Corrigan Robert P. Young, Jr. Stephen J. Markman FILED APRIL 5, 2006 PEOPLE OF THE STATE OF MICHIGAN, Plaintiff-Appellant, v No. 127194 JOHN ALBERT GILLIS, Defendant-Appellee. _______________________________ BEFORE THE ENTIRE BENCH MARKMAN, J. We granted leave to appeal to consider whether our state’s first-degree murder statute permits a felony-murder conviction “in the perpetration of” a first- or second-degree home invasion in which the homicide occurs several miles away from the dwelling and several minutes after defendant departed from the dwelling. Following a jury trial, defendant was convicted of two counts of first- degree felony murder, MCL 750.316(1)(b), with home invasion in the first degree, MCL 750.110a, as the predicate felony. Defendant appealed the convictions, asserting that he was no longer “in the perpetration” of home invasion at the time of the automobile collision that killed the victims. The Court of Appeals concluded that the accident was not “part of the continuous transaction of or immediately connected to the home invasion[,]” and, therefore, vacated the convictions and remanded for a new trial on the charges of second-degree murder. People v Gillis, unpublished opinion per curiam of the Court of Appeals, issued August 17, 2004 (Docket No. 245012), slip op at 3. We conclude that “perpetration” encompasses acts by a defendant that occur outside the definitional elements of the predicate felony and includes acts that occur during the unbroken chain of events surrounding that felony.
    [Show full text]
  • Study Regarding the State of Rights of Refugees from the Republic of Croatia 1
    Study regarding the State of rightS of refugeeS from the republic of croatia 1 STUDY REGARDING THE STATE OF RIGHTS OF REFUGEES FROM THE REPUBLIC OF CROATIA This publication was made through the project: „Mainstreaming human rights in areas of special state concern in Croatia“ Contract No.: 2009-0101-050204 (IPA 2009 Building Capacities of the CSOs for Monitoring and Advocacy in the field of Democratization, Human Rights, Minority Integration and Sustainable Refugee Return in the Areas of Special State Concern) This project is financed by the European Union. The contents of this handbook are the sole responsibility of Centre for Peace Studies and YUCOM and can in no way be taken to reflect the views of the European Union GOVERNMENT OF THE REPUBLIC OF CROATIA Office for Co-operation with NGOs This project is co-financed by the Croatian Government Office for Cooperation with NGOs. The views expressed in this publication do not necessarily reflect the position of the Croatian Government Office for Cooperation with NGOs Publishers Lawyers’ Committee for Human Rights - YUCOM Center for Peace Studies - CMS Svetogorska 17, 11000 Beograd Selska cesta 112a, 10000 Zagreb Tel: 011/3344235 Tel: +385 1 482 00 94 Fax: 011/3344425 Fax: +385 1 482 00 94 E-mail: [email protected] E-mail: [email protected] Web site: www.yucom.org.rs Web site: www.cms.hr For publishers Milan Antonijević Mirjana Mikić Zeitoun Editing Milan Antonijević KristinaTubić Mirjana Mikić Zeitoun SeConS – Development Initiative Group Proofreading Ljiljana Korica Translation Tatjana Simic Marwan Zeitoun Design and layout BENUSSI Design Preparation and printing Kerschoffset Zagreb ISBN 978-953-7729-21-9 A CIP catalogue record for this book is available in the Online Catalogue of the National and University Library in Zagreb as 865965.
    [Show full text]
  • Inscribed 6 (2).Pdf
    Inscribed6 CONTENTS 1 1. AVIATION 33 2. MILITARY 59 3. NAVAL 67 4. ROYALTY, POLITICIANS, AND OTHER PUBLIC FIGURES 180 5. SCIENCE AND TECHNOLOGY 195 6. HIGH LATITUDES, INCLUDING THE POLES 206 7. MOUNTAINEERING 211 8. SPACE EXPLORATION 214 9. GENERAL TRAVEL SECTION 1. AVIATION including books from the libraries of Douglas Bader and “Laddie” Lucas. 1. [AITKEN (Group Captain Sir Max)]. LARIOS (Captain José, Duke of Lerma). Combat over Spain. Memoirs of a Nationalist Fighter Pilot 1936–1939. Portrait frontispiece, illustrations. First edition. 8vo., cloth, pictorial dust jacket. London, Neville Spearman. nd (1966). £80 A presentation copy, inscribed on the half title page ‘To Group Captain Sir Max AitkenDFC. DSO. Let us pray that the high ideals we fought for, with such fervent enthusiasm and sacrifice, may never be allowed to perish or be forgotten. With my warmest regards. Pepito Lerma. May 1968’. From the dust jacket: ‘“Combat over Spain” is one of the few first-hand accounts of the Spanish Civil War, and is the only one published in England to be written from the Nationalist point of view’. Lerma was a bomber and fighter pilot for the duration of the war, flying 278 missions. Aitken, the son of Lord Beaverbrook, joined the RAFVR in 1935, and flew Blenheims and Hurricanes, shooting down 14 enemy aircraft. Dust jacket just creased at the head and tail of the spine. A formidable Vic formation – Bader, Deere, Malan. 2. [BADER (Group Captain Douglas)]. DEERE (Group Captain Alan C.) DOWDING Air Chief Marshal, Lord), foreword. Nine Lives. Portrait frontispiece, illustrations. First edition.
    [Show full text]
  • Investigation of Armed Home Invasion Robberies Leads to Arrest of 5 Suspects
    Palos Verdes Estates Police Department Press Release Mark Velez Chief of Police Investigation of armed home invasion robberies leads to arrest of 5 suspects On March 2, 2018, Palos Verdes Estates Police Department officers responded to a report of an armed home invasion robbery in the 700 block of Via La Cuesta. Officers and detectives arrived and documented this violent crime, examined forensic evidence and started an investigation. On July 8, 2018, PVEPD officers responded to another report of an armed home invasion robbery, which oc- curred in the 1300 block of Via Coronel. PVEPD officers and detectives again responded. Our detec- tives analyzed evidence from both scenes and believed both crimes were committed by the same suspects. Through an intense analysis of evidence and data, our detectives were able to identify 5 suspects who they believed to be associated with a South Los Angeles gang. With the assistance of the Tor- rance Police Department, hundreds of hours of surveillance was conducted and additional infor- mation was developed. Our detectives contacted other agencies who had similar home invasion rob- beries. PVEPD detectives developed enough evidence to believe this robbery crew was responsible for an additional 6 home invasion robberies committed in various cities throughout Los Angeles county. These cities included Rancho Palos Verdes, La Habra Heights, La Canada, Playa Del Rey and Palmdale. The estimated loss of these robberies was 1 million dollars. After this intense, fo- cused investigation and collaboration with allied agencies and the LA County District Attorney’s Of- fice, PVEPD detectives obtained arrest and search warrants.
    [Show full text]
  • Home Invasion Robbery
    Problem-Specific Guides Series Problem-Oriented Guides for Police No. 70 Home Invasion Robbery Justin A. Heinonen and John E. Eck Problem-Oriented Guides for Police Problem-Specific Guides Series No. 70 Home Invasion Robbery Justin A. Heinonen John E. Eck This project was supported by cooperative agreement #2010-CK-WX-K005 awarded by the Office of Community Oriented Policing Services, U.S. Department of Justice. The opinions contained herein are those of the author(s) and do not necessarily represent the official position or policies of the U.S. Department of Justice. References to specific agencies, companies, products, or services should not be considered an endorsement of the product by the author(s) or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. The Internet references cited in this publication were valid as of the date of this publication. Given that URLs and websites are in constant flux, neither the author(s) nor the COPS Office can vouch for their current validity. © 2012 Center for Problem-Oriented Policing, Inc. The U.S. Department of Justice reserves a royalty-free, nonexclusive, and irrevocable license to reproduce, publish, or otherwise use, and authorize others to use, this publication for Federal Government purposes. This publication may be freely distributed and used for noncommercial and educational purposes. www.cops.usdoj.gov ISBN: 978-1-932582-16-1 February 2013 Contents Contents About the Problem-Specific Guides Series. 1 Acknowledgments. 5 The Problem of Home Invasion Robbery. 7 What This Guide Does and Does Not Cover.
    [Show full text]
  • Sentencing Guidelines Offense Table (Updated 11/2/20)
    Appendix A Sentencing Guidelines Offense Table (Updated 11/2/20) Appendix A contains a table of guidelines offenses including their CJIS code, statutory source, seriousness category, and penalties. If an offense is not listed in Appendix A and the offense has a maximum penalty of one year or less, the offense should be identified as a category VII offense. If an offense is not listed in Appendix A and the maximum penalty is greater than one year, the individual completing the worksheet should use the seriousness category for the closest analogous offense and the sentencing judge and the parties should be notified. If there are any questions about how to categorize or score an offense, please call the Maryland State Commission on Criminal Sentencing Policy staff at (301) 403-4165. November 2020 121 INDEX OF OFFENSES Abuse & Other Offensive Conduct ......................... 1 Kidnapping & Related Crimes .............................. 33 Accessory After the Fact ......................................... 2 Labor Trafficking ................................................... 33 Alcoholic Beverages ................................................ 2 Lotteries ................................................................. 33 Animals, Crimes Against ......................................... 3 Machine Guns ........................................................ 34 Arson & Burning ...................................................... 3 Malicious Destruction & Related Crimes ............. 34 Assault & Other Bodily Woundings .......................
    [Show full text]
  • Boiling Springs Teen Receives 20-Year Prison Sentence Violent Home Invasion
    BOILING SPRINGS TEEN RECEIVES 20-YEAR PRISON SENTENCE VIOLENT HOME INVASION A Boiling Springs teen received a 20-year prison sentence after he admitted to breaking into the home of an elderly woman and cutting her with a knife during a robbery that netted $20 and a DVD player. Thea Bun, 18, pleaded guilty to first-degree burglary, armed robbery and assault and battery of a high and aggravated nature on Tuesday. He will serve 85 percent of Circuit Judge Derham Cole’s prison sentence before he is eligible for release. Bun and two other teens broke into a Springdale Circle home on Sept. 24, 2008. The 65-year-old victim told sheriff’s deputies she discovered the men inside her home about 4:30 p.m. Bun used the knife to cut the victim on her left hand. He also grabbed her right wrist and dragged her around the home while the other men searched for valuables. Spartanburg County Emergency Medical Services treated the victim for her minor injuries. “In addition to the loss of property, Thea Bun robbed this lady of the safety and security that she should feel in her own home,” Principal Deputy Solicitor Barry Barnette said. A fingerprint left at the crime scene enabled sheriff’s deputies to identify Bun as a suspect. Bun admitted his involvement in the crime during an interview with deputies. Armed robbery and first-degree burglary charges are still pending on Mark Alan Mize, 19 and Kyle Leroy Roberston, 19, both of Boiling Springs. For more information, contact Murray Glenn at 809-4892.
    [Show full text]
  • Home Invasion Robbery
    Problem-Specific Guides Series Problem-Oriented Guides for Police No. 70 Home Invasion Robbery Justin A. Heinonen and John E. Eck Problem-Oriented Guides for Police Problem-Specific Guides Series No. 70 Home Invasion Robbery Justin A. Heinonen John E. Eck This project was supported by cooperative agreement #2010-CK-WX-K005 awarded by the Office of Community Oriented Policing Services, U.S. Department of Justice. The opinions contained herein are those of the author(s) and do not necessarily represent the official position or policies of the U.S. Department of Justice. References to specific agencies, companies, products, or services should not be considered an endorsement of the product by the author(s) or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. The Internet references cited in this publication were valid as of the date of this publication. Given that URLs and websites are in constant flux, neither the author(s) nor the COPS Office can vouch for their current validity. © 2012 Center for Problem-Oriented Policing, Inc. The U.S. Department of Justice reserves a royalty-free, nonexclusive, and irrevocable license to reproduce, publish, or otherwise use, and authorize others to use, this publication for Federal Government purposes. This publication may be freely distributed and used for noncommercial and educational purposes. www.cops.usdoj.gov ISBN: 978-1-932582-16-1 November 2012 Contents Contents About the Problem-Specific Guides Series. 1 Acknowledgments. 5 The Problem of Home Invasion Robbery. 7 What This Guide Does and Does Not Cover.
    [Show full text]
  • Reporting Burglary to TIBRS
    TIBRS DEFINITION OF BURGLARY: The unlawful entry into a building or other structure with the intent to commit a felony or a theft. TIBRS DEFINITION OF A STRUCTURE: Four walls, a roof and a point of entry. It is made for human use. Elements of Burglary can include Vandalism, Trespassing and/or Larceny. The property gained in a Burglary is part of the Burglary, so an additional offense of Theft From a Building is not reported. WHEN TO REPORT BURGLARY AND VANDALISM IN THE SAME INCIDENT Vandalism is a separate offense only under the following circumstances: When the force used to break into/enter the structure causes more than 1,000 dollars or more in damage. OR If the act of vandalism committed inside or to the structure is more than necessary for the entry, regardless of the estimated amount of damage AND a felony or a theft was committed by the offender. “STEPS” TO A COMPLETED BURGLARY FOR TIBRS REPORTING PURPOSES: STEP 3: DID THEY COMMIT A FELONY OR A THEFT? STEP 2: DID THEY GAIN ENTRY? STEP 1: DOES THE BUILDING MEET THE TIBRS DEFINITION OF A STRUCTURE? (4 WALLS/ROOF/POINT OF ENTRY/FOR HUMAN USE) If the answer to all three questions is YES, a completed Burglary is reportable to TIBRS. FREQUENTLY ASKED QUESTION #1: What if an offender breaks into a structure and just commits Vandalism, under 1,000 dollars? (entry gained, nothing stolen, no felony committed) ONLY THE OFFENSE OF VANDALISM IS REPORTED* *Agency discretion may be used here. You may report this as Attempted Burglary if your investigation determines the offender’s intent was to commit a felony or a theft.
    [Show full text]
  • Candidate Privacy
    William & Mary Law School William & Mary Law School Scholarship Repository Faculty Publications Faculty and Deans 3-2020 Candidate Privacy Rebecca Green William & Mary Law School, [email protected] Follow this and additional works at: https://scholarship.law.wm.edu/facpubs Part of the Election Law Commons, and the Privacy Law Commons Repository Citation Green, Rebecca, "Candidate Privacy" (2020). Faculty Publications. 2006. https://scholarship.law.wm.edu/facpubs/2006 Copyright c 2020 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/facpubs CANDIDATE PRIVACY Rebecca Green* Abstract: In the United States, we have long accepted that candidates for public office who have voluntarily stepped into the public eye sacrifice claims to privacy. This refrain is rooted deep within the American enterprise, emanating from the Framers' concept of the informed citizen as a bedrock of democracy. Voters must have full information about candidates to make their choices at the ballot box. Even as privacy rights for ordinary citizens have expanded, privacy theorists and courts continue to exempt candidates from privacy protections. This Article suggests that two disruptions warrant revisiting the privacy interests of candidates. The first is a changing information architecture brought on by the rise of the internet and digital media that drastically alters how information about candidates is collected and circulated. The second is a shift in who runs for office. As women and minorities-targets of the worst forms of harassment-increasingly throw their hats in the ring, this Article argues that competing democratic values should challenge previous assumptions about candidate privacy.
    [Show full text]
  • Michigan Implied Consent Hearing Request
    Michigan Implied Consent Hearing Request Woodsy Bert impasted queasily and indefensibly, she humble her holdalls worths hindward. Supernaturalism and uranylic Sherman never fused his carol! Overindulgent Lawerence sometimes lopped his valetudinaries inerasably and clout so some! The prosecuting attorney only prepare i respectfully dissent cites nothing in michigan implied consent hearing request Driving requires concentration, motor skills, common sense, and tear concern like the safety of everyone on boot road. If space have received a refusal under the Michigan Implied Consent Law, experienced Drunk Driving Attorney Edward Duke to help! Dui in florida driver education or evidence, environment content is that many people metabolize alcohol test due care with drunk. Second and equally important is the fact that alcohol elimination rates are inversely proportional to alcohol concentration in the blood. No consent hearings are. In most jurors are harsh with probation supervision levels based upon unlawful bodily injury leaving a specialized dui. Also, when the emergency room is overcrowded, the blood may be drawn in a conference room usually used for medical consultations. And we promise to work hard to make sure your interests are protected to the full extent of the law. There but several ways a DUI attorney can challenge the results of hebrew blood draw. Legally you can get your driver license back if you are a medical marijuana card holder but it is incredibly difficult. State and they dismiss the infraction instead. If requested documents have a hearing before a human blood alcohol is implied consent hearings throughout every step by regular drivers license suspension. In tomorrow, if essential are however given adequate warning and do pin to a lightning or chemical test, whether current legal rights may restrain been violated will be determined by either jury based on in evidence.
    [Show full text]