Front | Back |
What is Business Crime?
|
- The crimes within a corporation
- The crimes against a corporation |
Who is liable for Business Crime?
|
-Corporation is Liable
-Officers and Directors are liable if 1. They authorized the conduct 2. They knew about the conduct and did nothing |
White-Collar Kingpin Act
|
Federal law imposes minimum federal mandatory sentences on corporate officers.
|
2002 Sarbanes-Oxley (White-Collar Criminal Penalty Enhancement Act)
|
1. Increases penalties
2. Creates new crimes for certification of false financial statements. 3. Increased penalties for obstruction, mail, and wire fraud. 4. Scrushy first CEO tried, but not convicted. |
Actus Reus
|
The act of the crime.
Example: The desire to trade on inside information is not a crime until you actually trade on it. |
Mens Rea
|
The intent of the crime.
|
Scienter
|
Attempt to deceive/defraud.
|
Securities Exchange Act of 1934
|
Insider trades on information about the company when that information is not known to public.
Tippee - Gets info straight from insider Can get in trouble for being a tippee, if over heard the info and was not told directly, then not liable. |
Dow Chemical Case
|
Delt with evidence that is in plain sight can be obtained by anyone.
|
Probable Cause Requirements
|
-Search warrant
-Reasonable expectations of privacy -Business Records? -"Pleading the 5th" -Miranda (The other guys) |
US v Park
|
Rodents in ACME warehouses
-delegation is not a defense in this case. |
Obstruction of Justice
|
(Martha Stewart was charged and convicted of this)
1. Intent to impede, obstruct, or influence investigation or administration of justice. 2. Auditors must retain work papers for 5 years. 3. Felony - 10 years 4. Frank Quattrone and Andersen convicted. |
Theft and Embezzlement
|
1. Intent to take property
2. Actual taking of property for permanent use 3. No authorization to take the property |
Categories of Computer Crime
|
A. Unauthorized use of computers or computer-related equipment.
b. Alteration or destruction of computers, files, programs, or data. c. Entering fraudulent records or data. d. Use of computers to convert ownership of funds, financial instruments, property, services, or data. |
Computer crimes that involve the computer as a victim
|
A. Theft of hardware (crime of theft)
b. Theft of software (larceny, infringement, or specialized statutes) c. Intentional damage -physical destruction -intentionally planting a bug or virus -often covered by state statutes on viruses on bugs |