Sign In
Not register? Register Now!
Essay Available:
You are here: HomeEssayIT & Computer Science
Pages:
2 pages/≈550 words
Sources:
1 Source
Level:
MLA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Two Scenarios Of False Information And Destroying Computer Evidences (Essay Sample)

Instructions:

I did the paper recently as well. it was about to analyse two SCENARIOS of false information and destroying computer evidences

source..
Content:
Student’s Name
Professors Name
Course
Date
Cyber Law
Question 4
The given scenario presents a very bad picture of the company in question. Misdating, backdating, and knowingly giving misleading financial documentation can lead to irregularities that might further result to the suffering of the company’s corporate governance from the general deficiencies and may be a signal of a crucial problem with its internal. For instance, in this case, where the SEC has charged the company, there are expectations of so many shortcomings and changes in the organization. The worst thing is that the SEC is claiming that the company did the backdating of the documents deliberately. Therefore, this is a serious offense.
According to Ferrera, Reder, and Lichtenstein (2011), the broadest federal statute that criminalizes lying is 18 U.S.C. § 1001. It states that it is a crime to willfully and knowingly make any materially false, fraudulent, or fictitious statements in the course of any matter of the Confederate government. Therefore, the company is liable for making the false statements, which is not acceptable by the law and it may lead to big fines imposed on the company. On the contrary, the company’s management might end up setting up strict rules for the employees due to the risk they are causing the organization. Further, the management will carry out an investigation to determine the people responsible for the backdating the documents, thus, leading to the unhealthy working environment and loss of jobs by even innocent employees.
Question 5
In many occasions, people would probably try to do anything they can to destroy or conceal evidence when caught up in a police investigation or when facing criminal charges. The action of Becker destroying the evidence by dumping the computer is against the law and that may land him to huge problems (Ferrera, Reder, and Lichtenstein). Therefore, several results may occur in the given case. First, it may be a standard for a motion to consider. The court may decide to amend or alter under the federal rule that there is a newly discovered evidence or there has been a manifest of the facts about the law. Once this is done, the district law is not supposed to issue the defendant a do-over because of obtaining new counsel. Therefore, the cas...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Explaining Or Describing Paper: Can Computers Think?
    Description: The ability to provide one's mind in explaining or describing something or someone, then it is reasonable to imagine that computers can think. ...
    1 page/≈275 words| 1 Source | MLA | IT & Computer Science | Essay |
  • DOS (Denial of Service) Need To Be Punished By The Law
    Description: What is cyberstalking? What type of offenses can occur that could be defined as cyberstalking? How can a person protect themselves from becoming a victim of cyberstalking or cyber exploitation?...
    6 pages/≈1650 words| 2 Sources | MLA | IT & Computer Science | Essay |
  • About Summarization Of Recent Work About P Versus NP Problem
    Description: Circuit complexity and other techniques have stalled thereby pushing away the hope of ever separating the P and NP problem....
    3 pages/≈825 words| 3 Sources | MLA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!