...pages [1986] 1 MLJ 512 PUBLIC PROSECUTOR v PARAM CUMARASWAMY OCJ KUALA LUMPUR CHAN J FEDERAL TERRITORY CRIMINAL TRIAL NO 39 OF 1985 3 January 1986 Criminal Law and Procedure -- Charge of sedition -- Close of prosecution case -- Whether prima facie case made out -- Sedition Act, 1948, ss. 3(1) & 4(1) -- Criminal Procedure Code (F.M.S. Cap. 6), s. 180 -- Federal Constitution, art. 10 1986 1 MLJ 512 at 513 In this case the respondent was charged with uttering seditious words, an offence under the Sedition Act, 1948. At the close of the prosecution case, counsel submitted that there was no case to answer. Held: (1) all that is required at the close of the prosecution case is for the prosecution to discharge their evidential burden by adducing sufficient evidence to raise a prima facie case against the accused. At that stage, a trial judge should not consider whether or not a case has been proved beyond a reasonable doubt against the accused. If no evidence is called for the defence, then, and then only, the tribunal of fact must decide whether the prosecution has succeeded in discharging the persuasive burden by proving its case beyond a reasonable doubt; (2) in this case the prosecution has discharged their evidential burden by adducing evidence of primary facts. The accused must therefore be called to enter on his defence. Cases referred to Haw Tua Tau v Public Prosecutor [1981] 2 MLJ 49 Reg v Burns & Ors (1886) 16 Cox CC 355 Wallace-Johnson...
Words: 4723 - Pages: 19
...DIGEST OF CRIMINAL PROCEDURE CODE Criminal Procedure Code, 1973, S.2(g) - Inquiry - “Every inquiry, other than a trial, conducted under this Code by a magistrate or court” refers to the pre trial inquiry. (Pritish Vs State of Maharashtra) 2002(2) Criminal Court Cases 174 (S.C.) Criminal Procedure Code, 1973, S.2(g) - Inquiry - Trial - Inquiry is defined by section 2 (g) as 'every inquiry, other than a trial' - Trial not defined - Trial is clearly distinguishable from inquiry - Trial is distinct from inquiry and inquiry must always be a forerunner to the trial. (Moly & Anr. Vs. State of Kerala ) 2004(2) Criminal Court Cases 514 (S.C.) Criminal Procedure Code, 1973, S.2(g) - Trial and enquiry - Distinction - Trial is distinct from inquiry and inquiry must always be a forerunner to the trial. (Vidyadharan Vs State of Kerala) 2004(1) Criminal Court Cases 516 (S.C.) Criminal Procedure Code, 1973, S.2(h) - “Investigation” - It includes all the proceedings under the Code for the collection of evidence conducted by a police officer or by any person (other than a Magistrate) who is authorised by a Magistrate in this behalf - It ends with the formation of the opinion as to whether on the material collected, there is a case to place the accused before a Magistrate for trial and if so, taking the necessary steps for the same by filing of a charge-sheet under Section 173 Cr.P.C. (Union of India Vs Prakash P.Hinduja & Anr.) 2003(2) Apex Court Judgments 205 (S.C.) Criminal...
Words: 1257 - Pages: 6
...secretary of the bendahara and treasurer. Second, there was the shahbandar or harbour master. Since there are four main groups of traders which came from China and the Far East, Java and the Malay Archipelago, west India and also from the south-east India, hence, there were four shahbandar that attended to this group of traders. And last but not least, there was the mandulika or governor of an isolated outpost, who exercised civil and criminal...
Words: 1733 - Pages: 7
...------------------------------------------------- Top of Form Bottom of Form A Guide to India’s Legal Research and Legal System By Dr. Rakesh Kumar Srivastava Dr. R.K. Shrivastava is presently Chief Librarian at the Supreme Court of India, New Delhi. He has more than twenty-four years of experience in the field of law librarianship in India. He has a degree in Law, a Postgraduate degree in Library & Information Science and a Doctorate degree in Library & Information Science. He has been a guest faculty member in many institutions, an academic counsellor of Indira Gandhi National Open University (IGNOU) and the Rajarishi Tandon Open University, Allahabad. He has been an Honorary Principal of School of Law of Library Science, Lucknow for more than 15 years. He is a member of many professional bodies, including his service as the General Secretary of the U.P. Library Association and the Vice-President of the Indian Library Association. Due to his work in the field of law librarianship, he has been awarded by the U.P. Government. He is presently a member of the Academic Council, Hidayatullah National Law University, Raipur. He recently delivered lectures on legal research methodology in National Judicial Academy, Bhopal and Karnataka Judicial Academy, Bangalore, Academic Staff College, Jamia Milia Univesity and in Ranganathan Research Circle, New Delhi. He has published more than fifty papers on various aspects of library and information science and law...
Words: 7075 - Pages: 29
...Suicide Physician-assisted suicide also known as PAS, is a controversial topic everywhere; some believe if a patient is terminally ill then it should be permissible while others believe it is against their beliefs and religion to commit any type of suicide. Physician-assisted suicide is when a patient requests the help of digesting a lethal drug to quicken their death (United States Physician Assisted Suicide Law Summary and Law Digest par. 1). The most common patients to request assisted suicide are patients with cancer and AIDs. Active euthanasia is sometimes also considered physician-assisted suicide because it results in death from someone purposely doing something to the patient causing them to die; such as being injected with poison. Passive euthanasia is the withholding of a medical treatment for a patient, which is legal, but many come to be disagreed upon. Withholding food and water, turning off machines, and failing to resuscitate are prime examples of passive euthanasia (United States Physician Assisted Suicide Law Summary and Law Digest par. 1). There are currently three states that permit physician-assisted suicide, Washington and Oregon. On October 27, 1997, the Death with Dignity Act was passed in Oregon. The Death with Dignity Act states that an Oregonian that is terminally-ill has the right to voluntarily, self-administrate lethal medications with a prescription from their physician. On March 5, 2009, Washington passed the Death with Dignity Act and on December...
Words: 1883 - Pages: 8
...Physician-assisted suicide (PAS), also known as active euthanasia; involves the hastening of death through administration of a lethal dose of pharmaceutical drugs, at the request of the terminally-ill patient (Law Digest, 2013). This practice fueled debates about legal and ethical practices in the medical field. Suffering has always been a part of human existence, along with request’s to end these conditions. Death through PAS or euthanasia has been continuously controverted since the beginning of medicine. Advocates of physician assisted suicide feel they have the right to avoid excruciating pain, prolonged suffering, and embrace a timely and dignified death. Adversaries of PAS contend that physicians have a moral responsibility to keep their patients alive as determined in the Hippocratic Oath (one of the oldest binding documents written in history, still bring used by physicians). In 1990, Physician- Assisted Suicide became better known to the public when retired pathologist, Dr. Jack Kevorkian assisted his first patient, Janet Adkins, into death. News of Adkins’ death made him a national celebrity and criminal, but ultimately encouraged Kevorkian to rebel and proceed with what he considered, his duty. Murad Kevorkian, better known as Dr. Jack Kevorkian was born on May 26, 1928, in Pontiac, Michigan. He was the middle of 3 children (two girls and himself), born to Levon and Satenig Kevorkian; Armenian immigrants and refugees. Jack had appreciation for his strict...
Words: 1955 - Pages: 8
...development, considering the local political implications of shifts at the national and global scales. Taking the case of Mumbai, this article examines how the past 15 years of political reforms in India have reshaped property markets and the politics of land development. Among the newly empowered actors, local criminal syndicates, often with global connections, have seized political opportunities created by these shifts to gain influence over land development. The rise of Mumbai's organized criminal activity in the 1950s was closely linked to India's macroeconomic policies, with strict regulation of imports fuelling the growth of black market smuggling. Liberalization and deregulation since the early 1990s have diminished demand for smuggled consumer goods and criminal syndicates have since diversified their operations. With skyrocketing real estate prices in the 1990s, bolstered by global land speculation, the mafia began investing in property development. Supported by an illicit nexus of politicians, bureaucrats and the police, the mafia has emerged as a central figure in Mumbai's land development politics. The article examines the structural shifts that facilitated the criminalization of land development and the implications of mafia involvement in local politics. The efforts of this article were to examine informal governance structures in conjunction with criminal activity on...
Words: 1092 - Pages: 5
...India should be ascertained , consolidated and amended . accordingly, it was enacted that the governor general in council should as soon as convenient as soon as passing the act issue a commission to such persons as the court of directors with the approbations of the Board of Commissioners “shall recommend ate for that purpose and to such other persons, if necessary as the said governor general in council shall think fit. These person was to constitute the Indian Law Commission they were not to exceed five at one time. The law commissioners were required to inquire fully into the jurisdictions, powers and the rules of the existing courts of Justice and police establishments in the British territories, and all existing forms of judicial procedure, and into...
Words: 1890 - Pages: 8
... The Death Penalty - Public Safety vs. Individual Rights Introduction This paper will focus on the criminal justice system, public safety and civil rights in specific relation to the death penalty as a form of punishment and its effects on society. The execution of criminals and the effects on society are most intriguing and can be debated upon both for and against the issue give a thorough elaboration on criminal executions and the effects on society. In this day and age, research not only illustrates that the death penalty is complex, in more ways than one, but has also raised questions about its relations to deterring crime and the financial impact it has on society. Using current and historical information, such as articles and scholarly articles, to support why this research is important and possible methods society could use to help improve this controversial debate. Summary The Orange County register printed an article on the death penalty and possibly being considered as immoral. “While the commission drops the dime on the mind-numbing cost of administering the death penalty, it barely hints at the moral and ethical depravity of the practice” (Mears, 2008). The article states that there are racial and socioeconomic bias towards the death penalty and how this can and may lead to a cause for concern among citizens. This seems to initiate that in most cases the targets of race are African American and Hispanics/Latinos, which actually happens to be the minority...
Words: 1072 - Pages: 5
...Survey Paper on Secure Electronic Transaction (SET) By Contents ABSTRACT: 3 INTRODUCTION: 3 BACKGROUND 6 DESIGN AND IMPLEMENTATION 7 CONCLUSION 15 REFERENCES 16 ABSTRACT: Security of electronic exchange over unstable communication channel is a testing task that incorporates numerous discriminating areas as secure communicating channel,strong encryption procedure and trusted outsider to keep up the electronic database. The traditional systems for encryption in Secure Electronic Transaction can just keep up the information security. The restricted data of client could be accessed by the unapproved client for pernicious reason. Accordingly, it is important to apply successful encryption techniques to upgrade data security and authentication of data communication. The numerous encryption methods gives sufficient security to electronic exchanges over remote system. In this survey paper the needs of various encryption procedure in Secure Electronic Transactions are proposed to upgrade the security of data confidentiality. This method builds the data security in such a way, to the point that unauthorized user cannot get to any piece of data over wireless network as web. INTRODUCTION: Secure Electronic Transaction (SET) is a standard protocol for securing credit card transactions over compromised networks, particularly, the Internet. SET is a set of rules and regulations that empower clients to perform financial transactions through...
Words: 3019 - Pages: 13
...Computer Intrusion Forensics Research Paper Nathan Balon Ronald Stovall Thomas Scaria CIS 544 Abstract The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investigation. It is not enough to simple know an attacker is responsible for the crime, the forensics investigation must be carried out in a precise manner that will produce evidence that is amicable in a court room. For computer intrusion forensics many methodologies have been designed to be used when conducting an investigation. A computer forensics investigator also needs certain skills to conduct the investigation. Along with this, the computer forensics investigator must be equipped with an array of software tools. With the birth of the Internet and networks, the computer intrusion has never been as significant as it is now. There are different preventive measures available, such as access control and authentication, to attempt to prevent intruders. Intrusion detection systems (IDS) are developed to detect an intrusion as it occurs, and to execute countermeasures when detected...
Words: 9608 - Pages: 39
...AVIATION SAFETY PROGRAM EASTERN SKY AIRLINES DIEGO LUIS PALACIN ENDERS INDEX 1. SECTION ONE: SAFETY POLICY 2. SECTION TWO: SAFETY AND HEALTH RESPONSIBILITIES 3. SECTION THREE: EMPLOYEE PARTICIPATION 4. SECTION FOUR: SAFETY RULES AND REGULATIONS 5. SECTION FIVE: DISCILINARY POLICY 6. SECTION SIX: HAZARD RECOGNITION, PREVENTION AND CONTROL 7. SECTION SEVEN: ACCIDENT/INCIDENT REPORTING 8. SECTION EIGHT: EMERGENCY PLANING AND RESPONSE 9. SECTION NINE: SAFETY AND HEALTH TRAINING AND EDUCATION 10. SECTION TEN: SAFETY AND HEATH ASSISTANCE RESOURCES 11. SECTION ELEVEN: CONTACT INFORMATION SECTION ONE SAFETY POLICY Safety is a team effort – Let us all work together to keep this a safe and healthy workplace Eastern Sky Airlines places high value on the safety of its employees and passengers. Eastern Sky Airlines is committed to providing a safe workplace for all employees and has developed this Aviation Safety Program for injury and accident prevention to involve management, supervisors, and employees in identifying and eliminating or reducing hazards that may develop during ground or air operations. Eastern Sky Airlines Safety Program objective is to create a safety culture in which we stress to all employees that safety is as important as any other business function. Only thought the joint commitment on the part of management and employees can workplace accidents and injuries be reduced or eliminated. Employees should be encouraged to not only work safely...
Words: 3713 - Pages: 15
...1899. The two basic principles on which the court juvenile court were founded are one, and juveniles were not mature enough to take responsibility of their actions compared to adults and two, it was easier to rehabilitate juveniles as compared to adult criminals (Grisso & Schwartz, 2000). In more than a century, these principles remained the benchmarks of the juvenile courts as they expanded from Chicago, their original birthplace, into other states and eventually in other parts of the world. However, in the recent year rising incidences of juvenile criminals being tried as adults has increased as it was before the advent of the first juvenile court. Much of this stems from the public outrage against the children who, in high numbers, are engaging in violent crimes. Many countries have adopted legislation that permits them to juveniles to be tried as adults. In some countries, there are provisions that allow prosecutors to try children as young as 14 years under certain circumstances (Grisso & Schwartz, 2000). Juvenile courts establishment aimed at separating the youthful offenders from the adult criminals and thereafter processing and rehabilitating them in forgiving and less punitive manner compared to the adult criminal system (Redding & Fuller, 2004). The main reason behind the distinction is because the juveniles are developmentally different from adult in the sense of underdeveloped self-control, increased vulnerability and influence from the outside i.e. peer pressure...
Words: 3034 - Pages: 13
...TEAM CODE ------------------------------------------------- IN THE HONOURABLE PUNJAB & HARYANA HIGH COURT Memorial Filed On Behalf Of the Appellant Criminal Appeal no. : /2015 IN THE MATTER OF STATE OF PUNJAB APPELLANT VERSUS DR. MUKESH & OTHERS RESPONDENT ------------------------------------------------- APPEAL FILED UNDER SECTION 378 OF THE CODE OF CRIMINAL PROCEDURE, 1973 ------------------------------------------------- Most Respectfully Submitted to the Hon’ble Judges of the Punjab & Haryana High Court ------------------------------------------------- COUNSELS APPEARING ON BEHALF OF ‘APPELLANT’ Table of Contents Abbreviations III Index of Authorities IV Statement of Jurisdiction VII Statement of Facts VIII Charges Framed XI Summary of Arguments XII Whether the accused is liable under section 302 of IPC to be read with Section 34 of IPC or not XII Whether the accused is liable under section 364 read with section 34 of IPC or not XII Whether the accused is liable under section 18 of Transplantation of Human Organs Act, 1944 or not? XII Arguments 1 1. Whether the accused is liable under section 302 of IPC to be read with Section 34 of IPC or not 1 2. Whether the Accused liable under section 302 of IPC or Not. 2 3. Whether the accused is liable under section 18 of Transplantation...
Words: 4615 - Pages: 19
...Supreme Court of the United States David Leon RILEY, Petitioner v. CALIFORNIA. United States, Petitioner v. Brima Wurie. Nos. 13–132, 13–212. Argued April 29, 2014. Decided June 25, 2014. Background: In two cases consolidated for appeal, first defendant was convicted by a jury in the Superior Court, San Diego County, Laura W. Halgren, J., of various crimes related to drive-by shooting, and he appealed based on his challenge to evidence found during police officers' warrantless search of data stored on his cell phone. The California Court of Appeal, 2013 WL 475242,[->0] affirmed. Second defendant was charged with drug- and weapon-related crimes, and the United States District Court for the District of Massachusetts, Stearns, J., 612 F.Supp.2d 104,[->1] denied his motion to suppress evidence found during warrantless search of data stored on his cell phone, and defendant appealed. The United States Court of Appeals for the First Circuit, Stahl, Circuit Judge, 728 F.3d 1,[->2] reversed. Certiorari was granted. Holdings: The Supreme Court, Chief Justice Roberts[->3], held that: (1) interest in protecting officers' safety did not justify dispensing with warrant requirement for searches of cell phone data, and (2) interest in preventing destruction of evidence did not justify dispensing with warrant requirement for searches of cell phone data. Judgment of California Court of Appeal reversed and remanded, and judgment of First Circuit affirmed. Justice Alito...
Words: 24946 - Pages: 100