North Carolina 8.80 Fraud in Connection With Identification Documents-Possession (18 U.S.C. Sec. 1028(a)(6)).
North Carolina 8.85 Unauthorized Access Devices-Using or Trafficking (18 U.S.C. Sec. 1029(a)(2))
North Carolina 8.86 Access Devices-Unlawfully Possessing Fifteen or More (18 U.S.C. Sec. 1029(a)(3)). .
North Carolina 8.88 Access Devices-Illegal Transactions (18 U.S.C. Sec. 1029(a)(5))
North Carolina 8.89 Access Devices-Unauthorized Solicitation (18 U.S.C. Sec. 1029(a)(6)).
2.12 EXPLANATORY: RULE 1006 SUMMARIES
Petition to Modify or Amend Divorce Decree Stopping Child Support on the Grounds that Respondent Interfered with Visitation Rights and Child is Now an Adult
First Meeting Minutes of Directors
Consciousness of Guilt (Flight, Concealment, Use of an Alias, etc.) (revised 2017)
Mutual Wills package with Last Wills and Testaments for Married Couple with No Children
Employment Application and Job Offer Package for a Psychologist
Assignment of Personal Property
Jury Instruction - Impeachment - Bad Reputation or Opinion Concerning Truthfulness - May Be Used With 6.1 - 6. 6
Answer and Defenses - Mobile Home Accident
Sample Letter for Speaking Engagement
Indiana 8.102 Damage to a Protected Computer Causing Loss (18 U.S.C. Sec. 1030(a)(5)(C)
Iowa 8.102 Damage to a Protected Computer Causing Loss (18 U.S.C. Sec. 1030(a)(5)(C)
Kansas 8.102 Damage to a Protected Computer Causing Loss (18 U.S.C. Sec. 1030(a)(5)(C)
Kentucky 8.102 Damage to a Protected Computer Causing Loss (18 U.S.C. Sec. 1030(a)(5)(C)
Louisiana 8.102 Damage to a Protected Computer Causing Loss (18 U.S.C. Sec. 1030(a)(5)(C)