CJE 1685 - Legal Aspects of Computer Related Criminal Investigations
College of Public Safety Administration
Credit(s): 3
Contact Hours: 47
Contact Hours: 47
Effective Term Fall 2015 (505)
Course Description
This course will provide the student the opportunity to learn the legal aspects of laws and codes that apply to computer related criminal investigations. Students will learn the elements required to prosecute computer related crimes including writing search warrants.
Learning Outcomes and Objectives
- The student will understand the definition of acronyms, abbreviations and legal terms that may apply to computer related crimes by:
- researching acronyms and abbreviations used on the Internet.
- locating legal terms that may apply to computer related crimes.
- building a glossary with definitions of acronyms, abbreviations and legal terms that may apply to computer related crimes.
- explaining the definition of acronyms, abbreviations and legal terms that may apply to computer related crimes.
- The student will know the common elements of state statutes that apply to computer related crimes by:
- reviewing state statutes that apply to computer related crimes.
- researching case histories of computer related crimes.
- defining the elements of state statutes that apply to computer related crimes.
- listing the elements of state statutes that apply to computer related crimes.
- discussing the elements of state statutes that apply to computer related crimes.
- applying the elements of state statutes to computer related crimes.
- giving examples of computer related crimes under state jurisdiction.
- The student will know the elements of federal codes and rules that apply to computer related crimes by:
- reviewing federal codes and rules that apply to computer related crimes.
- defining the elements of federal codes and rules that apply to computer related crimes.
- researching case histories of computer related crimes.
- listing the elements of federal codes and rules that apply to computer related crimes.
- discussing the elements of federal codes and rules that apply to computer related crimes.
- applying the elements of federal codes and rules to computer related crimes.
- giving examples of computer related crimes under federal jurisdiction.
- The student will know the common elements of international laws, codes and legal rules that apply to computer related crimes by:
- reviewing international laws, codes and legal rules that apply to computer related crimes.
- defining the elements of international laws, codes and legal rules that apply to computer related crimes.
- listing the elements of international laws, codes and legal rules that apply to computer related crimes.
- researching case histories of computer related crimes.
- discussing the elements of international laws, codes and legal rules that apply to computer related crimes.
- applying the elements of federal codes and rules to computer related crimes.
- giving examples of international computer related crimes.
- The student will understand how intellectual property issues affect computer related crime investigations by:
- reviewing the First Amendment to the United States Constitution.
- discussing violations of copyright laws on the Internet.
- researching violations of domain names and trademarks used on the Internet.
- researching violations of software and web site license agreements.
- exploring how patent laws apply to the Internet.
- reviewing the licensing of multimedia on the Internet.
- examining corporate policies on Internet and email use.
- The student will understand the issues related to the jurisdiction of computer related crimes by:
- reviewing laws and rules regarding jurisdiction.
- defining state jurisdiction as applied to computer related crimes.
- defining federal jurisdiction as applied to computer related crimes.
- defining international jurisdiction as applied to computer related crimes.
- discussing the issues involved with computer related crimes that span multiple jurisdictions.
- The student will know how to write search warrants involving computer related crimes by:
- reviewing the 4th Amendment (search and seizure) of the United States Constitution.
- listing the requirements to obtain a search warrant.
- listing the items that must be contained in a search warrant.
- listing the procedures for executing a search warrant.
- listing additional items that must be included in a search warrant obtained for computer related crimes.
- discussing issues with international, federal and state search warrants.
- writing a search warrant for a computer related crime.
Criteria Performance Standard
Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual classroom instructors.
History of Changes
C&I 4/10/01,DBT 5/15/01, Eff 20003.
C&I 6/25/02, BOT 7/29/02, eff yrtr 20021.
Flexible Delivery 2002.
Effective 20051(0355).
3 Year Review 2008.
C&I Approval: 01/25/2005, BOT Approval: 03/21/2005, Effective Term: Fall 2005 (355).
C&I Approval: 11/21/2014, BOT Approval: 02/17/2015, Effective Term: Fall 2015 (505)
Related Programs
- Computer Related Crime Investigation (CRCI-CT) (625) (Active)
- Computer Related Crime Investigation (CRCI-CT) (585) (Draft)
- Digital Forensics and Computer Investigations (DIGFORN-AS) (620) (Active)
- Public Safety (CJPSS-AS) (645) (Active)
- Public Safety Administration (PSA-TR) (670) (Active)
