liabilites Flashcards
Dishonestly takes or obtains a document
S228(1)(a) (7yrs)
DISHONESTLY
WITHOUT CLAIM OF RIGHT
TAKES OR OBTAINS
ANY DOCUMENT
WITH INTENT TO OBTAIN:
- ANY PROPERTY
- SERVICE
- PECUNIARY ADVANTAGE
- VALUABLE CONSIDERATION
Uses a document
S228(1)(b) (7yrs) ca61
DISHONESTLY
WITHOUT CLAIM OF RIGHT
USES OR ATTEMPTS TO USE
ANY DOCUMENT
WITH INTENT TO OBTAIN:
- ANY PROPERTY
- SERVICE
- PECUNIARY ADVANTAGE
- VALUABLE CONSIDERATION
OBTAINS BY DECEPTION (Obtains property)
240(1)(A) OBTAINS
BY ANY DECEPTION
WITHOUT CLAIM OF RIGHT
OBTAINS
OWNERSHIP OF
POSSESSION OF
CONTROL OVER
ANY
PROPERTY
PRIVILEGE
SERVICE
PECUNIARY ADVANTAGE
BENEFIT
VALUABLE CONSIDERATION
DIRECTLY OR INDIRECTLY
OBTAINS BY DECEPTION (ALTER DOCUMENT )
240(1)(c)
BY ANY DECEPTION
WITHOUT CLAIM OF RIGHT
INDUCES OR CAUSES ANY OTHER PERSON TO
-DELIVER OVER
- EXECUTE
-MAKE
-ACCEPT
-ENDORSE
-DESTROY
-ALTER
ANY DOCUMENT OR THING CAPABLE OF BEING USED TO DERIVE A PECUNIARY ADVANTAGE
OBTAINS BY DECEPTION (NCURS DEBT OBTAINS CREDIT)
240(1)(B) 7yyrs
BY ANY DECEPTION
WITHOUT CLAIM OF RIGHT
IN INCURRING ANY
DEBT OR LIABILITY
OBTAINS CREDIT
OBTAINS BY DECEPTION CAUSE LOSS
240(1)(d)
BY ANY DECEPTION
WITHOUT CLAIM OF RIGHT
CAUSES LOSS TO ANY OTHER PERSON
Forgery (both offences)
S256 CA61
(1) 10yrs
Makes a false document with intent to obtain any property privilege service, pec advantage, benefit or valuable consideration
(2) 3 yrs
Marks a false document knowing it to be false with intent that it be used or acted upon in Nz or elsewhere as genuine.
USING FORGED DOCUMENTS
S257 USING FORGED DOCUMENTS
10YR
Knowing a document to be forged
A)Uses the document to obtain any property privilege ….
B)Uses deals with or acts upon the document as if it were genuine
C) causes any person to use or deal with as if it were genuine.
Altering a document with intent to deceive
S258 Altering a document with intent to deceive
10yrs
With intent to obtain by deception any property etc or to cause loss to any person
A) alters conceals or destroys any document or causes a document to be altered, concealed or destroyed
b) makes a document or causes a document to be made that is in whole or part a reproduction of any document.
Using altered document with intent to deceive
S259 Using altered document with intent to deceive
10yrs
1)
Knowing a document to have been made or altered as in s258 with intent to obtain by deception any property etc, or to cause loss to any person
Uses or deals with or acts upon the document
Causes any person to use or deal with or act upon the document.
Accessing computer system for dishonest purpose (obtains property)
Accessing computer system for dishonest purpose
S249 ca61
7yrs
(1)
Accesses
Any computer system thereby
dishonestly or by deception
WICOR
Obtains any property …
or
Causes loss to any person
Accessing computer system for dishonest purpose (accesses with intent)
Accessing computer system for dishonest purpose
S249 ca61
(2) 5yrs
Accesses
Any computer system
dishonestly or by deception
WICOR
With intent
To obtain any property …
or
To Cause loss to any person
Damaging or interfering with a computer system (danger to life)
S250 Damaging or interfering with a computer system
10yrs
(1)
Intentionally or recklessly
Destroys or damages or alters
A computer system
Knowing or ought to know danger to life is likely to result.
Damaging or interfering with a computer system (hacks)
s250(2)
7yrs
Intentionally or recklessly
Without authorisation or knowing that he is not authorized or reckless as to whether or not he is authorized
Damages deletes modifies or otherwise interferes with any data or software in any computer
Causes any data or software in any computer system to be damaged deleted modified or otherwise interfered with
Causes any computer system to
Fail
Deny service to a authorized person
accessing a computer system without authorisation
S252 accessing a computer system without authorisation
2yrs
1)
Intentionally
Accesses
Directly or indirectly
Any computer system
Without authorisation
Knowing he is not ajutherised to access
Or being reckless as to whether or not he is authorised to acces that system
2) does not apply if a person who is authorisedf to access a computer system accesses that computer system for a purpose other than the one which that person was given access.