Archive for May 11th, 2018

NO Plaguarism 10

Part I
Textbook
THE LEGAL ENVIRONMENT TODAY 7th edition
BUSINESS IN ITS ETHICS REGULATORY E-COMMERCE AND GLOBAL SETTING
ISBN 9781111530617
Author: Roger LeRoy Miller & Frank B. Cross
These are the questions to be answer from the textbook.
Chapter 10
Questions and case problem beginning on page 305
10-1
10-2
10-5
10-8
Chapter 11
Questions and case problems beginning on page 344
11-1
11-2
11-3
Please find attached pages of the texbook about the questions / case problem. You can also google or chegg as a guide or find the book. Please list references (textbook and other refer
Part 2 – Discussion
1. Is the Statute of Frauds an offensive or a defensive weapon? Additionally what kind of contracts does the Statute of Frauds require to be in writing to be enforceable?
2. If someone breaches a contract what kind of damages can the non-breaching party recover?
3. When a seller under the UCC sells and delivers something to the buyer and the seller does not conform the buyer has 3 options. What are those 3 options?
4. If you worked for a business which resells items in the US (retailer) and were importing your items as they all do and expected these items for the Christmas selling season could this affect you if you were an importer? Could you do anything to protect yourself so that your company could have the needed inventory for the upcoming Christmas selling season? Elaborate.
Global Supply Chains Paralyzed After World’s 7th Largest Container Shipper Files Bankruptcy Assets Frozen
http://www.zerohedge.com/news/2016-08-31/global-supply-chains-paralyzed-after-worlds-7th-largest-container-shipper-files-bank

NO Plaguarism 10

Part I
Textbook
THE LEGAL ENVIRONMENT TODAY 7th edition
BUSINESS IN ITS ETHICS REGULATORY E-COMMERCE AND GLOBAL SETTING
ISBN 9781111530617
Author: Roger LeRoy Miller & Frank B. Cross
These are the questions to be answer from the textbook.
Chapter 10
Questions and case problem beginning on page 305
10-1
10-2
10-5
10-8
Chapter 11
Questions and case problems beginning on page 344
11-1
11-2
11-3
Please find attached pages of the texbook about the questions / case problem. You can also google or chegg as a guide or find the book. Please list references (textbook and other refer
Part 2 – Discussion
1. Is the Statute of Frauds an offensive or a defensive weapon? Additionally what kind of contracts does the Statute of Frauds require to be in writing to be enforceable?
2. If someone breaches a contract what kind of damages can the non-breaching party recover?
3. When a seller under the UCC sells and delivers something to the buyer and the seller does not conform the buyer has 3 options. What are those 3 options?
4. If you worked for a business which resells items in the US (retailer) and were importing your items as they all do and expected these items for the Christmas selling season could this affect you if you were an importer? Could you do anything to protect yourself so that your company could have the needed inventory for the upcoming Christmas selling season? Elaborate.
Global Supply Chains Paralyzed After World’s 7th Largest Container Shipper Files Bankruptcy Assets Frozen
http://www.zerohedge.com/news/2016-08-31/global-supply-chains-paralyzed-after-worlds-7th-largest-container-shipper-files-bank

CRJ410 Assignment 5

Assignment 5: Corrections and Victims Rights
Due Week 10 and worth 200 points
Go to the Federal Bureau of Prisons (BOP) Website and review the Resources For Victims & Witnesses located at http://www.bop.gov/resources/victim_resources.jsp. Next go to the American Correctional Association Website and review the ACA Code of Ethics located at http://www.counseling.org/resources/aca-code-of-ethics.pdf. Lastly go to Cornell University Law Schools Website and review 18 U.S. Code Crime 3771 Crime victims rights located at http://www.law.cornell.edu/uscode/text/18/3771.
Write a four to six (4-6) page paper in which you:
1) Examine the significant manner in which the Crime Victims’ Rights Act protects the rights of crime victims. Provide your opinion of the effectiveness of this piece of legislation. Justify your response.
2) Determine whether or not victim impact statements add value during sentencing and parole hearings. Provide a rationale for your response.
3) Debate which is more important to a victim: the right to be notified of proceeding or the right to participate in a proceeding. Provide a rationale for your response.
4) Review the following three (3) statements and determine the key ethical responsibilities of corrections personnel associated with them.
5) Recommend two (2) strategies for ensuring that correctional employees (e.g. correctional staff administrators parole officers probation officers etc.) adhere to the ACA Code of Ethics.
6) Debate the importance of victims having a voice in the legal process.
7) Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
The specific course learning outcomes associated with this assignment are:

CRJ410 Assignment 5

Assignment 5: Corrections and Victims Rights
Due Week 10 and worth 200 points
Go to the Federal Bureau of Prisons (BOP) Website and review the Resources For Victims & Witnesses located at http://www.bop.gov/resources/victim_resources.jsp. Next go to the American Correctional Association Website and review the ACA Code of Ethics located at http://www.counseling.org/resources/aca-code-of-ethics.pdf. Lastly go to Cornell University Law Schools Website and review 18 U.S. Code Crime 3771 Crime victims rights located at http://www.law.cornell.edu/uscode/text/18/3771.
Write a four to six (4-6) page paper in which you:
1) Examine the significant manner in which the Crime Victims’ Rights Act protects the rights of crime victims. Provide your opinion of the effectiveness of this piece of legislation. Justify your response.
2) Determine whether or not victim impact statements add value during sentencing and parole hearings. Provide a rationale for your response.
3) Debate which is more important to a victim: the right to be notified of proceeding or the right to participate in a proceeding. Provide a rationale for your response.
4) Review the following three (3) statements and determine the key ethical responsibilities of corrections personnel associated with them.
5) Recommend two (2) strategies for ensuring that correctional employees (e.g. correctional staff administrators parole officers probation officers etc.) adhere to the ACA Code of Ethics.
6) Debate the importance of victims having a voice in the legal process.
7) Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
The specific course learning outcomes associated with this assignment are:

NO Plaguarism 11

Part I
Textbook
THE LEGAL ENVIRONMENT TODAY 7th edition
BUSINESS IN ITS ETHICS REGULATORY E-COMMERCE AND GLOBAL SETTING
ISBN 9781111530617
Author: Roger LeRoy Miller & Frank B. Cross
These are the questions to be answer from the textbook.
Chapter 12
Questions and case problem beginning on page 378
12-2
12-4
Chapter 13
Questions and case problems beginning on page 398
3-1
Please find attached pages of the texbook about the questions / case problem. You can also google or chegg as a guide or find the book. Please list references (textbook and other refer
Part 2 – Discussion
1. Your professor has a lot of credit card debt as well as other unsecured debts. Although your professor is able to make all the required payments he has heard that he could be forced into involuntary bankruptcy. Is this possible even though he is making all the required minimum payments each month?
2. Are federal student loans dischargeable in bankruptcy?
3. What is the TILA? Why do people when they have an adjustable rate mortgage which finally adjusts which causes their payments to go up claim that they did not know that their respective mortgage payment would go up when it finally adjusts?

law assignment 2

Note:
I needcomplete3-5 pages paperon the following assignment.HALF PAGE LENGTH IS NOT ACCEPTED.Mustaddress the all steps properly.Mustinclude5-6 credible referencescited inAPA.Must provide100% originalwork.
DO NOT PROVIDE THE PREVIOUSLY USED WORK.
DO NOT WRITE QUESTIONS IN ANSWER!
Assignment:
Scenario:
Acting as a subject matter expert on criminal investigation you have been asked to assist in the creation of a simulation exercise of a multijurisdictional criminal investigation. Some of the preliminary work has already been completed. Your specific task is to compile the post investigation review document to be used by exercise assessors in their evaluation of the quality of the criminal investigation.
This is what you know:
A series of 11 random explosions have occurred in an area that traverses two states and a total of seven counties (five counties in one state and two counties in the other state) embracing a total of nine cities and incorporated towns. The explosions resulted in five deaths 32 injuries and significant property damage. In each case the explosion was detonated remotely. The lead investigative agency is the Virtual Maryland Police Department because the first three explosions occurred within its jurisdiction. VPD has about 100 sworn personnel including 17 all-purpose detective investigators. It has a certified forensic laboratory for rudimentary analysis staffed by credentialed civilians. Ultimately two suspects were identified and apprehended one adult male and one teenage (minor) male. Statements were made by each resulting in investigative searches and seizures of forensic evidence. Both subjects eventually confessed to their respective and collective parts in the crimes.
Assessors in the simulation exercise will be debriefing the role players as to their actions; their understanding of the legal basis purpose and advantages and disadvantages of their investigative strategies; and the conduct of the investigation. The assessors have already come up with a series of questions for the participants. You have been asked to provide the model answer against which the responses of the participants will be graded. Following are the questions to be posed by the simulation exercise assessors to the investigators:
1. Investigative Task Force
2. Legal Issues
3. Forensic Evidence Collection and Analysis
a) Without regard to individual items of forensic evidence describe the steps necessary to ensure that items materials and samples are eligible as forensic evidence in a criminal proceeding.
b) Why?
c) In what ways do the evidence collection procedures differ at the scenes of the explosions versus the residences of each of the suspects?
4. Testimonial Evidence
5. Public Information
a) As the investigation proceeds in general terms what information is or is not available to:
I. Non-VPD members of the task force?
II. Other law enforcement agencies?
III. Family members of the deceased and injured victims?
IV. Credentialed news reporters?
V. Community members?
Required:
In a complete 3-5 pages paper you will compose a comprehensive model response for each of the above questions posed by the simulation exercise assessors.Note: This project submission is enhanced by outside resources that support the appropriateness of the model responses. Creditable resources and citations (or lack thereof) will be graded accordingly.
In your paper
Must include properintroduction and conclusion
Must read the attached required chapters and include5-6 credible referencescited in APA.

NO Plaguarism 13

Part I
Textbook
THE LEGAL ENVIRONMENT TODAY 7th edition
BUSINESS IN ITS ETHICS REGULATORY E-COMMERCE AND GLOBAL SETTING
ISBN 9781111530617
Author: Roger LeRoy Miller & Frank B. Cross
These are the questions to be answer from the textbook.
Chapter 18
Questions and case problem beginning on page 557
18-1
18-4
18-5
Chapter 19
Questions and case problems beginning on page 583
19-1
19-5
Chapter 20
Questions and case problems beginning on page 606
20-1
20-4
Chapter 21
Questions and case problems beginning on page 624
21-2
Please find attached pages of the texbook about the questions / case problem. You can also google or chegg as a guide or find the book. Please list references (textbook and other refer
Part 2 – Discussion
1. Should being a homosexual transgender or a bisexual become a protected class under Title VII of the Civil Rights Act of 1964? Elaborate.
2. Is an administrative agency’s ruling a legal way around the passing of enforceable actions through the normal legislative process and the circumventing of Congress?
3. Should we have more consumer protection laws to keep us safe?
4. Should the US have more environmental laws? Is this good for the economy? What about countries like China which seems not to care? Review the links and let me know what your thoughts are.

law Q

i need this within 15 houres
essay questions
what crimes can you charged someone with
o assault
o battery
o robbery
issue
state rule
apply the rule to the facts
then provide a conclusion
this is the Q
On a sunny breezy Sunday afternoon in late October 2016 Regina George was holding a town hall style campaign meeting in hopes of securing her bid for the United States Senate. Being back in her hometown was exciting for Regina given the travel associated with her busy campaign schedule. As such Regina opted to leave straight from the campaign event and meet up with some friends at a restaurant in downtown. While pulling into a parking space at The the hip new spot in the Arts District Regina noticed a person standing on the sidewalk with a hat covering their face. Regina exited the car and as she walked around the front side she was struck in the face with an egg. In doing so Regina dropped her cell phone. The person who threw the egg Cady disliked Regina’s position on global climate change. When throwing the egg Cady yelled "Your policies will kill us all!" As Cadybegan to flee the scene she noticed the cell phone on the ground. She picked the phone up put it in her purse and said "I’m sure there is nothing on here you wouldn’t mind the public seeing" and then ran into an alley. Cady was arrested the next day after two witnesses positively identified her to responding officers. Cady has denied all involvement. Upon a search of Cady’s home the cell phone of Regina was located. The search was lawful. Regina will be meeting with your boss the District Attorney for the County of Ventura to learn what crimes Cady will be charged with. The District Attorney has asked you to prepare a memorandum describing whether Cady can be charged with the following crimes: burglary assault robbery and battery. (This essay is scored out of 20 points and 10 points of extra credit are available for exemplary responses.) foucs also on exemplary responses I uplod notes from class and one of the file there is describe how to write it.

CNSS Model Exercise

Exercises: Answer problems 1 and 2 from the Exercises section
(page 35) of Chapter 1 of the textbook.
——————————————————————–
Exercises:
Some hints on Chapter 1 Exercise 1 (page 35)
——————————————————————–
A useful reference on the CNSS model can be found
in document NSTISSI No. 4011 from the National Training
Standard for Information Security Professionals
( www.cnss.gov/Assets/pdf/nstissi_4011.pdf )
To answer Exercise 1 (page 35 of text) please refer to Figure 1.2
(CNSS security model) on page 5 of Chapter 1 of the text.
The CNSS model of Figure 1.2 identifies the nine interacting
factors that influence the security of any resource. The nine
key factors are:
(1) Policy: which deals with info security policies in place
(2) Education: which deals with education of users on security related issues
(3) Technology: which covers the technology used to implement security measures
(4) Confidentiality: confidentiality of info/data
(5) Integrity: addresses measures in place to ensure data integrity
(6) Availability: to ensure authorized users access to information in usable format
(7) Storage: issues dealing with data storage
(8) Processing: issues that cover the processing and handling of data
(9) Transmission: covers issues related to factors that influence transmission of data
These nine influencing factors can be modeled as a 3-dimensional cube as
shown in Figure 1.2 where the each of the three axes of the cube represent
three of these factors. When we consider the relationship among the three
dimensions represented by the axes shown in Figure 1.2 we have a 3 x 3 x 3
cube with 27 cells where each cell represents an area of intersection among
the three dimensions that must be addressed.
In Exercise 1 you determine how you would address the different factors that impact
the security and protection of data/information pertaining to this class (such as student
information student homework submissions student discussion posts etc.) by applying
the CNSS model (Figure 1.2).
To apply the model examine the intersecting cells on the CNSS cube from Figure 1.2
and determine how you could address some of the factors influencing security of class
information.
Some examples that you may consider are:
First you could consider the nine factors individually. For example
(1) Confidentiality: Only students registered in the course have access to the
course web page.
(2) Integrity: Students would have unit logins which would be their means to
access the course webpage via eCollege. Students can only alter or modify
their own work and cannot change or delete another student’s submitted work.
(3) Availability: The university would ensure that the eCollege site is accessible
to all online students with minimal downtime for maintenance and upgrades.
… etc.
After you have addressed the individual factors you can address the intersecting
cells in the CNSS security model of Figure 1.2. Some examples include:
– Confidentiality/Policy/Storage – This cell represents the intersection of the
factors Data Confidentiality Security Policy and Data Storage. This can be
addressed by adopting the following policy:– Only students registered in the
course are able to access course related material and student discussion posts.
Additionally homework assignments are only viewable by the instructor and the
applicable student
– Integrity/Policy/Processing – formed by the intersection of the Integrity Policy
and Processing cells in Figure 1.2. This can be addressed by having a policy such
as:– The course would have a policy that would all work submitted by the students
must represent their own work and would properly cite all sources referenced.
– Availability/Education/Processing – formed by the intersection of the Availability
Education and Processing cells in Figure 1.2. This can be addressed by having a
policy such as:–

CNSS Model Exercise

Exercises: Answer problems 1 and 2 from the Exercises section
(page 35) of Chapter 1 of the textbook.
——————————————————————–
Exercises:
Some hints on Chapter 1 Exercise 1 (page 35)
——————————————————————–
A useful reference on the CNSS model can be found
in document NSTISSI No. 4011 from the National Training
Standard for Information Security Professionals
( www.cnss.gov/Assets/pdf/nstissi_4011.pdf )
To answer Exercise 1 (page 35 of text) please refer to Figure 1.2
(CNSS security model) on page 5 of Chapter 1 of the text.
The CNSS model of Figure 1.2 identifies the nine interacting
factors that influence the security of any resource. The nine
key factors are:
(1) Policy: which deals with info security policies in place
(2) Education: which deals with education of users on security related issues
(3) Technology: which covers the technology used to implement security measures
(4) Confidentiality: confidentiality of info/data
(5) Integrity: addresses measures in place to ensure data integrity
(6) Availability: to ensure authorized users access to information in usable format
(7) Storage: issues dealing with data storage
(8) Processing: issues that cover the processing and handling of data
(9) Transmission: covers issues related to factors that influence transmission of data
These nine influencing factors can be modeled as a 3-dimensional cube as
shown in Figure 1.2 where the each of the three axes of the cube represent
three of these factors. When we consider the relationship among the three
dimensions represented by the axes shown in Figure 1.2 we have a 3 x 3 x 3
cube with 27 cells where each cell represents an area of intersection among
the three dimensions that must be addressed.
In Exercise 1 you determine how you would address the different factors that impact
the security and protection of data/information pertaining to this class (such as student
information student homework submissions student discussion posts etc.) by applying
the CNSS model (Figure 1.2).
To apply the model examine the intersecting cells on the CNSS cube from Figure 1.2
and determine how you could address some of the factors influencing security of class
information.
Some examples that you may consider are:
First you could consider the nine factors individually. For example
(1) Confidentiality: Only students registered in the course have access to the
course web page.
(2) Integrity: Students would have unit logins which would be their means to
access the course webpage via eCollege. Students can only alter or modify
their own work and cannot change or delete another student’s submitted work.
(3) Availability: The university would ensure that the eCollege site is accessible
to all online students with minimal downtime for maintenance and upgrades.
… etc.
After you have addressed the individual factors you can address the intersecting
cells in the CNSS security model of Figure 1.2. Some examples include:
– Confidentiality/Policy/Storage – This cell represents the intersection of the
factors Data Confidentiality Security Policy and Data Storage. This can be
addressed by adopting the following policy:– Only students registered in the
course are able to access course related material and student discussion posts.
Additionally homework assignments are only viewable by the instructor and the
applicable student
– Integrity/Policy/Processing – formed by the intersection of the Integrity Policy
and Processing cells in Figure 1.2. This can be addressed by having a policy such
as:– The course would have a policy that would all work submitted by the students
must represent their own work and would properly cite all sources referenced.
– Availability/Education/Processing – formed by the intersection of the Availability
Education and Processing cells in Figure 1.2. This can be addressed by having a
policy such as:–