“Representative government and trial by jury are the heart and lungs of liberty. Without them we have no other fortification against being ridden like horses, fleeced like sheep, worked like cattle and fed and clothed like swine and hounds.” — John Adams (1774) We work with experienced Criminal Defense AttorneysRead More →

Indicators of Possible Child Abuse in: Sexual Abuse Cases (Following information taken from Information Guide published by Childhelp USA ) Clergy Malpractice – Child’s Appearance Has torn, stained or bloody underclothing. Experiences pain or itching in genital area. Have bruises or bleeding in external genitalia, vagina or regions. Has venerealRead More →

There are time limits within which to bring these actions which vary from state to state; however there are ways to avoid the strict time limitations. Call one of our attorneys familiar with the procedures for representing you in these sensitive claims. Most child sexual abuse is committed by someoneRead More →

Network crime can be divided into two aspects: (I) crimes against computer equipment or network; (II) crimes encouraged by computer equipment or network. The law does not attempt to provide a comprehensive definition of cybercrime, but merely states that each of the crimes listed in the law will constitute cybercrime.Read More →

Public international law (or national law) is a series of customary or conventional rules, which is regarded as legally binding by civilized countries in their interactions, and only involves the rights and obligations of sovereign countries. Private international law (or conflict of laws) can be defined as a rule chosenRead More →

The double jeopardy clause has been written into the Fifth Amendment of the U.S. Constitution. The double jeopardy clause guarantees Not to be charged after acquittal for the same offence and not to be double convicted for the same offence, there is no multiple punishment for the same crime. TheRead More →

Computer Abuse Act 1990 (UK). The law focuses on data and computer systems. It consists of three parts. Section 1 focuses on unauthorized use of computers (hackers). Section 2 covers situations in which section 1 violations occur and may be repeated. Section 3 applies to unauthorized computer changes. This isRead More →