{"id":1407,"date":"2017-01-09T19:42:38","date_gmt":"2017-01-09T19:42:38","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/?post_type=chapter&#038;p=1407"},"modified":"2017-01-09T19:42:38","modified_gmt":"2017-01-09T19:42:38","slug":"categories-and-examples-of-business-crime","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/chapter\/categories-and-examples-of-business-crime\/","title":{"raw":"Categories and Examples of Business Crime","rendered":"Categories and Examples of Business Crime"},"content":{"raw":"<h1 class=\"title editable block\">Types of Crimes<\/h1>\n<div id=\"mayer_1.0-ch06_s02_n01\" class=\"learning_objectives editable block\">\n<h3 class=\"title\">Learning Objectives<\/h3>\n<ol id=\"mayer_1.0-ch06_s02_l01\" class=\"orderedlist\"><li>Categorize various types of business crimes.<\/li>\n\t<li>Name and define the major felonies in criminal law.<\/li>\n\t<li>Explain how white-collar crime differs from other crimes.<\/li>\n\t<li>Define a variety of white-collar crimes.<\/li>\n<\/ol><\/div>\n<p id=\"mayer_1.0-ch06_s02_p01\" class=\"para editable block\">Most classifications of crime turn on the seriousness of the act. In general, seriousness is defined by the nature or duration of the punishment set out in the statute. A <span class=\"margin_term\"><a class=\"glossterm\">felony<\/a><\/span> is a crime punishable (usually) by imprisonment of more than one year or by death. (Crimes punishable by death are sometimes known as capital crimes; they are increasingly rare in the United States.) The major felonies include murder, rape, kidnapping, armed robbery, embezzlement, insider trading, fraud, and racketeering. All other crimes are usually known as <span class=\"margin_term\"><a class=\"glossterm\">misdemeanors<\/a><\/span>, petty offenses, or infractions. Another way of viewing crimes is by the type of social harm the statute is intended to prevent or deter, such as offenses against the person, offenses against property, and white-collar crime.<\/p>\n\n<div id=\"mayer_1.0-ch06_s02_s01\" class=\"section\">\n<h1 class=\"title editable block\">Offenses against the Person<\/h1>\n<div id=\"mayer_1.0-ch06_s02_s01_s01_p02\" class=\"para editable block\">\n<p class=\"title editable block\">Offenses against the person can take place in the workplace. They can also<\/p>\n\n<h2 class=\"title editable block\">Homicide<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s01_s01_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Homicide<\/a><\/span> is the killing of one person by another. Not every killing is criminal. When the law permits one person to kill another\u2014for example, a soldier killing an enemy on the battlefield during war, or a killing in self-defense\u2014the death is considered the result of <span class=\"margin_term\"><a class=\"glossterm\">justifiable homicide<\/a><\/span>. An <em class=\"emphasis\">excusable homicide<\/em>, by contrast, is one in which death results from an accident in which the killer is not at fault.<\/p>\n\nManslaughter is an act of killing that does not amount to murder. Voluntary manslaughter is an intentional killing, but one carried out in the \u201csudden heat of passion\u201d as the result of some provocation. An example is a fight that gets out of hand. Involuntary manslaughter entails a lesser degree of willfulness; it usually occurs when someone has taken a reckless action that results in death (e.g., a death resulting from a traffic accident in which one driver recklessly runs a red light).<\/div>\n<div class=\"para editable block\"\/>\n<div class=\"para editable block\">While unfortunately both homicide and manslaughter can occur in the workplace, it would be exceptionally difficult to charge a corporation with either crime. Jennifer Arlen, a professor at New York University Law School who specializes in corporate crimes, explains, \"For a company to be charged with manslaughter, a few things have to happen. First, prosecutors would have to be able to find a specific person whose actions led to people dying. Second, that person would have to have taken those actions for the benefit of the company and within the scope of their employment, and have been 'in the right mental state' when they took the actions.\"<\/div>\n<div id=\"mayer_1.0-ch06_s02_s01_s02\" class=\"section\">\n<h2 class=\"title editable block\">Assault and Battery<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s01_s02_p01\" class=\"para editable block\">Ordinarily, we would say that a person who has struck another has \u201cassaulted\u201d him. Technically, that is a <span class=\"margin_term\"><a class=\"glossterm\">battery<\/a><\/span>\u2014the unlawful application of force to another person. The force need not be violent. Indeed, a man who kisses a woman is guilty of a battery if he does it against her will. The other person may consent to the force. That is one reason why surgeons require patients to sign consent forms, giving the doctor permission to operate. In the absence of such a consent, an operation is a battery. That is also why football players are not constantly being charged with battery. Those who agree to play football agree to submit to the rules of the game, which of course include the right to tackle. But the consent does not apply to all acts of physical force: a hockey player who hits an opponent over the head with his stick can be prosecuted for the crime of battery.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s01_s02_p02\" class=\"para editable block\">Criminal <span class=\"margin_term\"><a class=\"glossterm\">assault<\/a><\/span> is an <em class=\"emphasis\">attempt<\/em> to commit a battery or the deliberate placing of another in fear of receiving an immediate battery. If you throw a rock at a friend, but he manages to dodge it, you have committed an assault. Some states limit an assault to an attempt to commit a battery by one who has a \u201cpresent ability\u201d to do so. Pointing an unloaded gun and threatening to shoot would not be an assault, nor, of course, could it be a battery. The modem tendency, however, is to define an assault as an attempt to commit a battery by one with an <em class=\"emphasis\">apparent<\/em> ability to do so.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s01_s02_p03\" class=\"para editable block\">Assault and battery may be excused. For example, a bar owner (or her agent, the bouncer) may use reasonable force to remove an unruly patron. If the use of force is excessive, the bouncer can be found guilty of assault and battery, and a civil action could arise against the bar owner as well.<\/p>\n<p class=\"para editable block\"\/>\n\n<\/div>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s02\" class=\"section\">\n<h1 class=\"title editable block\">Offenses against Property<\/h1>\n<div id=\"mayer_1.0-ch06_s02_s02_s01\" class=\"section\">\n<h2 class=\"title editable block\">Theft: Larceny, Robbery, Embezzlement, False Pretenses<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p01\" class=\"para editable block\">The concept of theft is familiar enough. Less familiar is the way the law has treated various aspects of the act of stealing. Criminal law distinguishes among many different crimes that are popularly known as theft. Many technical words have entered the language\u2014burglary, larceny, robbery\u2014but are often used inaccurately. Brief definitions of the more common terms are discussed here.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p02\" class=\"para editable block\">The basic crime of stealing personal property is <span class=\"margin_term\"><a class=\"glossterm\">larceny<\/a><\/span>. By its old common-law definition, still in use today, larceny is the wrongful \u201ctaking and carrying away of the personal property of another with intent to steal the same.\u201d<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p03\" class=\"para editable block\">The separate elements of this offense have given rise to all kinds of difficult cases. Take the theft of fruit, for example, with regard to the essential element of \u201cpersonal property.\u201d If a man walking through an orchard plucks a peach from a tree and eats it, he is not guilty of larceny because he has not taken away <em class=\"emphasis\">personal<\/em> property (the peach is part of the land, being connected to the tree). But if he picks up a peach lying on the ground, he is guilty of larceny. Or consider the element of \u201ctaking\u201d or \u201ccarrying away.\u201d Sneaking into a movie theater without paying is not an act of larceny (though in most states it is a criminal act). Taking electricity by tapping into the power lines of an electric utility was something that baffled judges late in the nineteenth century because it was not clear whether electricity is a \u201csomething\u201d that can be taken. Modern statutes have tended to make clear that electricity can be the object of larceny. Or consider the element of an \u201cintent to steal the same.\u201d If you borrow your friend\u2019s BMW without his permission in order to go to the grocery store, intending to return it within a few minutes and then do return it, you have not committed larceny. But if you meet another friend at the store who convinces you to take a long joyride with the car and you return hours later, you may have committed larceny.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p04\" class=\"para editable block\">A particular form of larceny is <span class=\"margin_term\"><a class=\"glossterm\">robbery<\/a><\/span>, which is defined as larceny from a person by means of violence or intimidation.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p05\" class=\"para editable block\">Larceny involves the taking of property from the possession of another. Suppose that a person legitimately comes to possess the property of another and wrongfully appropriates it\u2014for example, an automobile mechanic entrusted with your car refuses to return it, or a bank teller who is entitled to temporary possession of cash in his drawer takes it home with him. The common law had trouble with such cases because the thief in these cases already had possession; his crime was in assuming ownership. Today, such wrongful conversion, known as <span class=\"margin_term\"><a class=\"glossterm\">embezzlement<\/a><\/span>, has been made a statutory offense in all states.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p06\" class=\"para editable block\">Statutes against larceny and embezzlement did not cover all the gaps in the law. A conceptual problem arises in the case of one who is tricked into giving up his title to property. In larceny and embezzlement, the thief gains possession or ownership without any consent of the owner or custodian of the property. Suppose, however, that an automobile dealer agrees to take his customer\u2019s present car as a trade-in. The customer says that he has full title to the car. In fact, the customer is still paying off an installment loan and the finance company has an interest in the old car. If the finance company repossesses the car, the customer\u2014who got a new car at a discount because of his false representation\u2014cannot be said to have taken the new car by larceny or embezzlement. Nevertheless, he tricked the dealer into selling, and the dealer will have lost the value of the repossessed car. Obviously, the customer is guilty of a criminal act; the statutes outlawing it refer to this trickery as the crime of <span class=\"margin_term\"><a class=\"glossterm\">false pretenses<\/a><\/span>, defined as obtaining ownership of the property of another by making untrue representations of fact with intent to defraud.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p07\" class=\"para editable block\">A number of problems have arisen in the judicial interpretation of false-pretense statutes. One concerns whether the taking is permanent or only temporary.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p08\" class=\"para editable block\">The case of <em class=\"emphasis\">State v. Mills<\/em> shows the subtle questions that can be presented and the dangers inherent in committing \u201ca little fraud.\u201d In the <em class=\"emphasis\">Mills<\/em> case, the claim was that a mortgage instrument dealing with one parcel of land was used instead for another. This is a false representation of fact. Suppose, by contrast, that a person misrepresents his state of mind: \u201cI will pay you back tomorrow,\u201d he says, knowing full well that he does not intend to. Can such a misrepresentation amount to false pretenses punishable as a criminal offense? In most jurisdictions it cannot. A false-pretense violation relates to a past event or existing fact, not to a statement of intention. If it were otherwise, anyone failing to pay a debt might find himself facing criminal prosecution, and business would be less prone to take risks.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p09\" class=\"para editable block\">The problem of proving intent is especially difficult when a person has availed himself of the services of another without paying. A common example is someone leaving a restaurant without paying for the meal. In most states, this is specifically defined in the statutes as <em class=\"emphasis\">theft of services<\/em>.<\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s02_s02\" class=\"section\">\n<h2 class=\"title editable block\">Receiving Stolen Property<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s02_s02_p01\" class=\"para editable block\">One who engages in <span class=\"margin_term\"><a class=\"glossterm\">receiving stolen property<\/a><\/span> with knowledge that it is stolen is guilty of a felony or misdemeanor, depending on the value of the property. The receipt need not be personal; if the property is delivered to a place under the control of the receiver, then he is deemed to have received it. \u201cKnowledge\u201d is construed broadly: not merely actual knowledge, but (correct) belief and suspicion (strong enough not to investigate for fear that the property will turn out to have been stolen) are sufficient for conviction.<\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s02_s03\" class=\"section\">\n<h2 class=\"title editable block\">Forgery<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s02_s03_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Forgery<\/a><\/span> is false writing of a document of legal significance (or apparent legal significance!) with intent to defraud. It includes the making up of a false document or the alteration of an existing one. The writing need not be done by hand but can be by any means\u2014typing, printing, and so forth. Documents commonly the subject of forgery are negotiable instruments (checks, money orders, and the like), deeds, receipts, contracts, and bills of lading. The forged instrument must itself be false, not merely contain a falsehood. If you fake your neighbor\u2019s signature on one of his checks made out to cash, you have committed forgery. But if you sign a check of your own that is made out to cash, knowing that there is no money in your checking account, the instrument is not forged, though the act may be criminal if done with the intent to defraud.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s03_p02\" class=\"para editable block\">The mere making of a forged instrument is unlawful. So is the \u201cuttering\u201d (or presentation) of such an instrument, whether or not the one uttering it actually forged it. The usual example of a false signature is by no means the only way to commit forgery. If done with intent to defraud, the backdating of a document, the modification of a corporate name, or the filling in of lines left blank on a form can all constitute forgery.<\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s02_s04\" class=\"section\">\n<h2 class=\"title editable block\">Extortion<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s02_s04_p01\" class=\"para editable block\">Under common law, <span class=\"margin_term\"><a class=\"glossterm\">extortion<\/a><\/span> could only be committed by a government official, who corruptly collected an unlawful fee under color of office. A common example is a salaried building inspector who refuses to issue a permit unless the permittee pays him. Under modern statutes, the crime of extortion has been broadened to include the wrongful collection of money or something else of value by anyone by means of a threat (short of a threat of immediate physical violence, for such a threat would make the demand an act of robbery). This kind of extortion is usually called blackmail. The blackmail threat commonly is to expose some fact of the victim\u2019s private life or to make a false accusation about him.<\/p>\n<p class=\"para editable block\"\/>\n\n<\/div>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s03\" class=\"section\">\n<h1 class=\"title editable block\">Offenses against Habitation and Other Offenses<\/h1>\n<div id=\"mayer_1.0-ch06_s02_s03_s01\" class=\"section\">\n<h2 class=\"title editable block\">Burglary<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s03_s01_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Burglary<\/a><\/span> is not a crime against property. It is defined as \u201cthe breaking and entering of the dwelling of another in the nighttime with intent to commit a felony.\u201d The intent to steal is not an issue: a man who sneaks into a woman\u2019s home intent on raping her has committed a burglary, even if he does not carry out the act. The student doing critical thinking will no doubt notice that the definition provides plenty of room for argument. What is \u201cbreaking\u201d? (The courts do not require actual destruction; the mere opening of a closed door, even if unlocked, is enough.) What is entry? When does night begin? What kind of intent? Whose dwelling? Can a landlord burglarize the dwelling of his tenant? (Yes.) Can a person burglarize his own home? (No.)<\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s03_s02\" class=\"section\">\n<h2 class=\"title editable block\">Arson<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s03_s02_p01\" class=\"para editable block\">Under common law, <span class=\"margin_term\"><a class=\"glossterm\">arson<\/a><\/span> was the malicious burning of the dwelling of another. Burning one\u2019s own house for purposes of collecting insurance was not an act of arson under common law. The statutes today make it a felony intentionally to set fire to any building, whether or not it is a dwelling and whether or not the purpose is to collect insurance.<\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s03_s03\" class=\"section\">\n<h2 class=\"title editable block\">Bribery<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s03_s03_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Bribery<\/a><\/span> is a corrupt payment (or receipt of such a payment) for official action. The payment can be in cash or in the form of any goods, intangibles, or services that the recipient would find valuable. Under common law, only a public official could be bribed. In most states, bribery charges can result from the bribe of anyone performing a public function.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s03_s03_p02\" class=\"para editable block\">Bribing a public official in government procurement (contracting) can result in serious criminal charges. Bribing a public official in a foreign country to win a contract can result in charges under the Foreign Corrupt Practices Act.<\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s03_s04\" class=\"section\">\n<h2 class=\"title editable block\">Perjury<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s03_s04_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Perjury<\/a><\/span> is the crime of giving a false oath, either orally or in writing, in a judicial or other official proceeding (lies made in proceedings other than courts are sometimes termed \u201cfalse swearing\u201d). To be perjurious, the oath must have been made corruptly\u2014that is, with knowledge that it was false or without sincere belief that it was true. An innocent mistake is not perjury. A statement, though true, is perjury if the maker of it believes it to be false. Statements such as \u201cI don\u2019t remember\u201d or \u201cto the best of my knowledge\u201d are not sufficient to protect a person who is lying from conviction for perjury. To support a charge of perjury, however, the false statement must be \u201cmaterial,\u201d meaning that the statement is relevant to whatever the court is trying to find out.<\/p>\n<p class=\"para editable block\"\/>\n\n<\/div>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04\" class=\"section\">\n<h1 class=\"title editable block\">White-Collar Crime<\/h1>\n<p id=\"mayer_1.0-ch06_s02_s04_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">White-collar crime<\/a><\/span>, as distinguished from \u201cstreet crime,\u201d refers generally to fraud-related acts carried out in a nonviolent way, usually connected with business. Armed bank robbery is not a white-collar crime, but embezzlement by a teller or bank officer is. Many white-collar crimes are included within the statutory definitions of embezzlement and false pretenses. Most are violations of state law. Depending on how they are carried out, many of these same crimes are also violations of federal law.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s04_p02\" class=\"para editable block\">Any act of fraud in which the United States postal system is used or which involves interstate phone calls or Internet connections is a violation of federal law. Likewise, many different acts around the buying and selling of securities can run afoul of federal securities laws. Other white-collar crimes include tax fraud; price fixing; violations of food, drug, and environmental laws; corporate bribery of foreign companies; and\u2014the newest form\u2014computer fraud. Some of these are discussed here; others are covered in later chapters.<\/p>\n\n<div id=\"mayer_1.0-ch06_s02_s04_s01\" class=\"section\">\n<h2 class=\"title editable block\">Mail and Wire Fraud<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s01_p01\" class=\"para editable block\">Federal law prohibits the use of the mails or any interstate electronic communications medium for the purpose of furthering a \u201cscheme or artifice to defraud.\u201d The statute is broad, and it is relatively easy for prosecutors to prove a violation. The law also bans attempts to defraud, so the prosecutor need not show that the scheme worked or that anyone suffered any losses. \u201cFraud\u201d is broadly construed: anyone who uses the mails or telephone to defraud anyone else of virtually anything, not just of money, can be convicted under the law. In one case, a state governor was convicted of mail fraud when he took bribes to influence the setting of racing dates. The court\u2019s theory was that he defrauded the citizenry of its right to his \u201chonest and faithful services\u201d as governor.<span id=\"mayer_1.0-fn06_001\" class=\"footnote\"><em class=\"emphasis\">United States v. Isaacs<\/em>, 493 F.2d 1124 (7th Cir. 1974), cert. denied, 417 US 976 (1974).<\/span><\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s02\" class=\"section\">\n<h2 class=\"title editable block\">Violations of Antitrust Law<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s02_p01\" class=\"para editable block\">Antitrust Law: condemns activities in \u0093restraint of trade\u0094 (including price fixing), bans abusive behavior by a firm dominating the market, and supervises the mergers and acquisitions of large corporations to prevent market abuse.<\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s03\" class=\"section\">\n<h2 class=\"title editable block\">Violations of the Food and Drug Act<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s03_p01\" class=\"para editable block\">The federal Food, Drug, and Cosmetic Act prohibits any person or corporation from sending into interstate commerce any adulterated or misbranded food, drug, cosmetics, or related device. For example, in a 2010 case, Allergen had to pay a criminal fine for marketing Botox as a headache or pain reliever, a use that had not been approved by the Food and Drug Administration. Unlike most criminal statutes, willfulness or deliberate misconduct is not an element of the act. An executive can be held criminally liable even though he may have had no personal knowledge of the violation.<\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s04\" class=\"section\">\n<h2 class=\"title editable block\">Environmental Crimes<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s04_p01\" class=\"para editable block\">Many federal environmental statutes have criminal provisions. These include the Federal Water Pollution Control Act (commonly called the Clean Water Act); the Rivers and Harbors Act of 1899 (the Refuse Act); the Clean Air Act; the Federal Insecticide, Fungicide, and Rodenticide Act (FIFRA); the Toxic Substances Control Act (TSCA); and the Resource Conservation and Recovery Act (RCRA). Under the Clean Water Act, for example, wrongful discharge of pollutants into navigable waters carries a fine ranging from $2,500 to $25,000 per day and imprisonment for up to one year. \u201cResponsible corporate officers\u201d are specifically included as potential defendants in criminal prosecutions under the act. They can include officers who have responsibility over a project where subcontractors and their employees actually caused the discharge.<span id=\"mayer_1.0-fn06_002\" class=\"footnote\"><em class=\"emphasis\">U.S. v. Hanousek<\/em>, 176 F.3d 1116 (9th Cir. 1999).<\/span><\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s05\" class=\"section\">\n<h2 class=\"title editable block\">Violations of the Foreign Corrupt Practices Act<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s05_p01\" class=\"para editable block\">As a byproduct of Watergate, federal officials at the Securities and Exchange Commission and the Internal Revenue Service uncovered many instances of bribes paid by major corporations to officials of foreign governments to win contracts with those governments. Congress responded in 1977 with the Foreign Corrupt Practices Act, which imposed a stringent requirement that the disposition of assets be accurately and fairly accounted for in a company\u2019s books and records. The act also made illegal the payment of bribes to foreign officials or to anyone who will transmit the money to a foreign official to assist the payor (the one offering and delivering the money) in getting business.<\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s06\" class=\"section\">\n<h2 class=\"title editable block\">Violations of the Racketeering Influenced and Corrupt Organizations Act<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s06_p01\" class=\"para editable block\">In 1970 Congress enacted the Racketeering Influenced and Corrupt Organizations Act (RICO), aimed at ending organized crime\u2019s infiltration into legitimate business. The act tells courts to construe its language broadly \u201cto effectuate its remedial purpose,\u201d and many who are not part of organized crime have been successfully prosecuted under the act. It bans a \u201cpattern of racketeering,\u201d defined as the commission of at least two acts within ten years of any of a variety of already-existing crimes, including mail, wire, and securities fraud. The act thus makes many types of fraud subject to severe penalties.<\/p>\n\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s07\" class=\"section\">\n<h2 class=\"title editable block\">Computer Crime<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s07_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Computer crime<\/a><\/span> generally falls into four categories: (1) theft of money, financial instruments, or property; (2) misappropriation of computer time; (3) theft of programs; and (4) illegal acquisition of information. The main federal statutory framework for many computer crimes is the Computer Fraud and Abuse Act. Congress only prohibited computer fraud and abuse where there was a federal interest, as where computers of the government were involved or where the crime was interstate in nature.<\/p>\n\n<div id=\"mayer_1.0-ch06_s02_s04_s07_t01\" class=\"table block\">\n<p class=\"title\"><span class=\"title-prefix\">Table 6.1<\/span> Summary of Provisions of the Computer Fraud and Abuse Act<\/p>\n\n<table cellpadding=\"0\" style=\"border-spacing: 0px;\"><tbody><tr><td>Obtaining national security information<\/td>\n<td>Sec. (a)(1)<\/td>\n<td>10 years maximum (20 years second offense)<\/td>\n<\/tr><tr><td>Trespassing in a government computer<\/td>\n<td>Sec. (a)(3)<\/td>\n<td>1 year (5)<\/td>\n<\/tr><tr><td>Compromising the confidentiality of a computer<\/td>\n<td>Sec. (a)(2)<\/td>\n<td>1 year (10)<\/td>\n<\/tr><tr><td>Accessing a computer to defraud and obtain value<\/td>\n<td>Sec. (a)4<\/td>\n<td>5 years (10)<\/td>\n<\/tr><tr><td>Intentional access and reckless damage<\/td>\n<td>(a)(5)(A)(ii)<\/td>\n<td>5 years (20)<\/td>\n<\/tr><tr><td>Trafficking in passwords<\/td>\n<td>(a)(6)<\/td>\n<td>1 year (10)<\/td>\n<\/tr><\/tbody><\/table><\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s07_n01\" class=\"key_takeaways editable block\">\n<h3 class=\"title\">Key Takeaway<\/h3>\n<p id=\"mayer_1.0-ch06_s02_s04_s07_p02\" class=\"para\">Offenses can be against persons, against property, or against public policy (as when you bribe a public official, commit perjury, or use public goods such as the mails or the Internet to commit fraud, violate antitrust laws, or commit other white-collar crimes).<\/p>\n\n<\/div>\n<\/div>\n<\/div>","rendered":"<h1 class=\"title editable block\">Types of Crimes<\/h1>\n<div id=\"mayer_1.0-ch06_s02_n01\" class=\"learning_objectives editable block\">\n<h3 class=\"title\">Learning Objectives<\/h3>\n<ol id=\"mayer_1.0-ch06_s02_l01\" class=\"orderedlist\">\n<li>Categorize various types of business crimes.<\/li>\n<li>Name and define the major felonies in criminal law.<\/li>\n<li>Explain how white-collar crime differs from other crimes.<\/li>\n<li>Define a variety of white-collar crimes.<\/li>\n<\/ol>\n<\/div>\n<p id=\"mayer_1.0-ch06_s02_p01\" class=\"para editable block\">Most classifications of crime turn on the seriousness of the act. In general, seriousness is defined by the nature or duration of the punishment set out in the statute. A <span class=\"margin_term\"><a class=\"glossterm\">felony<\/a><\/span> is a crime punishable (usually) by imprisonment of more than one year or by death. (Crimes punishable by death are sometimes known as capital crimes; they are increasingly rare in the United States.) The major felonies include murder, rape, kidnapping, armed robbery, embezzlement, insider trading, fraud, and racketeering. All other crimes are usually known as <span class=\"margin_term\"><a class=\"glossterm\">misdemeanors<\/a><\/span>, petty offenses, or infractions. Another way of viewing crimes is by the type of social harm the statute is intended to prevent or deter, such as offenses against the person, offenses against property, and white-collar crime.<\/p>\n<div id=\"mayer_1.0-ch06_s02_s01\" class=\"section\">\n<h1 class=\"title editable block\">Offenses against the Person<\/h1>\n<div id=\"mayer_1.0-ch06_s02_s01_s01_p02\" class=\"para editable block\">\n<p class=\"title editable block\">Offenses against the person can take place in the workplace. They can also<\/p>\n<h2 class=\"title editable block\">Homicide<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s01_s01_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Homicide<\/a><\/span> is the killing of one person by another. Not every killing is criminal. When the law permits one person to kill another\u2014for example, a soldier killing an enemy on the battlefield during war, or a killing in self-defense\u2014the death is considered the result of <span class=\"margin_term\"><a class=\"glossterm\">justifiable homicide<\/a><\/span>. An <em class=\"emphasis\">excusable homicide<\/em>, by contrast, is one in which death results from an accident in which the killer is not at fault.<\/p>\n<p>Manslaughter is an act of killing that does not amount to murder. Voluntary manslaughter is an intentional killing, but one carried out in the \u201csudden heat of passion\u201d as the result of some provocation. An example is a fight that gets out of hand. Involuntary manslaughter entails a lesser degree of willfulness; it usually occurs when someone has taken a reckless action that results in death (e.g., a death resulting from a traffic accident in which one driver recklessly runs a red light).<\/p><\/div>\n<div class=\"para editable block\">\n<div class=\"para editable block\">While unfortunately both homicide and manslaughter can occur in the workplace, it would be exceptionally difficult to charge a corporation with either crime. Jennifer Arlen, a professor at New York University Law School who specializes in corporate crimes, explains, &#8220;For a company to be charged with manslaughter, a few things have to happen. First, prosecutors would have to be able to find a specific person whose actions led to people dying. Second, that person would have to have taken those actions for the benefit of the company and within the scope of their employment, and have been &#8216;in the right mental state&#8217; when they took the actions.&#8221;<\/div>\n<div id=\"mayer_1.0-ch06_s02_s01_s02\" class=\"section\">\n<h2 class=\"title editable block\">Assault and Battery<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s01_s02_p01\" class=\"para editable block\">Ordinarily, we would say that a person who has struck another has \u201cassaulted\u201d him. Technically, that is a <span class=\"margin_term\"><a class=\"glossterm\">battery<\/a><\/span>\u2014the unlawful application of force to another person. The force need not be violent. Indeed, a man who kisses a woman is guilty of a battery if he does it against her will. The other person may consent to the force. That is one reason why surgeons require patients to sign consent forms, giving the doctor permission to operate. In the absence of such a consent, an operation is a battery. That is also why football players are not constantly being charged with battery. Those who agree to play football agree to submit to the rules of the game, which of course include the right to tackle. But the consent does not apply to all acts of physical force: a hockey player who hits an opponent over the head with his stick can be prosecuted for the crime of battery.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s01_s02_p02\" class=\"para editable block\">Criminal <span class=\"margin_term\"><a class=\"glossterm\">assault<\/a><\/span> is an <em class=\"emphasis\">attempt<\/em> to commit a battery or the deliberate placing of another in fear of receiving an immediate battery. If you throw a rock at a friend, but he manages to dodge it, you have committed an assault. Some states limit an assault to an attempt to commit a battery by one who has a \u201cpresent ability\u201d to do so. Pointing an unloaded gun and threatening to shoot would not be an assault, nor, of course, could it be a battery. The modem tendency, however, is to define an assault as an attempt to commit a battery by one with an <em class=\"emphasis\">apparent<\/em> ability to do so.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s01_s02_p03\" class=\"para editable block\">Assault and battery may be excused. For example, a bar owner (or her agent, the bouncer) may use reasonable force to remove an unruly patron. If the use of force is excessive, the bouncer can be found guilty of assault and battery, and a civil action could arise against the bar owner as well.<\/p>\n<p class=\"para editable block\">\n<\/div>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s02\" class=\"section\">\n<h1 class=\"title editable block\">Offenses against Property<\/h1>\n<div id=\"mayer_1.0-ch06_s02_s02_s01\" class=\"section\">\n<h2 class=\"title editable block\">Theft: Larceny, Robbery, Embezzlement, False Pretenses<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p01\" class=\"para editable block\">The concept of theft is familiar enough. Less familiar is the way the law has treated various aspects of the act of stealing. Criminal law distinguishes among many different crimes that are popularly known as theft. Many technical words have entered the language\u2014burglary, larceny, robbery\u2014but are often used inaccurately. Brief definitions of the more common terms are discussed here.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p02\" class=\"para editable block\">The basic crime of stealing personal property is <span class=\"margin_term\"><a class=\"glossterm\">larceny<\/a><\/span>. By its old common-law definition, still in use today, larceny is the wrongful \u201ctaking and carrying away of the personal property of another with intent to steal the same.\u201d<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p03\" class=\"para editable block\">The separate elements of this offense have given rise to all kinds of difficult cases. Take the theft of fruit, for example, with regard to the essential element of \u201cpersonal property.\u201d If a man walking through an orchard plucks a peach from a tree and eats it, he is not guilty of larceny because he has not taken away <em class=\"emphasis\">personal<\/em> property (the peach is part of the land, being connected to the tree). But if he picks up a peach lying on the ground, he is guilty of larceny. Or consider the element of \u201ctaking\u201d or \u201ccarrying away.\u201d Sneaking into a movie theater without paying is not an act of larceny (though in most states it is a criminal act). Taking electricity by tapping into the power lines of an electric utility was something that baffled judges late in the nineteenth century because it was not clear whether electricity is a \u201csomething\u201d that can be taken. Modern statutes have tended to make clear that electricity can be the object of larceny. Or consider the element of an \u201cintent to steal the same.\u201d If you borrow your friend\u2019s BMW without his permission in order to go to the grocery store, intending to return it within a few minutes and then do return it, you have not committed larceny. But if you meet another friend at the store who convinces you to take a long joyride with the car and you return hours later, you may have committed larceny.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p04\" class=\"para editable block\">A particular form of larceny is <span class=\"margin_term\"><a class=\"glossterm\">robbery<\/a><\/span>, which is defined as larceny from a person by means of violence or intimidation.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p05\" class=\"para editable block\">Larceny involves the taking of property from the possession of another. Suppose that a person legitimately comes to possess the property of another and wrongfully appropriates it\u2014for example, an automobile mechanic entrusted with your car refuses to return it, or a bank teller who is entitled to temporary possession of cash in his drawer takes it home with him. The common law had trouble with such cases because the thief in these cases already had possession; his crime was in assuming ownership. Today, such wrongful conversion, known as <span class=\"margin_term\"><a class=\"glossterm\">embezzlement<\/a><\/span>, has been made a statutory offense in all states.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p06\" class=\"para editable block\">Statutes against larceny and embezzlement did not cover all the gaps in the law. A conceptual problem arises in the case of one who is tricked into giving up his title to property. In larceny and embezzlement, the thief gains possession or ownership without any consent of the owner or custodian of the property. Suppose, however, that an automobile dealer agrees to take his customer\u2019s present car as a trade-in. The customer says that he has full title to the car. In fact, the customer is still paying off an installment loan and the finance company has an interest in the old car. If the finance company repossesses the car, the customer\u2014who got a new car at a discount because of his false representation\u2014cannot be said to have taken the new car by larceny or embezzlement. Nevertheless, he tricked the dealer into selling, and the dealer will have lost the value of the repossessed car. Obviously, the customer is guilty of a criminal act; the statutes outlawing it refer to this trickery as the crime of <span class=\"margin_term\"><a class=\"glossterm\">false pretenses<\/a><\/span>, defined as obtaining ownership of the property of another by making untrue representations of fact with intent to defraud.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p07\" class=\"para editable block\">A number of problems have arisen in the judicial interpretation of false-pretense statutes. One concerns whether the taking is permanent or only temporary.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p08\" class=\"para editable block\">The case of <em class=\"emphasis\">State v. Mills<\/em> shows the subtle questions that can be presented and the dangers inherent in committing \u201ca little fraud.\u201d In the <em class=\"emphasis\">Mills<\/em> case, the claim was that a mortgage instrument dealing with one parcel of land was used instead for another. This is a false representation of fact. Suppose, by contrast, that a person misrepresents his state of mind: \u201cI will pay you back tomorrow,\u201d he says, knowing full well that he does not intend to. Can such a misrepresentation amount to false pretenses punishable as a criminal offense? In most jurisdictions it cannot. A false-pretense violation relates to a past event or existing fact, not to a statement of intention. If it were otherwise, anyone failing to pay a debt might find himself facing criminal prosecution, and business would be less prone to take risks.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s01_p09\" class=\"para editable block\">The problem of proving intent is especially difficult when a person has availed himself of the services of another without paying. A common example is someone leaving a restaurant without paying for the meal. In most states, this is specifically defined in the statutes as <em class=\"emphasis\">theft of services<\/em>.<\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s02_s02\" class=\"section\">\n<h2 class=\"title editable block\">Receiving Stolen Property<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s02_s02_p01\" class=\"para editable block\">One who engages in <span class=\"margin_term\"><a class=\"glossterm\">receiving stolen property<\/a><\/span> with knowledge that it is stolen is guilty of a felony or misdemeanor, depending on the value of the property. The receipt need not be personal; if the property is delivered to a place under the control of the receiver, then he is deemed to have received it. \u201cKnowledge\u201d is construed broadly: not merely actual knowledge, but (correct) belief and suspicion (strong enough not to investigate for fear that the property will turn out to have been stolen) are sufficient for conviction.<\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s02_s03\" class=\"section\">\n<h2 class=\"title editable block\">Forgery<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s02_s03_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Forgery<\/a><\/span> is false writing of a document of legal significance (or apparent legal significance!) with intent to defraud. It includes the making up of a false document or the alteration of an existing one. The writing need not be done by hand but can be by any means\u2014typing, printing, and so forth. Documents commonly the subject of forgery are negotiable instruments (checks, money orders, and the like), deeds, receipts, contracts, and bills of lading. The forged instrument must itself be false, not merely contain a falsehood. If you fake your neighbor\u2019s signature on one of his checks made out to cash, you have committed forgery. But if you sign a check of your own that is made out to cash, knowing that there is no money in your checking account, the instrument is not forged, though the act may be criminal if done with the intent to defraud.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s02_s03_p02\" class=\"para editable block\">The mere making of a forged instrument is unlawful. So is the \u201cuttering\u201d (or presentation) of such an instrument, whether or not the one uttering it actually forged it. The usual example of a false signature is by no means the only way to commit forgery. If done with intent to defraud, the backdating of a document, the modification of a corporate name, or the filling in of lines left blank on a form can all constitute forgery.<\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s02_s04\" class=\"section\">\n<h2 class=\"title editable block\">Extortion<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s02_s04_p01\" class=\"para editable block\">Under common law, <span class=\"margin_term\"><a class=\"glossterm\">extortion<\/a><\/span> could only be committed by a government official, who corruptly collected an unlawful fee under color of office. A common example is a salaried building inspector who refuses to issue a permit unless the permittee pays him. Under modern statutes, the crime of extortion has been broadened to include the wrongful collection of money or something else of value by anyone by means of a threat (short of a threat of immediate physical violence, for such a threat would make the demand an act of robbery). This kind of extortion is usually called blackmail. The blackmail threat commonly is to expose some fact of the victim\u2019s private life or to make a false accusation about him.<\/p>\n<p class=\"para editable block\">\n<\/div>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s03\" class=\"section\">\n<h1 class=\"title editable block\">Offenses against Habitation and Other Offenses<\/h1>\n<div id=\"mayer_1.0-ch06_s02_s03_s01\" class=\"section\">\n<h2 class=\"title editable block\">Burglary<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s03_s01_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Burglary<\/a><\/span> is not a crime against property. It is defined as \u201cthe breaking and entering of the dwelling of another in the nighttime with intent to commit a felony.\u201d The intent to steal is not an issue: a man who sneaks into a woman\u2019s home intent on raping her has committed a burglary, even if he does not carry out the act. The student doing critical thinking will no doubt notice that the definition provides plenty of room for argument. What is \u201cbreaking\u201d? (The courts do not require actual destruction; the mere opening of a closed door, even if unlocked, is enough.) What is entry? When does night begin? What kind of intent? Whose dwelling? Can a landlord burglarize the dwelling of his tenant? (Yes.) Can a person burglarize his own home? (No.)<\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s03_s02\" class=\"section\">\n<h2 class=\"title editable block\">Arson<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s03_s02_p01\" class=\"para editable block\">Under common law, <span class=\"margin_term\"><a class=\"glossterm\">arson<\/a><\/span> was the malicious burning of the dwelling of another. Burning one\u2019s own house for purposes of collecting insurance was not an act of arson under common law. The statutes today make it a felony intentionally to set fire to any building, whether or not it is a dwelling and whether or not the purpose is to collect insurance.<\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s03_s03\" class=\"section\">\n<h2 class=\"title editable block\">Bribery<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s03_s03_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Bribery<\/a><\/span> is a corrupt payment (or receipt of such a payment) for official action. The payment can be in cash or in the form of any goods, intangibles, or services that the recipient would find valuable. Under common law, only a public official could be bribed. In most states, bribery charges can result from the bribe of anyone performing a public function.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s03_s03_p02\" class=\"para editable block\">Bribing a public official in government procurement (contracting) can result in serious criminal charges. Bribing a public official in a foreign country to win a contract can result in charges under the Foreign Corrupt Practices Act.<\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s03_s04\" class=\"section\">\n<h2 class=\"title editable block\">Perjury<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s03_s04_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Perjury<\/a><\/span> is the crime of giving a false oath, either orally or in writing, in a judicial or other official proceeding (lies made in proceedings other than courts are sometimes termed \u201cfalse swearing\u201d). To be perjurious, the oath must have been made corruptly\u2014that is, with knowledge that it was false or without sincere belief that it was true. An innocent mistake is not perjury. A statement, though true, is perjury if the maker of it believes it to be false. Statements such as \u201cI don\u2019t remember\u201d or \u201cto the best of my knowledge\u201d are not sufficient to protect a person who is lying from conviction for perjury. To support a charge of perjury, however, the false statement must be \u201cmaterial,\u201d meaning that the statement is relevant to whatever the court is trying to find out.<\/p>\n<p class=\"para editable block\">\n<\/div>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04\" class=\"section\">\n<h1 class=\"title editable block\">White-Collar Crime<\/h1>\n<p id=\"mayer_1.0-ch06_s02_s04_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">White-collar crime<\/a><\/span>, as distinguished from \u201cstreet crime,\u201d refers generally to fraud-related acts carried out in a nonviolent way, usually connected with business. Armed bank robbery is not a white-collar crime, but embezzlement by a teller or bank officer is. Many white-collar crimes are included within the statutory definitions of embezzlement and false pretenses. Most are violations of state law. Depending on how they are carried out, many of these same crimes are also violations of federal law.<\/p>\n<p id=\"mayer_1.0-ch06_s02_s04_p02\" class=\"para editable block\">Any act of fraud in which the United States postal system is used or which involves interstate phone calls or Internet connections is a violation of federal law. Likewise, many different acts around the buying and selling of securities can run afoul of federal securities laws. Other white-collar crimes include tax fraud; price fixing; violations of food, drug, and environmental laws; corporate bribery of foreign companies; and\u2014the newest form\u2014computer fraud. Some of these are discussed here; others are covered in later chapters.<\/p>\n<div id=\"mayer_1.0-ch06_s02_s04_s01\" class=\"section\">\n<h2 class=\"title editable block\">Mail and Wire Fraud<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s01_p01\" class=\"para editable block\">Federal law prohibits the use of the mails or any interstate electronic communications medium for the purpose of furthering a \u201cscheme or artifice to defraud.\u201d The statute is broad, and it is relatively easy for prosecutors to prove a violation. The law also bans attempts to defraud, so the prosecutor need not show that the scheme worked or that anyone suffered any losses. \u201cFraud\u201d is broadly construed: anyone who uses the mails or telephone to defraud anyone else of virtually anything, not just of money, can be convicted under the law. In one case, a state governor was convicted of mail fraud when he took bribes to influence the setting of racing dates. The court\u2019s theory was that he defrauded the citizenry of its right to his \u201chonest and faithful services\u201d as governor.<span id=\"mayer_1.0-fn06_001\" class=\"footnote\"><em class=\"emphasis\">United States v. Isaacs<\/em>, 493 F.2d 1124 (7th Cir. 1974), cert. denied, 417 US 976 (1974).<\/span><\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s02\" class=\"section\">\n<h2 class=\"title editable block\">Violations of Antitrust Law<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s02_p01\" class=\"para editable block\">Antitrust Law: condemns activities in \u0093restraint of trade\u0094 (including price fixing), bans abusive behavior by a firm dominating the market, and supervises the mergers and acquisitions of large corporations to prevent market abuse.<\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s03\" class=\"section\">\n<h2 class=\"title editable block\">Violations of the Food and Drug Act<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s03_p01\" class=\"para editable block\">The federal Food, Drug, and Cosmetic Act prohibits any person or corporation from sending into interstate commerce any adulterated or misbranded food, drug, cosmetics, or related device. For example, in a 2010 case, Allergen had to pay a criminal fine for marketing Botox as a headache or pain reliever, a use that had not been approved by the Food and Drug Administration. Unlike most criminal statutes, willfulness or deliberate misconduct is not an element of the act. An executive can be held criminally liable even though he may have had no personal knowledge of the violation.<\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s04\" class=\"section\">\n<h2 class=\"title editable block\">Environmental Crimes<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s04_p01\" class=\"para editable block\">Many federal environmental statutes have criminal provisions. These include the Federal Water Pollution Control Act (commonly called the Clean Water Act); the Rivers and Harbors Act of 1899 (the Refuse Act); the Clean Air Act; the Federal Insecticide, Fungicide, and Rodenticide Act (FIFRA); the Toxic Substances Control Act (TSCA); and the Resource Conservation and Recovery Act (RCRA). Under the Clean Water Act, for example, wrongful discharge of pollutants into navigable waters carries a fine ranging from $2,500 to $25,000 per day and imprisonment for up to one year. \u201cResponsible corporate officers\u201d are specifically included as potential defendants in criminal prosecutions under the act. They can include officers who have responsibility over a project where subcontractors and their employees actually caused the discharge.<span id=\"mayer_1.0-fn06_002\" class=\"footnote\"><em class=\"emphasis\">U.S. v. Hanousek<\/em>, 176 F.3d 1116 (9th Cir. 1999).<\/span><\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s05\" class=\"section\">\n<h2 class=\"title editable block\">Violations of the Foreign Corrupt Practices Act<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s05_p01\" class=\"para editable block\">As a byproduct of Watergate, federal officials at the Securities and Exchange Commission and the Internal Revenue Service uncovered many instances of bribes paid by major corporations to officials of foreign governments to win contracts with those governments. Congress responded in 1977 with the Foreign Corrupt Practices Act, which imposed a stringent requirement that the disposition of assets be accurately and fairly accounted for in a company\u2019s books and records. The act also made illegal the payment of bribes to foreign officials or to anyone who will transmit the money to a foreign official to assist the payor (the one offering and delivering the money) in getting business.<\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s06\" class=\"section\">\n<h2 class=\"title editable block\">Violations of the Racketeering Influenced and Corrupt Organizations Act<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s06_p01\" class=\"para editable block\">In 1970 Congress enacted the Racketeering Influenced and Corrupt Organizations Act (RICO), aimed at ending organized crime\u2019s infiltration into legitimate business. The act tells courts to construe its language broadly \u201cto effectuate its remedial purpose,\u201d and many who are not part of organized crime have been successfully prosecuted under the act. It bans a \u201cpattern of racketeering,\u201d defined as the commission of at least two acts within ten years of any of a variety of already-existing crimes, including mail, wire, and securities fraud. The act thus makes many types of fraud subject to severe penalties.<\/p>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s07\" class=\"section\">\n<h2 class=\"title editable block\">Computer Crime<\/h2>\n<p id=\"mayer_1.0-ch06_s02_s04_s07_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Computer crime<\/a><\/span> generally falls into four categories: (1) theft of money, financial instruments, or property; (2) misappropriation of computer time; (3) theft of programs; and (4) illegal acquisition of information. The main federal statutory framework for many computer crimes is the Computer Fraud and Abuse Act. Congress only prohibited computer fraud and abuse where there was a federal interest, as where computers of the government were involved or where the crime was interstate in nature.<\/p>\n<div id=\"mayer_1.0-ch06_s02_s04_s07_t01\" class=\"table block\">\n<p class=\"title\"><span class=\"title-prefix\">Table 6.1<\/span> Summary of Provisions of the Computer Fraud and Abuse Act<\/p>\n<table cellpadding=\"0\" style=\"border-spacing: 0px;\">\n<tbody>\n<tr>\n<td>Obtaining national security information<\/td>\n<td>Sec. (a)(1)<\/td>\n<td>10 years maximum (20 years second offense)<\/td>\n<\/tr>\n<tr>\n<td>Trespassing in a government computer<\/td>\n<td>Sec. (a)(3)<\/td>\n<td>1 year (5)<\/td>\n<\/tr>\n<tr>\n<td>Compromising the confidentiality of a computer<\/td>\n<td>Sec. (a)(2)<\/td>\n<td>1 year (10)<\/td>\n<\/tr>\n<tr>\n<td>Accessing a computer to defraud and obtain value<\/td>\n<td>Sec. (a)4<\/td>\n<td>5 years (10)<\/td>\n<\/tr>\n<tr>\n<td>Intentional access and reckless damage<\/td>\n<td>(a)(5)(A)(ii)<\/td>\n<td>5 years (20)<\/td>\n<\/tr>\n<tr>\n<td>Trafficking in passwords<\/td>\n<td>(a)(6)<\/td>\n<td>1 year (10)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div id=\"mayer_1.0-ch06_s02_s04_s07_n01\" class=\"key_takeaways editable block\">\n<h3 class=\"title\">Key Takeaway<\/h3>\n<p id=\"mayer_1.0-ch06_s02_s04_s07_p02\" class=\"para\">Offenses can be against persons, against property, or against public policy (as when you bribe a public official, commit perjury, or use public goods such as the mails or the Internet to commit fraud, violate antitrust laws, or commit other white-collar crimes).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"author":26,"menu_order":3,"template":"","meta":{"_candela_citation":"[]","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-1407","chapter","type-chapter","status-publish","hentry"],"part":1404,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/pressbooks\/v2\/chapters\/1407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/wp\/v2\/users\/26"}],"version-history":[{"count":1,"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/pressbooks\/v2\/chapters\/1407\/revisions"}],"predecessor-version":[{"id":1427,"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/pressbooks\/v2\/chapters\/1407\/revisions\/1427"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/pressbooks\/v2\/parts\/1404"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/pressbooks\/v2\/chapters\/1407\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/wp\/v2\/media?parent=1407"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/pressbooks\/v2\/chapter-type?post=1407"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/wp\/v2\/contributor?post=1407"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/montgomerycollege-masterybusinesslaw2\/wp-json\/wp\/v2\/license?post=1407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}