...AS LAW MODEL ANSWERS Define the actus reus of a crime (7 mins) The actus reus is the physical and external part of a crime. It means the guilty act. The actus reus must be a positive and voluntary act as illustrated in the case of Hill vs Baxter. In this case the judge said that driving whilst fighting off a swarm of bees would prevent the act from being voluntary, therefore preventing the actus reus from being satisfied. If the actus reus of a crime is not satisfied the defendant can never be found guilty. However there are six situations where a failure to act (omission) will satisfy the actus reus of a crime. These are exceptions to the rule in Hill v Baxter that the act committed must be positive. A person will have a duty to act if they assume the duty voluntarily, as illustrated in Stone v Dobinson, where the defendants failed to provide adequate care for their aunt when they said they would look after her. Pittwood illustrates that a contract can require a person to act, in this case the defendant failed to shut a gate, causing death, which he was required to under contract. In Miller the defendant created a dangerous situation and satisfied the actus reus of a crime as he did not take any steps to extinguish a fire which he created. In Dytham the policeman held an official position, which required him to act, therefore he was guilty of misconduct when he failed to act while someone got kicked to death. Gibbins v Proctor illustrates that parents have a duty...
Words: 1220 - Pages: 5
...COMPUTER CRIME OUTLINE SUBSTANTIVE COMPUTER CRIMES I. Intro A. Categories of Substantive Computer Crime Law 1. computer misuse crimes = intentional interference w/proper functioning of computers (hackers, viruses) 2. traditional crimes = traditional criminal offenses facilitated by computers (gambling, pornography) B. Computer Crime v. Traditional 1. computer crime usually threatens economic interests more than physical 2. computer crime much more likely to cross state boundaries; most traditional crime is dealt with by the states II. COMPUTER MISUSE CRIMES A. 2 ways they can occur 1. user exceeds his own privileges a. “insider”: has some privileges/rights 2. user denies privileges to others b. may be an “outsider”: no access rights B. Most Common Statutes 1. unauthorized access statutes 2. computer fraud statutes 3. computer damage statutes C. Why Punish? 1. utilitarian: deterrence of harmful conduct, incapacitation, rehabilitation (looks forward) 2. retribution: just deserts; restore moral order (looks back) D. The Hacker Ethic: an open and free approach to using and exploring computers; any computer user has the right to tinker with and improve any computer; rules governing access should NOT be followed 1. misuse can improve security E. How or When to Punish 1. Property-based view: the computer is not yours, so if you break in you should be...
Words: 16552 - Pages: 67
...Advance Edited Version Distr. GENERAL A/HRC/12/48 15 September 2009 Original: ENGLISH HUMAN RIGHTS COUNCIL Twelfth session Agenda item 7 HUMAN RIGHTS IN PALESTINE AND OTHER OCCUPIED ARAB TERRITORIES Report of the United Nations Fact Finding Mission on the Gaza Conflict ∗ ∗ Late submission A/HRC/12/48 page 2 Paragraphs Page EXECUTIVE SUMMARY PART ONE INTRODUCTION I. II. III. METHODOLOGY CONTEXT EVENTS OCCURRING BETWEEN THE “CEASEFIRE” OF 18 JUNE 2008 BETWEEN ISRAEL AND THE GAZA AUTHORITIES AND THE START OF ISRAEL’S MILITARY OPERATIONS IN GAZA ON 27 DECEMBER 2008 IV. APPLICABLE LAW PART TWO OCCUPIED PALESTINIAN TERRITORY: THE GAZA STRIP Section A V. VI. THE BLOCKADE: INTRODUCTION AND OVERVIEW OVERVIEW OF MILITARY OPERATIONS CONDUCTED BY ISRAEL IN GAZA BETWEEN 27 DECEMBER 2008 AND 18 JANUARY 2009 AND DATA ON CASUALTIES ATTACKS ON GOVERNMENT BUILDINGS AND POLICE VIII. OBLIGATION ON PALESTINIAN ARMED GROUPS IN GAZA TO TAKE FEASIBLE PRECAUTIONS TO PROTECT THE CIVILIAN POPULATION VII. A/HRC/12/48 page 3 IX. OBLIGATION ON ISRAEL TO TAKE FEASIBLE PRECAUTIONS TO PROTECT CIVILIAN POPULATION AND CIVILIAN OBECTS IN GAZA X. INDISCRIMINATE ATTACKS BY ISRAELI ARMED FORCES RESULTING IN THE LOSS OF LIFE AND INJURY TO CIVILIANS XI. DELIBERATE ATTACKS AGAINST THE CIVILIAN POPULATION XII. THE USE OF CERTAIN WEAPONS XIII. ATTACKS ON THE FOUNDATIONS OF CIVILIAN LIFE IN GAZA: DESTRUCTION OF INDUSTRIAL INFRASTRUCTURE, FOOD PRODUCTION, WATER INSTALLATIONS, SEWAGE...
Words: 227626 - Pages: 911