Ave Mince-Didier

Attorney · UC Berkeley School of Law

More Articles by Ave Mince-Didier

Articles 41-50 out of 73

Civil Compromise for a Criminal Offense
In some states, a court can dismiss a misdemeanor charge if the defendant settles (pays money) to the victim of the crime. This is called a civil compromise of a criminal action.
Getting a Copy of Your Criminal Record
A criminal record, sometimes called a rap sheet, is a collection of a person's criminal convictions and arrests. The information in the record varies from state to state and even from county to county.
Disorderly Conduct in Massachusetts
In Massachusetts, laws against disorderly conduct and disturbing the peace criminalize fighting, being noisy and annoying in public, and other behavior that is likely to alarm, upset, or provoke others.
Wisconsin Battery Laws and Charges
In Wisconsin, the crime of battery will be punished as a felony when it causes substantial or great bodily harm or is committed by or against certain people.
Can a Judge Order My Child to Testify in a Criminal Case?
Children who are witnesses to or victims of crimes may be ordered to testify in criminal cases. Generally, judges decide on a case-by-case basis whether a child is competent (qualified) to testify.
Prostitution Laws in New York
New York has laws against buying and selling sex, as well as promoting prostitution.
Is Prostitution Legal in California?
In California, both pimping and pandering are crimes. Laws against pimping and pandering are generally aimed at third parties who benefit from the sale of sex, although they may also apply to “johns” and prostitutes.
Bribery Charges and Defenses
Bribery is a serious offense. Learn about bribery crimes under state and federal laws, their penalties, and possible defenses.
Felony "Menacing" Charges
Learn how state criminal codes define menacing, what penalties a menacing charge could mean, and what defenses are available in menacing cases.
Hacking a Computer or Computer Network
Hacking involves “breaking into” a computer or computer network without permission. The hacker essentially trespasses into the computer or system.