Archive for the ‘Fourth Amendment’ Category

Allied Healthcare Products : Fourth Amendment to Loan and Security Agreement – Form 8-K – Marketscreener.com

Fourth Amendment to Loan and Security Agreement

This Fourth Amendment to Loan and Security Agreement (the "Amendment") is made and entered into by and between SUMMIT FINANCIAL RESOURCES, LLC, a Delaware limited liability company and the successor in interest to SUMMIT FINANCIAL RESOURCES, L.P., a Hawaii limited partnership ("Lender"), and ALLIED HEALTHCARE PRODUCTS, INC., a Delaware corporation ("Borrower").

Recitals

A. Lender's predecessor in interest and Borrower have entered into a Loan and Security Agreement dated February 27, 2017 (together with any and all exhibits, schedules, addenda or riders hereto, as amended, modified, supplemented, substituted, extended or renewed from time to time, the "Loan and Security Agreement").

B. Lender and Borrower have agreed to further amend the Loan and Security Agreement to increase the dollar sublimit amount with respect to Inventory Advances.

Amendment

For good and valuable consideration, the receipt and sufficiency of which are hereby acknowledged, Lender and Borrower agree as follows:

1. Definitions. Except as otherwise expressly provided herein, terms assigned defined meanings in the Loan and Security Agreement shall have the same defined meanings in this Amendment. The term "Amendment," as defined in the preamble to this Amendment, is incorporated by reference into the Loan and Security Agreement

2. Modification and Amendment of Loan and Security Agreement. Effective as of the date of this Amendment, the Loan and Security Agreement is amended and modified as follows:

The first paragraph of subsection (b) (Inventory Advances) of Section 2.6 (Inventory Advances) of the Loan and Security Agreement is hereby amended to increase the dollar sublimit as follows:

"b. Inventory Advances. Notwithstanding anything to the contrary in the Loan Documents, no Inventory Advances shall be made on the Loan if, after making the requested Inventory Advance, the total, aggregate principal amount of all Inventory Advances will exceed the lowest of: (i) the total cost of Eligible Inventory (as determined by Lender in its sole discretion) multiplied by the Inventory Advance Rate; (ii) one hundred percent (100%) of the amount of outstanding Account Advances; (iii) Two Million Dollars ($2,000,000); and (iv) together with the aggregate amount of all outstanding Account Advances, the Maximum Loan Amount."

In consideration of Lender's agreement to increase the dollar sublimit on Inventory Advances, Borrower agrees to pay to the Lender a modification fee of Five Thousand Dollars ($5,000) (the "Modification Fee") on the date hereof. The Modification Fee shall include the legal fees of Lender's in-house counsel to prepare this Amendment.

3. Representations and Warranties. Borrower affirms and again makes the representations and warranties set forth in Section 6 (Representations and Warranties) of the Loan and Security Agreement as of the date of this Amendment.

4. Payment of Expenses and Attorneys' Fees. Borrower shall pay all reasonable expenses of Lender related to the negotiation, drafting of documents, and documentation of this Amendment, including, without limitation, the Modification Fee (which shall include all reasonable attorneys' fees and legal expenses, including allocated fees of in-house counsel, in connection with the drafting and revising this Amendment). Lender is authorized and directed to disburse a sufficient amount of funds under the Loan to pay these expenses in full.

Allied Healthcare - Fourth Amendment to Loan and Security Agreement

5. Loan Documents Remain in Full Force and Effect. Except as expressly amended or modified by this Amendment, the Loan Documents remain in full force and effect. Borrower confirms that the security interests granted by the Loan Documents also secure the Loan and Security Agreement as amended by this Amendment.

6. Borrower Covenants. Borrower covenants with Lender that Borrower shall execute, deliver, and provide to Lender such additional agreements, documents, and instruments as reasonably required by Lender to effectuate the intent of this Amendment.

7. Release. Borrower and its successors and assigns hereby fully, finally, and forever release and discharge Lender and its successors, assigns, directors, officers, employees, agents, and representatives from any and all actions, causes of action, claims, debts, demands, liabilities, obligations, and suits of whatever kind or nature, in law or in equity, that Borrower has or in the future may have, whether known or unknown, in respect of the Loan Documents, the Loan, or the actions or omissions of Lender in respect to the Loan Documents or the Loan and arising from events occurring prior to the date hereof.

8. Authorization. Borrower represents and warrants that the execution, delivery, and performance by Borrower of this Amendment, and all agreements, documents, obligations, and transactions herein contemplated, have been duly authorized by all necessary corporate action on the part of Borrower and are not inconsistent with Borrower's organizational documents or any resolution of the board of directors, members, managers, or other governing body of Borrower and do not and will not contravene any provision of, or constitute a default under, any indenture, mortgage, contract, or other instrument to which Borrower is a party or by which it is bound, and that upon execution and delivery hereof and thereof, this Amendment will constitute legal, valid, and binding agreements and obligations of Borrower, enforceable in accordance with its respective terms.

9. Integrated Agreement; Amendment. This Amendment, together with the Loan and Security Agreement and the other Loan Documents, constitute the entire agreement and understanding between the parties hereto and supersede all other prior and contemporaneous agreements. This Amendment and the Loan and Security Agreement shall be read and interpreted together as one agreement and shall be governed by and construed in accordance with the laws of the State of Utah without regard to its conflict of laws principles. This Amendment shall be deemed to have been executed by the parties hereto in the State of Utah and may not be altered or amended except by written agreement signed by Lender and Borrower. All other prior and contemporaneous agreements, arrangements, and understandings between the parties hereto as to the subject matter hereof are, except as otherwise expressly provided herein, rescinded.

Borrower acknowledges and agrees that this Amendment is a final expression of the agreement between Lender and Borrower and this Amendment may not be contradicted by evidence of any alleged oral agreement.

[Signatures on Next Page]

Allied Healthcare - Fourth Amendment to Loan and Security Agreement

Dated: October 7, 2021.

Allied Healthcare - Fourth Amendment to Loan and Security Agreement

Disclaimer

Allied Healthcare Products Inc. published this content on 13 October 2021 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 13 October 2021 21:21:19 UTC.

More here:
Allied Healthcare Products : Fourth Amendment to Loan and Security Agreement - Form 8-K - Marketscreener.com

What Are the Limits on Congressional Surveillance? – Lawfare

Congressional authority to request user data from communications service providers is in the spotlight once again thanks to recent requests made by the Houses select committee on the Jan. 6 attack on the Capitol for providers to preserve the data of individuals believed to be connected to the attack. Requests for user dataranging from basic subscriber information and metadata to location information and the contents of communicationshave become standard congressional practice in recent years, as Congress has begun to use its Article I authorities to engage in what I have called congressional surveillance. These requests raise serious questions about the legal boundaries and normative implications of this congressional authority.

Congress has long enjoyed the authority to compel evidence from third parties using its Article I subpoena power. The Supreme Court reaffirmed that power in its Mazars decision last year. But only recently have congressional committees leveraged their subpoena authority to collect electronic evidence in ways that implicate the surveillance power of the digital world.

At first blush, it would seem that surveillance by government authorities has been studied and discussed at length. In reality, however, only executive surveillance authority has received any significant attention. Congressional surveillancethat is, Congresss ability to use its broad subpoena authority as a form of electronic surveillanceremains largely unexplored, and the corresponding limits on that authority are not well understood.

This is unfortunate. Congressional surveillance exhibits hybrid features of both government surveillance and congressional political power, and as a result, challenges traditional thinking about government surveillance. This duality has several important implications, in terms of both what the limits on congressional surveillance are and what they should be.

The Limits on Congressional Surveillance

As I have argued elsewhere, congressional surveillance derives from Congresss Article I subpoena authority, and it is therefore shaped by the interaction of three kinds of limits on congressional power: external limits, meaning sources of law that constrain otherwise valid exercises of congressional surveillance; internal limits, meaning the inherent boundaries of Congresss surveillance authority; and process limits, meaning the procedural and political constraints on how Congress may choose to exercise its surveillance authority. Each of these limits varies from the limits on other, more common forms of government surveillance, and as a whole, they reflect an uneasy convergence of individual privacy with the separation of powers.

External Limits

In the traditional world of government surveillance, compulsory demands for user data tend to adhere to certain constitutional and statutory rules: The government must get a warrant for content and other data with heightened privacy interests and a court order or subpoena for anything less. But the sources of these external limitsmeaning legislative and constitutional constraintson government surveillance apply to Congress in profoundly different ways than they do to the executive. As a result, congressional surveillance is treated in a starkly different manner under key provisions of the SCA; it is also not clear that Congress is subject to the Fourth Amendments warrant requirement, at least not in the categorical sense.

The Stored Communications Act

At a very general level, the SCA (a) prohibits voluntary disclosures of user data to third parties and (b) provides a mechanism through which a governmental entity can compel the production of that data, notwithstanding these prohibitions. It is well established that the SCA applies to requests from the executive branch. As to Congress, however, it is less clear: Is Congresss subpoena power limited by the SCAs prohibitions?

As to some categories of data, this should be an easy question. Specifically, the SCA provides that non-content informationthat is, data that does not include the substance, purport, or meaning of a communication, such as basic subscriber information or other metadata, like session logsmay not be disclosed to any governmental entity. A governmental entity is defined as any department or agency of the United States or political subdivision thereof. But courts have held that this definition excludes Congress, including in the similarly worded Right to Financial Privacy Act, meaning that the SCA does not prohibit providers from voluntarily disclosing non-content information to Congress. Likewise, nothing in the SCA prohibits providers from responding to a congressional subpoena for that information.

Content datasuch as the text of an email or a direct messagepresents a thornier question. Some observers take the perspective that the prohibition on disclosure of content information is absolute, because the statute precludes disclosure to any person or entity. Is Congress an entity? Maybe so. But it may not be so straightforward.

This is because Congress treats itself differently when it legislates and avoids categorical limits on its own authority. It very rarely curtails its Article 1 subpoena power because that authority is so critical to its constitutional responsibilities. The Supreme Court recognized these principles as early as 1927 in McGrain v. Daugherty, saying that Congress cannot legislate wisely or effectively without access to relevant information held by others. The court held that some means of compulsion are essential because mere requests for such information often are unavailing, and also that information which is volunteered is not always accurate or complete. This sensibility has persisted over time: For example, the U.S. Court of Appeals for the D.C. Circuit has repeatedly held that the Federal Trade Commission could disclose confidential information in response to Congresss investigative demands, including through subpoenas, even though it was statutorily prohibited from disclosing that same information to the public.

So it cannot simply be assumed that congressional surveillance fares the same under the traditional external statutory limits that apply to government surveillance when it involves the executive branch. Because Congresss authorities come from a different source, the possibility that they may be constrained in different ways must be taken seriously.

The Fourth Amendment

Several cases in recent years have brought seeming clarity to whether the Fourth Amendments warrant requirement applies to the governments constructive searches of digital information. In Carpenter v. United States, the Supreme Court confirmed that compelled production of some provider-held location information may constitute a search for the purposes of the Fourth Amendment. And it held that law enforcement officers must obtain a warrant to compel the production of that data. In Warshak v. United States, the U.S. Court of Appeals for the Sixth Circuit held similarly as to the contents of emails.

But both cases (like much of the Fourth Amendment case law on digital searches) were limited to law enforcement requests, and the implications for congressional subpoenas are less clear. Traditionally, the Supreme Court has held that the Fourth Amendment requires that congressional subpoenas meet only a reasonableness standard. Under this approach, there is no categorical warrant requirement for Congress. That is, law enforcement must generally have a probable cause warrant, issued by a magistrate judge, before engaging in a searchconstructive or otherwiseto satisfy the Fourth Amendment. But a congressional subpoena need only be relevant to an authorized investigation and reasonably specify the materials to be produced; no magistrate judge, no probable cause, no suppression remedy.

It is certainly possible that a constructive search of digital information would merit heightened judicial scrutiny because of increased privacy interests. But this would require the recipient (or subject) of a subpoena to challenge the subpoena in courta possibility I discuss belowbecause there is no legal requirement for a congressional committee to seek authorization from a judge in advance.

It is also possible that, as a practical matter, the recipient of a congressional subpoena would negotiate restrictions on, say, segregating nonpertinent information or how long Congress can retain information in its records. But all these adjustmentsheightened judicial scrutiny in the event of a court challenge, or negotiated protocolswould supplement, not replace, the current regime, which is a permissive and highly context-dependent inquiry, and not an area of hard and fast rules.

Internal Limits

In the absence of external limits, Congress is free to exercise its surveillance authority as far as its internal limitsthat is, the inherent boundaries of congressional powerpermit. And there are few internal limits here. Based on McGrains rule that Congresss investigative authority is co-extensive with its expressed Article I powers, Congresss surveillance capacity extends in theory as far as its authority to legislate, conduct oversight, appropriate or impeach.

Indeed, courts have historically granted significant deference to Congresss legislative and investigative decisions. For example, the Supreme Court has generally avoided a requirement that Congressat the outset of an investigationidentify a legislative topic of interest, or even indicate that it intends to legislate. Instead, the court has tended to indulge a presumption that Congresss investigative demands are in pursuit of a legitimate purpose. Article Is Speech or Debate Clausewhich has been held to provide absolute immunity to members of Congress and their staff for legislative actsserves as a further cloak for Congresss investigative decisions, limiting a courts ability to peek behind the curtain of Congresss stated purpose. As a result, courts may not examine Congresss underlying motives.

There are also few limits on Congresss ability to disclose the information it obtains through its investigations. In fact, certain aspects of Congresss work necessitate the freedom to share information with the public. The informing function plays a valuable role in Congresss core legislative and oversight duties, among others. To fulfill those responsibilities, committees and members of Congress regularly publish investigative reports and legislative findings, issue press releases, engage with the media, and communicate with constituents. And under the Speech or Debate Clause, a court may not block disclosure to the public of information that is part of the legislative process.

Process Limits

Despite these surprisingly weak constraints on Congresss ability to direct its investigative powers toward surveillance, Congress has not (as an empirical matter) exercised its surveillance tools until recently. And when it has, Congress has generally (though perhaps not always) restrained the number and scope of its requests. This self-restraint arises from procedural rules that govern the issuance and enforcement of congressional subpoenas and political checks, or process limits. These process limits can offer meaningful, even if imperfect, constraints on congressional surveillance, compensating for the otherwise weak internal limits and supplementing the external limits discussed above.

Process limits on congressional surveillance derive in large part from the subpoena enforcement mechanism. In the world of government surveillance, voluntary disclosures are the exception rather than the rule, leading many providers to insist on a subpoena even if they intend to comply with a committees demand. But issuing and enforcing subpoenas against service providers creates significant transaction costs for committees, especially when requests push the envelope. These costs can arise in several ways.

First, there are procedural checks within Congress. Perhaps most importantly, there are significant transaction costs to pursuing a subpoena enforcement action, even before it ever reaches court. To enforce a subpoena in the Senate, a committee must approve and send a resolution to the floor, at which point it must secure a majority vote of the full chamber to authorize civil enforcement. The proof is in the pudding: Since 1979, the Senate has authorized civil enforcement only six times. In the House, the full chamber can authorize its committees to pursue enforcement actions even in the absence of an explicit enforcement statute, but until 2008, there had been some uncertainty as to whether federal courts would have jurisdiction to hear such a case.

Second, there are political checks on the periphery of the enforcement process. Views on government access to private data tend not to follow strict partisan lines, meaning that party control may not translate to party support. In addition, each party risks a tit-for-tat escalation when the chamber changes hands. Further, even once Congress authorizes a suit, it can still take months or years to resolve a case once it arrives in court, not to mention an extensive appeals process if the case has precedential value. Given time-sensitive political pressures and the real possibility that a chamber will change hands every two years, a committee may not be willing to tolerate this kind of delay. This suggests that procedural checks on congressional surveillance, especially with enforcement, are a crucial supplement to the traditional external limits.

Third, some process limits exist beyond the chamber and enforcement process. Congressional surveillance involves seeking information from a legally sophisticated entity that can create significant checks on government demands for data through a variety of actions, including public transparency, litigation, lobbying and technological mechanisms such as encryption. In addition, congressional subpoenas are not issued in secret, and Congress does not have the legal authority to gag providers from disclosing such requests, no matter how sensitive they may appear. By comparison, such nondisclosure orders are standard in the law enforcement context. As a result, providers are able to disclose a potentially overbroad or abusive request to the public, as well as the subject of the request. In theory, then, public opinion may have an effect on enforcement and create push back on overbroad or abusive demands.

The Duality of Congressional Surveillance

Congressional surveillance stands at the intersection of two areas of law: government surveillance and separation of powers. As to the first, congressional surveillance raises issues relating to how individual privacy interests should be balanced against Congresss interest in accessing information. As it stands, congressional surveillance is constrained by a balance of limits that differs from other areas of government surveillance, with a less prominent role played by the privacy-protecting SCA and Fourth Amendment and a more prominent role played by internal politics and procedure. Some observers might see this as a reason to impose new constraints.

Yet as to the separation of powers, congressional access to information depends instead on the relative interests and rights of two co-equal branches. From this second perspective, congressional surveillance represents an important way for Congress to compete for authority within the separation of powers, meaning that the usual approach under external limits shouldnt apply. That is, congressional surveillance can serve as a potent component of checks and balances, necessary to counter executive authority and maintain Congresss position as a co-equal branch. Some might see this as a reason to preserve congressional authority, not constrain it.

The framing matters, as illustrated by the Supreme Courts most recent and most robust evaluation of these issues in Mazars. There, confronted with congressional subpoenas to financial institutions for the presidents financial information, the court embraced a separation of powers model. That is, it weighed the committees interest in third-party data not against an individual privacy interest but, rather, against the competing interests of the executive. The Supreme Court cautioned that, absent new limits, Congress could declare open season on the Presidents information held by schools, archives, internet service providers, email clients, and financial institutions. The court then imposed a new balancing testnot one based on privacy considerations but, rather, one that reflects the weighty concerns regarding the separation of powers when congressional surveillance targets the president.

As a consequence, the Supreme Court rendered a decision that is ultimately indifferent to privacy considerations. The reasoning in Mazars protects only the presidents information. And the decision does not distinguish at all between differing levels of privacy interests in different categories of information.

How then to approach the limits on congressional surveillance? There are, to be sure, different ways (and institutions) to balance the many competing interests, from both privacy and separation of powers perspectives. Congress could regulate itself on these matters and take steps to mitigate potential abuses of its own surveillance authority, creating new rules at the chamber or committee level or perhaps passing clarifying legislation. Or, if providers choose to dispute Congresss authority in this area, the fate and scope of congressional authority could be decided (and potentially limited) by the judiciary. There could be a renewed emphasis on external limits with a more significant role for courts, or a refining of the process limits within each chamber or committee. Either way, this is likely just the start of a broader conversation about an important issue, with implications for both government surveillance and the separation of powers.

See the original post here:
What Are the Limits on Congressional Surveillance? - Lawfare

Big brother banking on you | | standardspeaker.com – Standard Speaker

Your jobs payroll taxes, and your annual 1040 federal tax return, just is not enough.

The Biden administration wants the IRS to document the totals deposited and withdrawn, but not the individual transactions, from personal and business bank accounts annually if more than $600.

In this COVID era, Rahm Emanuels infamous quip about never allowing a serious crisis go to waste echoes throughout the $3.5 to $5 trillion budget bill that seeks more government control.

Treasury Secretary Janet Yellen is leading the charge requiring banks to report cash transactions totaling $600 or more of their account holders. Yellen claimed such reporting would catch tax cheats and disclose opaque income streams that disproportionately accrue to the top.

Tucked away in the bill is $80 billion that would fund an army of IRS auditors to collect what the Treasury Department said would amount to $700 billion over the next decade. Rather than auditors, they should hire folks to answer their telephones.

When the political bureaucracy targets banks, you lose.

This is about total control, and it is working.

Americans complied on endless lockdowns that were to flatten the curve, the ubiquitous mask mandates that continue and now how everyone must be vaccinated.

Why should your bank account be any different?

What could possibly go wrong?

Dr. Anthony Fauci funnels millions of taxpayer dollars to the Wuhan Institute of Virology. President Joe Biden claims the military never advised him to keep a 2,500 residual force in Afghanistan and that our southern border is secure.

Casting a wide net over personal finances has always been a longstanding ploy of the left. There is no evidence of anything here that could be labeled Build Back Better.

Instead, the left doubles-down.

This scheme is nothing but another privacy breach waiting to happen. Twenty-three state treasurers and auditors signed a letter opposing the legislation describing it as one of the largest infringements of data privacy in our nations history.

Yellen and her leftist allies need to acquaint themselves with the Fourth Amendment that was passed to protect the quintessential American right to be left alone. The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

What else about the Constitution does the Biden administration not comprehend?

Granted, since the Bank Secrecy Act of 1970, all bank transactions over $10,000 are reported. In actuality, that amount needs to be adjusted for inflation, which would make todays limit $70,000. Congress needs to include that in the legislation but wont.

Leveraging the banking system to track down terrorists is not new, but including you is. Perhaps, such zeal could be employed to find the 40 million here illegally and all the welfare, disability and COVID unemployment fraud circulating nationwide.

Any politician supporting this is oblivious to the concepts of freedom and liberty. Socialism has arrived and this bill will only serve to expand it. This is a power grab to confiscate personal wealth and redistribute it to those whose only work history is running their mouths and playing the victim.

Affording the IRS access to your bank transactions provides them access to snoop into your financial affairs; what church, if any, you support, the charities and political causes you aid, while creating a data profile where your privacy is replaced with surveillance.

Ultimately, politicians will push legislation that regulates how you save and invest.

How soon until the IRS requires your ATM withdrawal receipt and questions where you spent it?

Along with the White House, Democrats own a razor-thin majority in the Congress. Not to be deterred, the left will stop at nothing in their brazen pursuit of power and control.

Who is the menace to freedom and privacy now?

Everyone, including the economy, will be much better off provided this bill does a MacArthur and fades away, forever.

GREGORY MARESCA writes from Northumberland County

Read more here:
Big brother banking on you | | standardspeaker.com - Standard Speaker

What is the US infra bill crypto amendment REALLY all about – AMBCrypto News

The $1 trillion U.S. Infrastructure Bill seemed to have touched on nearly every subject, ranging from clean energy and infrastructure, to the internet and even digital assets. However, many crypto investors are worried about what the bill could mean for their trading activities. As it turns out, so are a few lawyers.

During an episode of the What Bitcoin Did podcast, host Peter McCormack spoke to independent lawyer Abraham Sutherland and Chief Compliance Officer at Multicoin Capital, Greg Xethalis. They discussed the US Infrastructure Bill and in particular, Section 6050I.

6050I is part of the U.S. Tax Code. A proposed amendment to it would make the recipient of digital assets valued at more than $10,000, responsible for verifying their senders personal details including their Social Security number.

Recipients would then have to send a report of the same to the government authorities within a certain time frame. Those who dont obey could be forced to pay fines or spend up to five years in prison.

Sutherlandsaid,

This is an amendment to the tax code but its really a new criminal prohibition on peer-to-peer transfers and its been overlooked.

In essence, the proposed requirements fly in the face of DeFi and decentralization itself. For his part, Xethalis worried that the problematic amendmentput the onus of KYC and verification on people who were not equipped to be regulators.

Meanwhile, McCormack pointed out that many U.S. residents wouldnt even be able to comply with the rules, due to the nature of crypto itself.

Sutherlands research report on the provisionstated,

Miners, stakers, lenders, decentralized application and marketplace users, traders, businesses and individuals are all at risk of being subject to this reporting requirement, even though in most situations the person or entity in receipt is not in the position to report the required information.

Calling the requirements an invasion of privacy, McCormack questioned whether a crypto exchange user would soon have to report every transaction, as well as their sender or recipient, to the U.S. government.

Americas Bank Secrecy Act makes it mandatory for banks to report all cash transactions involvingmore than $10,000 to the government. If the US Infrastructure Bill passes, Sutherland believed that banks could also apply this rule to digital assets.

McCormack naturally wondered how such regulations would apply to an asset as volatile as Bitcoin or even NFTs.

Speaking about the amendment, Sutherlandsaid,

Now, I dont want to focus on, kind of, the legal infirmities of this, but [its] highly constitutionally suspect under the fourth amendment.

He was, of course referring to Americas 4th amendment right, which deals with citizens security and privacy.

Read this article:
What is the US infra bill crypto amendment REALLY all about - AMBCrypto News

Mother of Three, Associated with a Man Charged with Domestic Violence, Given Pretrial Release – The Peoples Vanguard of Davis

By Carson Eschen and Eric Rodriguez

SANTA BARBARA, CA A deputy public defender argued here in Santa Barbara County Superior Court Wednesday that a mothers pretrial release conditions were too stringent and that they were wrongfully based on acts that were committed not by her but by a defendant in a related case.

Danisha Michelle Figueroa is being charged with conspiracy to commit a crime, and accessory to a crime.

During the hearing, Figueroas public defender, Brian Mathis, stated that he believed the pretrial report was primarily describing the actions of David Lamar, not Figueroa. The only allegations that he believed were actually being levied against Figueroa were surrounding the attempted deletion of evidence.

Lamars casein which he is being charged with threatening a crime with intent to terrorize, commit battery, and prevent/dissuade witness victim from giving testimonyis associated with Figueroas case but his charges are not her charges, maintained the defense attorney.

According to the defense attorney, Figueroa allegedly discussed deleting incriminating evidence during a jail call, and agreed to deleting such evidence by accessing Lamars email and attempting to delete the incriminating evidence.

PD Mathis claims her allegations fall under minor cyber-crimes, as opposed to the felony charges in Lamars case.

Taken alongside Figueroas status as a mother of three children14, 12, and 3Mathis requested that she be released with pretrial supervision without a GPS tracking device. He pointed out that the use of GPS tracking devices was unnecessary as Figueroa was complying in any way possible.

He also argued that GPS tracking incurred a significant cost, which he believed to be unnecessary for this case.

He also objected to a clause giving up Figureoas Fourth Amendment right and a clause to abstain from drugs and alcohol, stating that they also didnt pertain to the current charges.

The judge agreed to the release, but still insisted on the GPS tracking device and other terms and conditions proposed by the prosecution, noting that she had sometimes left her kids with their father to meet up with Lamar.

He also cited previous incidents, occurring five years prior, where Figueroa had failed to show up for court.

Figueroa is expected to report to probation on Oct. 14 for supervised release.

Her case has also been placed under the same judge that is overseeing Lamars case to make due process more efficient, as proposed by the district attorney.

Figueroa is scheduled to appear at the court on Oct. 22 for a hearing setting date.

Read the original here:
Mother of Three, Associated with a Man Charged with Domestic Violence, Given Pretrial Release - The Peoples Vanguard of Davis