You are on page 1of 32

Business Law Text and Cases The First

Course 14th Edition Miller Solutions


Manual
Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/business-law-text-and-cases-the-first-course-14th-edition-miller-solutions-manu
al/
CHAPTER 10

CRIMINAL LAW AND CYBER CRIME

ANSWER TO CRITICAL THINKING


QUESTION IN THE FEATURE
INSIGHT INTO THE GLOBAL ENVIRONMENT—LEGAL CRITICAL THINKING—INSIGHT INTO
THE TECHNOLOGICAL ENVIRONMENT (PAGE 83) What entities might pay “cyber
mercenaries” to create some of the malware described in this feature? Of course, first and
foremost would be governments that want to obtain diplomatic information or military secrets
from other countries. Additionally, and perhaps increasingly, large business enterprises might
wish to target other large business enterprises in other countries in order to steal intellectual
property, such as trade secrets.

ANSWERS TO QUESTIONS
AT THE ENDS OF THE CASES

CASE 10.1—LEGAL REASONING QUESTIONS (PAGE 201)


1A. What is the definition of the crime of obtaining goods by false pretenses? Do the
facts in this case satisfy that definition? Explain. Obtaining goods by means of false
pretenses is a form of theft that involves trickery or fraud. The text provides the example of
offering to sell someone an iPad knowing that you do not actually own the iPad. Statutes dealing
with such illegal activities vary widely from state to state and often apply to property, services,
and cash.
The facts in this case meet this definition. As the court summarized, Whitmer “authorized
the offline credit card sales and other violations of dealership policies, obtained the false
signatures from the fictitious buyers on the sales documents, and arranged for the delivery of
the vehicles.” And “the dealership incurred a charge back on each sale ranging from $9,100 to
$21,479.80, resulting in losses exceeding $250,000.”

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,
in whole or in part.
2 UNIT TWO: TORTS AND CRIMES

2A. Besides the defendant, who may have committed a crime in this case? Mordichi Mor
was a direct participant in the scheme. According to Whitmer, Mor had “gotten the ball rolling”
on the thefts. He met with Whitmer before the twenty fraudulent sales of motorcycles, motorized
dirt bikes, all terrain vehicles, and recreational vehicles, and the stolen vehicles were delivered
to his home.
Van Hek and Barrera may also have been participants in the crime. Van Hek had shown
Whitmer how to do offline transactions. Barrera was the salesperson in all of the fraudulent
sales, each of which involved one of seven purported buyers, all of whom proved to be fictitious.

3A. How might the dealership have prevented the crimes in this case? The crimes in this
case might have been avoided if the dealership’s employees had followed the company’s
policies. These policies may have been imposed in part to avoid the misconduct that occurred
here. For example, to prevent charge backs, the dealership's policy was to require customers to
make purchases in person and to present two forms of identification. As a further preventive
measure, the dealership did not permit offline sales. The dealership retained the original
manufacturer certificate of origin (MSO) after a sale unless the vehicle was sold to an out-of-
state purchaser or transferred to another dealer. But the dealership was contractually obligated
not to sell vehicles for exportation outside the United States. Finally, Gilding advised Whitmer
specifically not to deal with Mor.
Carlos and Wilcox violated these policies by doing what Whitmer directed. Whitmer was
seen conferring with Mor. Paperwork was done for transactions in which the customers were not
introduced. Deals were processed as offline sales. MSOs related to the fraudulent sales were
removed from the dealership’s files despite any obvious need for their removal. And it was
learned that several of the vehicles had been shipped to Israel. If Carlos and Wilcox, and any
other employees who were not directly involved in the criminal scheme but who witnessed some
of the steps in its perpetration, had reported the violations of company policies to Gilding, the
crimes might have been stopped. But it also appears that the thefts might have been thwarted if
Gilding had more closely overseen sales at the dealership.

4A. Why do some states combine larceny, embezzlement, and obtaining goods by
false pretenses into a single crime called theft? Discuss. According to some observers, the
distinctions between these crimes only serve as obstacles in the administration of criminal
justice. For example, to prosecute a theft as one or another of the separate crimes, the various
elements must be considered, pleaded, and satisfied. A mistake in any step of the process can
delay or prevent a conviction. Simplifying the definitions of the crimes simplifies the
prosecutorial process. Under a state statute that combines larceny, embezzlement, and
obtaining goods by false pretenses into a single crime called theft, it is not necessary for an
indictment to specify which of these offenses is charged.

CASE 10.2—QUESTION (PAGE 208)


THE LEGAL ENVIRONMENT DIMENSION
How would police officers behave if they could always be held personally liable for
executing unconstitutional warrants? Would they be more or less inclined to apply for

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,
in whole or in part.
CHAPTER 10: CRIMINAL LAW AND CYBER CRIME 3

and execute search warrants? Explain. Police officers would behave far more cautiously if
they could always be held personally liable for executing unconstitutional warrants. Cases like
Messerschmidt give police officers some leeway to do their jobs without fearing lawsuits.
Without such protection, they would be far less inclined to ask for and execute warrants. To
avoid personal liability, police officers might begin to seek only warrants that are clearly
constitutional. That would probably reduce the number of Fourth Amendment violations by
police departments, but it would probably also hamper criminal investigations.

CASE 10.3—QUESTION (PAGE 210)


THE GLOBAL DIMENSION
The right to remain silent has long been a legal hallmark in Great Britain as well as in the
United States. In 1994, however, the British Parliament passed an act that provides that a
criminal defendant's silence may be interpreted as evidence of his or her guilt. British
police officers are now required, when making an arrest, to inform the suspect, "You do
not have to say anything. But if you do not mention now something which you later use
in your defense, the court may decide that your failure to mention it now strengthens the
case against you. A record will be made of everything you say, and it may be given in
evidence if you are brought to trial." Should U.S. law also change to allow a defendant’s
silence during questioning to be considered as an indication of guilt? Why or why not?
Yes, because in combination with other circumstances—a smirk, arrogance, bravura, or
physical evidence—silence would seem to indicate guilt. No, because it seems contrary to the
U.S. principle that a suspect is innocent until proven guilty, because it seems to run counter to
basic constitutional rights under the First, Fourth, Fifth, and Sixth Amendments, and because
silence may seem to indicate guilt but it may also indicate reticence, fear, shock, ignorance,
misunderstanding, miscomprehension, or disability.

ANSWERS TO QUESTIONS IN THE REVIEWING FEATURE


AT THE END OF THE CHAPTER

1A. State of mind


Yes, because he was the corporate officer responsible for the project and had the power to
prevent the criminal violation. Corporate directors and officers are personally liable for the
crimes they commit, and can also be held liable for the crimes of employees under their
supervision. Because Hanousek was the corporate officer responsible for every detail of the “6-
mile” quarry, he had the power to prevent the criminal violation. Therefore, Hanousek can be
held criminally negligent for the backhoe operator puncturing the pipeline.

2A. Theory of liability


Under the responsible corporate officer doctrine, a corporate officer can be held liable for a
crime because he was in a responsible relationship to the corporation and could have prevented

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,
in whole or in part.
4 UNIT TWO: TORTS AND CRIMES

the violation. The corporate officer does not have to intend the crime or even know about it, to
incur liability under this doctrine.

3A. Liability of employee


No, because he did not have the required mental state (mens rea) and was corporate officer in a
responsible position to prevent the criminal violation. Criminal liability requires a guilty act at the
same time as the defendant had a wrongful mental state. The backhoe operator pierced the
pipeline (the guilty act), but he did not have a wrongful mental state because he was simply
doing his job and may not even have been aware of the pipeline. A court would not apply the
same standard to an employee as it would to a responsible corporate officer who “knew or
should have known” of the existence of the pipeline. Because both elements of criminal liability
(guilty act and wrongful mental state) did not occur, the backhoe operator could not be charged
with a crime.

4A. Ignorance of the law


No, because Hanousek was the corporate officer responsible for the project and should have
known the requirements of the law. Because Hanousek was in a responsible position at the
corporation and in charge of the 6-mile quarry, a court would find that he “should have known”
the requirements of the law. Therefore, lack of knowledge of the requirements of the CWA
would not operate as a defense in his case.

ANSWER TO DEBATE THIS QUESTION IN THE REVIEWING FEATURE


AT THE END OF THE CHAPTER

Because of overcriminalization, particularly by the federal government, Americans


may be breaking the law regularly without knowing it. Should Congress rescind many of
the more than four thousand federal crimes now on the books? Difficult times require
drastic measures. This nation now has over 300 million residents who move
frequently. Moreover, the pervasiveness of the Internet means that business fraud is increasing
at a rapid rate. Consequently, the federal government must step in to make sure that criminal
actions do not go unpunished. That’s why so many new federal crimes have been added to the
body of criminal statutes.
The Constitution reserves for the states police powers for activities within state
boarders. Crimes have always been defined by state and local governments. Just because we
have a larger population that has access to the Internet does not mean that Congress should be
in the business of creating so many federal crimes. Moreover, many new federal criminal
statutes do not require intent—a cornerstone of the prosecution of most crimes for ages.

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,
in whole or in part.
CHAPTER 10: CRIMINAL LAW AND CYBER CRIME 5

ANSWERS TO ISSUE SPOTTERS IN THE EXAMPREP FEATURE


AT THE END OF THE CHAPTER

1A. Dana takes her roommate’s credit card without permission, intending to charge
expenses that she incurs on a vacation. Her first stop is a gas station, where she uses
the card to pay for gas. With respect to the gas station, has she committed a crime? If so,
what is it? Yes. With respect to the gas station, she has obtained goods by false pretenses.
She might also be charged with larceny and forgery, and most states have special statutes
covering illegal use of credit cards.

2A. Without permission Ben downloads consumer credit files from a computer
belonging to Consumer Credit Agency. He then sells the data to Dawn. Has Ben
committed a crime? If so, what is it? Yes. The Counterfeit Access Device and Computer
Fraud and Abuse Act of 1984 provides that a person who accesses a computer online, without
permission, to obtain classified data—such as consumer credit files in a credit agency’s
database—is subject to criminal prosecution. The crime has two elements: accessing the
computer without permission and taking data. It is a felony if done for private financial gain.
Penalties include fines and imprisonment for up to twenty years. The victim of the theft can also
bring a civil suit against the criminal to obtain damages and other relief.

ANSWERS TO BUSINESS SCENARIOS AND BUSINESS CASE PROBLEMS


AT THE END OF THE CHAPTER

10-1A. Types of cyber crimes


(Chapter 10—Page 213)
(a) This is vishing, a form of identity theft. The traditional crimes of theft (robbery,
burglary, larceny, and other) consist of wrongfully taking and carrying away another’s personal
property with the intent of depriving the owner permanently of it. Unique to crimes of identity
theft is that they involve taking another’s identity, and unique to cyber variations of the offense is
that the criminal acts are committed with computers, often online. A stolen identity is typically
used to commit more crimes.
(b) As in the previous problem, this is a form of identity theft. This problem describes a
factual situation referred to as phishing. In such a set of circumstances, once an unsuspecting
individual responds by entering the requested information, the phisher can use it to pose as that
person or to steal the funds in his or her bank or other account.
(c) Here is identity theft in the form of employment fraud. In this scenario, the goal is
to trick the recipient into revealing enough information for the perpetrator to steal his or her
identity and commit still other offenses—emptying the individual’s accounts, spending money in
his or her name, or otherwise taking advantage of his or her identity to obtain something
undeserved or accomplish a criminal end.

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,
in whole or in part.
6 UNIT TWO: TORTS AND CRIMES

10-2A. Property crimes


(Chapter 10—Page 210)
The answer is (e). Receiving stolen property requires illegal activity on the part of more than
one person. Receiving stolen property (if the recipient knows it is stolen) is a crime that
necessarily involves both the recipient and the person who stole the property.

10-3A. Cyber scam


(Chapter 10—Page 213)
This is fraud committed in e-mail sent via the Internet. The elements of the tort of fraud are (1)
the misrepresentation of material facts or conditions made with knowledge that they are false or
with reckless disregard for the truth, (2) the intent to induce another to rely on the
misrepresentation, (3) justifiable reliance on the misrepresentation by the deceived party, (d)
damages suffered as a result of the reliance, and (4) a causal connection between the
misrepresentation and the injury. If any of this e-mailer’s recipients reply to her false plea with
money, it is likely that all of the requirements for fraud will have been met. The sort of fraud
described in this problem is similar to the “Nigerian letter fraud scam” noted in the text. In this
type of scam, an individual sends an e-mail promising its recipient a percentage of money held
in a bank account or payable from a government agency or other source if he or she will send
funds to help a fictitious official transfer the amount in the account to another bank. The details
of the scam are often adjusted to current events, with perpetrators referring to news-making
conflicts, tax refunds or payments, and other occurrences.

10–4A. Cyber crime


(Chapter 10—Page 212)
Klimecek committed copyright infringement (or “piracy”) and was not entitled to have his
sentence reduced on the ground that he was a “minor participant” in the scheme. He was an
essential participant in the operation: if he had not bought the hardware and software
components, set up the server, connected it to the Internet, and paid half of the monthly Internet
service fees, the unauthorized dissemination of others’ copyrighted works could not have
occurred. Even if other participants also set up servers and provided copyrighted materials, this
meant that Klimecek did no less than the “average” participant. His claim that he did not
understand the full scope of the operation was undercut by his admission that he knew users
around the world were accessing his group’s server. He further participated in the scheme by
making Czech movies and music available. The court found him to be “crucial” to the operation
and sentenced him to thirty months’ imprisonment (no reduction). The U.S. Court of Appeals for
the Seventh Circuit affirmed the sentence.

10–5A. Fourth Amendment


(Chapter 10—Page 207)
Under the Fourth Amendment, a police officer must obtain a search warrant to search private
property. In the case of a traffic stop, it seems unreasonable to require an officer to obtain a
warrant to search one of the vehicle’s occupants. But it seems reasonable to apply some
standard to prevent police misconduct. An officer might be held to a standard of probable cause,

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,
in whole or in part.
CHAPTER 10: CRIMINAL LAW AND CYBER CRIME 7

which consists of reasonable grounds to believe that a person should be searched. In some
situations, however, an officer may have a reasonable suspicion short of probable cause to
believe that a person poses a risk of violence. In a traffic-stop setting, for example, this risk
would not stem from the normal reaction of a person stopped for a driving infraction, but from
the possibility that evidence of a more serious crime might be discovered. A criminal’s
motivation to use violence to prevent the discovery could be great. And because the vehicle is
already stopped, the additional intrusion is minimal. Under these circumstances, a limited
search of the person for weapons would protect the officer, the individual, and the public. Thus,
an officer who conducts a routine traffic stop could perform a patdown search of a passenger on
a reasonable suspicion that the person may be armed and dangerous. In this case, a jury con-
victed Johnson of the charge, but a state appellate court reversed the conviction. The United
States Supreme Court reversed the appellate court’s judgment and remanded the case.

10–6A. Searches
(Chapter 10—Page 207)
Yes, a cross-gender strip search is unreasonable if there is no emergency—such as a riot or
natural disaster—to justify it. Whether a search is reasonable under the Fourth Amendment
requires balancing the need for the search against the invasion of personal rights that the
search entails.
Here, there was no emergency situation, and there was no apparent justification for
conducting a cross-gender strip search. In addition, the manner in which the search was
conducted seems unreasonable. A female officer performed the search while several male
officers watched, and one videotaped the search. There was no reason for the female officer to
conduct the search immediately rather than another officer whose gender was the same as
Byrd’s.
In the actual case on which this problem is based, the court held that the search
performed on Byrd was unreasonable and violated Byrd's rights under the Fourth Amendment to
be free from unreasonable searches.

10–7A . Credit-card theft


(Chapter 10—Page 202)
Yes, there was sufficient evidence of credit- and debit-card theft for a court to uphold Turner’s
conviction. Although there were no eyewitnesses to say they saw Turner take Barden’s purse,
there was sufficient circumstantial evidence because Turner attempted to use Barden’s credit
card immediately after the purse was taken. Turner also had Barden’s credit and debit cards on
her at the time of her arrest. The appellate court refused to consider the credibility of Turner’s
testimony that a friend had given her the credit and debit cards, because assessing credibility is
the role of the trial court (and the jury, in jury trials). Turner had a long history of theft-related
offenses and clearly knew that the credit and debit cards she had were stolen. Appellate courts
focus on the law and evaluate whether the evidence was sufficient for conviction. In this
situation, the appellate court found that the evidence was sufficient to uphold Turner’s
convictions for theft. The court also upheld Turner’s sentence as a habitual offender because
she had twelve prior felony convictions. She received a sentence of ten years in prison for theft

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,
in whole or in part.
8 UNIT TWO: TORTS AND CRIMES

of credit and debit cards—and a total of thirty years in prison when combined with additional
charges.

10–8A. BUSINESS CASE PROBLEM WITH SAMPLE ANSWER—Criminal liability


Yes, Green exhibited the required mental state to establish criminal liability. A wrongful mental
state (mens rea) is one of the elements typically required to establish criminal liability. The
required mental state, or intent, is indicated in an applicable statute or law. For example, for
murder, the required mental state is the intent to take another's life. A court can also find that
the required mental state is present when a defendant’s acts are reckless or criminally
negligent. A defendant is criminally reckless if he or she consciously disregards a substantial
and unjustifiable risk.
In this problem, Green was clearly aware of the danger to which he was exposing people
on the street below, but he did not indicate that he specifically intended to harm anyone. The
risk of death created by his conduct, however, was obvious. He must have known what was
likely to happen if a bottle or plate thrown from the height of twenty-six stories hit a pedestrian or
the windshield of an occupied motor vehicle on the street below. Despite his claim that he was
intoxicated, he was sufficiently aware to stop throwing things from the balcony when he saw
police in the area, and he later recalled what he had done and what had happened.
In the actual case on which this problem is based, after a jury trial, Green was convicted
of reckless endangerment. On appeal, a state intermediate appellate court affirmed the
conviction, based in part on the reasoning stated above.

10–9A. A QUESTION OF ETHICS—Identity theft


(a) Omole’s conduct can be perceived as arrogant—a display of a feeling of
superiority—and lacking empathy for others, particularly those victims to whom he sent the e-
mail. There is no indication that he had any sense of what it takes to live in society without
cheating, stealing from, and victimizing others. To behave ethically requires at least a
willingness to refrain from illegal conduct and a degree of empathy for others. Omole’s conduct
showed that his character lacked these qualities. In other words, he seems to have had no
ethical principles. It might be countered that he was twenty years old and that his behavior
reflected only the self-centeredness of youth.
It might be pointed out that if Omole had put the ingenuity and energy he expended on
his illegal scheme to legal, practical use, he might have engineered a successful business.
Instead, his lack of ethics robbed himself and others of money and property, as well as the
opportunity to trust and be trusted and to do business in good faith.
(b) Omole’s sentence was too lenient. He perpetrated a sophisticated scheme that
involved planning, execution, and avoidance of detection. He defrauded more than 100
individuals out of $90,000—which could be described as their “hard-earned money”—and would
likely have cheated them and others out of more if he had not been stopped. He may have been
only twenty years old, but this age is not a unique characteristic. He had a previous conviction
for Internet fraud. He expressed contempt towards his victims and the trial court. These facts
argue against a reduced sentence. Omole appears to be the sort of offender who deserves the
punishment that the law prescribes. This suggests that the sentence was unreasonable. On the

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,
in whole or in part.
CHAPTER 10: CRIMINAL LAW AND CYBER CRIME 9

government’s appeal, the U.S. Court of Appeals for the Seventh Circuit vacated the sentence
and remanded the case for resentencing.

10–10A. LEGAL REASONING GROUP ACTIVITY—Cyber crime


(a) It goes without saying that the higher the anticipated cost of engaging in cyber
crime activity, the lower will be the amount demanded. In other words, heavy fines and long jail
sentences would have some deterrent effect. The real question is by how much. Many hackers
who bring down corporate and government computer systems are teenagers. They cost
businesses billions of dollars, yet gain no monetary reward for their hacking—they do it to prove
that they are as good or better than other hackers. If caught, they could not engage in much
meaningful restitution to their corporate victims. In contrast, adult cyber criminals who engage
in identity theft, credit-card fraud, and online auction fraud often make larges sums of money
from this criminal activity. They could be forced to engage in meaningful restitution to their
victims. They could be sentenced to long jail terms, just as we routinely do for traditional
thieves. Restitution and long jail terms might serve as a deterrent to such cyber criminal
activities. U.S. authorities, though, cannot easily arrest, try, convict, and sentence cyber
criminals living and operating in, say, Russia.
(b) Protection against cyber crime starts with the awareness at management and staff
levels of the potential harm that could result. Even the temporary loss of a system’s functions
while its software is replaced due to a virus’s infection or other destructive event could prove
costly. Thus, management should make appropriate funds available to pay for security, impose
procedures to identify the system’s vulnerability, require the use of security hardware and
software, and conduct security audits on an ongoing basis. The use of passwords among those
with access to the system is also an important step when used correctly. Backed-up data can be
key, and storing the backed-up data off-site can be even more effective.

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,
in whole or in part.
Another random document with
no related content on Scribd:
usaba de su cuerpo como pública
ramera, y otro autor que dixo que
Pan, dios de los pastores, fué hijo
suyo y de Mercurio, y que por
saber esto Ulises hizo divorcio
con ella y se fué á vivir á la ínsola
Cortina; y otros muchos que
hablando de su vida trataron della
como de mujer que había vivido
deshonestamente y que no
solamente tuvo por hijo al dios
Pan, sino á otros muchos de
diferentes padres, hechos en
adulterio; y si Virginea fué muerta
por no consentir en la
desenfrenada voluntad de aquel
varón de los diez que entonces
gobernaban á Roma, que por tan
exquisitas y desvergonzadas
formas y maneras procuraba
gozar el amor ilícito y deshonesto
que con ella tenía, fué porque su
padre hizo sacrificio de la hija por
no recebir la afrenta que viviendo
le estaba aparejada, que si á la
voluntad de Virginea lo dexaran,
por ventura excusara la muerte
con dexarse corromper su
honestidad antes que recebir las
puñaladas que le fueron dadas
por su padre; así que no estés,
Torcato, tan confiado de la tu
Belisia que no puedas presumir
que por haber puesto sus amores
y voluntad en otra persona haya
dexado los que contigo tenía,
porque esto es lo que yo por más
cierto tengo.
Torcato.—Y yo por más incierto,
porque no me podrás inducir con
tus enxemplos que pueda creerlo;
porque ya que fuese verdad lo
que has dicho, ¿cuántas mujeres
ha habido y hay en el mundo tan
castas que ninguna mancilla se
puede poner en su bondad? Y si
no mira lo que hizo la reina Dido
por no querer consentir en los
amores del rey Yarvas, ni que
después de la muerte de su
marido Sicheo hubiese quien
pudiesse triunfar de su
honestidad, y así escogió por
mejor dexar hacer ceniza su
cuerpo en el ardiente fuego que
no dar lugar á que otro ninguno
pudiese gozar de lo que él había
gozado; aunque el poeta Virgilio,
no sé por qué causa ó razón
inducido, quiso poner en su
bondad y buena fama la mancilla
que puso, diciendo que había
tenido amores con Eneas, siendo
falsedad averiguada, porque Dido
fué mucho tiempo antes que
Eneas, saliendo de Troya,
anduviesse peregrinando por el
mundo; y sin tratar de las mujeres
antiguas, ¿cuántas en nuestros
tiempos se sojuzgan al
incomparable trabajo de las
religiones, haciendo sacrificio de
la vida hasta la muerte, y otras
que han tenido por mejor que sus
cuerpos fueran despedazados
que no consentir en que por su
voluntad la castidad fuesse en
ellas violada? Sola Susana
bastaba para quitar las lenguas
de los maldicientes, viendo con
cuánta firmeza procuró guardarla
de aquellos viejos que procuraban
aprovecharse della, teniendo por
mejor ser por su falso testimonio
condenada á la muerte que
consentir en sus torpes desseos.
Y sin ésta, te podría decir otras
muchas que bastan en nuestros
tiempos á defenderse de la
importunidad de los hombres, sin
dexarse jamás vencer para que
su castidad corra peligro, ni ellas
se puedan dexar de llamar
mujeres castas; y para que mejor
entiendas la ventaja que en esto
hacen las mujeres á los hombres,
mira lo que se usa en muchas
partes y entre muchas naciones
de gentes idólatras, que en
muriendo los maridos se matan y
se entierran, ó se queman con
ellos, por su propia voluntad, y
mostrando muy gran
contentamiento en huir de los
peligros en que quedaría su
honestidad siendo viudas, y no
verás hombre ninguno que haga
lo mesmo aunque se le mueran
cien mujeres; y ten por cierto que
muchas habría en la christiandad
que seguirían esta mesma orden
si el temor de la perdición de sus
ánimas no se lo vedase.
Filonio.—En cargo te son las
mujeres, que assí quieres
defender contra la común opinión
de todo el mundo ser hechas de
otra differente condición y
costumbres de las que tienen y en
ellas se conocen; continuamente
todos cuantos han escrito, cuando
vienen á hablar en ellas, no hallan
palabras que basten á contar sus
vicios y torpezas; los libros están
llenos dello, y no solamente los
proffanos, pero también los de la
Sagrada Escriptura, y si no
pregúntalo á Salomón y verás con
cuán encarescidas palabras las
pone muchas veces del lodo,
tratándolas como ellas lo
merecen. Y en un libro que yo oí
una vez leer decía que la mujer
nunca era buena sino una vez en
la vida, y que ésta era la hora que
se moría, y que era mejor cuando
más presto se muriese; y con
estas palabras consolaba un
amigo á otro porque su mujer se
le había muerto.
Torcato.—Bastaría que alguna
mujer te hubiesse á ti tratado
como á mí me ha hecho Belisia
para que tanto mal me dixeses
della y de todas las otras mujeres;
pero no quiera Dios que yo con
pasión me ciegue para decirlo, ni
para consentir que tú pienses que
tienes razón en lo que dices. Y lo
primero que quiero preguntarte es
quiénes son esos que escribieron
los libros que has dicho.
Filonio.—¿Quiénes han de ser
sino hombres muy sabios y
avisados que las tienen bien
conocidas?
Torcato.—Bien se parece que
son hombres, que si fueran
mujeres harto más tuvieran que
poder decir y escribir y con mayor
verdad de los hombres que no los
hombres dellas, porque
verdaderamente muy mayores y
más torpes y más comunes son
los vicios en los hombres que en
las mujeres, y nosotros, que las
notamos y acusamos de parleras
y desenfrenadas en sus lenguas,
somos los que las infamamos
diciendo tantos males dellas, que
debríamos de tener vergüenza de
que nuestras palabras saliessen
por nuestras bocas tan
perjudiciales contra personas de
quien tantos bienes recebimos; y
aunque haya algunas malas entre
ellas, yo fiador que no sean tantas
como los hombres, y nosotros
mesmos somos la principal causa
de sus males, importunándolas y
fatigándolas con promesas, con
engaños, con lisonjas y con
persuasiones que bastarían á
mover las piedras, cuanto más á
mujeres, para que algunas veces
vengan á dar en algunos yerros; y
ellas jamás nos importunan ni
fatigan requiriéndonos, y
molestándonos con
desvergüenza, antes tienen por
mejor callando passar sus
trabajos, que no dar á entender lo
que por ventura con su flaqueza
les piden sus apetitos. Y los que
escribieron contra ellas no fué
contra las buenas, sino contra las
malas, y lo que dixeron de las
unas, siendo pocas, no se ha de
entender de las otras, que son
muchas; así que sería mejor que
todos nosotros nos empleásemos
en decir bien de quien tantos
bienes habemos recebido y
recebimos cada día, y no mal de
quien ninguno nos merece; y si
alguna nos diere causa, con
algunos desatinos, á que
podamos decir mal della, sea
particularmente para reñirla y
castigarla con palabras y obras,
siendo necessario, y no queramos
que paguen las justas por las
peccadoras y las que no tienen
culpa por las que merecen el
castigo; que lo que fuera desto se
hiciere ó dixere, será mal dicho y
mal hecho, y los vituperios y
infamias y deshonras quedarán
en aquellos que las dixeren,
queriendo por una mujer mala
hacer á todo el género de las
mujeres malas, siendo por la
mayor parte buenas y tan buenas
que plugiesse á Dios que no
fuéssemos nosotros peores que
ellas; y concluyendo digo que yo
no tengo la sospecha que dices
de que Belisia por haber tomado
amores con otro haya dexado los
míos, y primero lo habré visto por
los ojos que lo confirme en el
pensamiento.
Filonio.—Paréceme, Torcato,
que hablar alguna cosa en
perjuicio de Belisia es tocarte á ti
en el alma, y pues que con tanta
afición y tan apassionadamente
defiendes lo que le toca, yo no te
veo otro remedio para salir deste
piélago en que estás metido sino
esperar á que el tiempo vaya
consumiendo el agua poco á poco
hasta que te halles en seco, y
entonces juzgarás las cosas muy
diferentemente de lo que agora lo
haces.
Grisaldo.—Con estas pláticas se
nos ha pasado el día, y pues que
ya, Torcato, has descansado con
decirnos tu fatiga y nosotros
quedamos obligados á procurar tu
remedio y consuelo en todo lo
que pudiéremos hacerlo, aunque
sea contra tu parecer y voluntad,
procura de dexar la compañía de
la soledad con que andas, porque
con la conversación no tiene tanto
lugar la tristeza que sin sentirlo te
consumirá la vida, y agora todos
nos vamos al lugar, donde los
regocijos de las bodas de
Silveyda no serán aún acabados,
y podremos llegar á tiempo que
gocemos alguna parte dellos.
Torcato.—Haced lo que os
pareciere, que determinado estoy
á forzarme y seguir vuestro
consejo.
Filonio.—Pues ¡alto! ¡sus!
caminemos, y para que menos
sintamos el camino, vamos
cantando alguna cosa con que
tomemos placer, que, según veo,
bien será menester para que
Torcato deseche parte de la
tristeza con que anda.
Torcato.—Yo quiero comenzar
unos versos que hice en este
desierto, al propósito de lo que mi
corazón siente; vosotros me
ayudad, para que mejor pueda
cantarlos.
Grisaldo.—Comienza á decirlos,
que así lo haremos.

TODOS TRES PASTORES


Montes, sierras y collados,
que entendido
habéis mi pena rabiosa y mis
dolores,
escuchando mis fatigas y
querellas
que al alto cielo han subido,
rompiendo con mis clamores
las estrellas,
Doleos de mis trabajos y
fatiga;
llorad conmigo mis ansias y
mis males;
moveos á compasión de mi
tormento,
pues la dulce mi enemiga
quiere sean mortales
los que siento.
Los ríos desta montaña, con
las fuentes,
testigos de mis fatigas y
cuidados,
cansados ya de me ver con
mis enojos,
detengan hoy sus corrientes,
dando lágrimas parados
á mis ojos.
Tú, Eco, que estás contino
resonando,
de mis llantos grande amiga y
compañera,
llevando mis tristes voces por
los vientos,
no dexes de ir publicando
cómo me acusan, que muera
mis tormentos.
Y tú, mi ganado triste y
afligido,
con pastor tan sin ventura y
desdichado,
que alredor deste acebo
andas paciendo,
aquí te estarás tendido
tomando en ti mi cuidado,
y padesciendo.
Soledad muy agradable, y
compañía
á mis tristes pensamientos y
memoria,
con la cual siempre descansa
mi tristeza,
no dexes de ser mi guía,
porque sienta en ti su gloria
mi firmeza.
Belisia, si mis clamores han
herido
tus oídos, yo te ruego que
escucharlos
quieras con lástima alguna y
compasión
de verme tan afligido,
y no quieras ataparlos
sin razón.
Porque si no remediares mi
dolor,
á mí me basta que sepas que
padezco,
con entera libertad, y así lo
quiero,
con muy verdadero amor,
pues á la muerte me ofrezco
y por ti muero.

Fin.
Á LOOR Y HONRA DE SEÑOR JESUCHRISTO Y
DE SU BENDITA MADRE SANTA MARÍA,

NUESTRO AMPARO Y GUÍA, FUERON


IMPRESSOS LOS
SIETE COLLOQUIOS EN LA CIUDAD DE
MONDOÑEDO

EN CASA DE AGUSTÍN DE PAZ, IMPRESSOR

ACABÓSE Á XXV DÍAS DEL MES DE OCTUBRE


DEL AÑO
DE MDLIII
NOTAS:
[1274] Remedio dice la edición de Mondoñedo, añadiendo una
sílaba al verso.

Tetuán de Chamartín.—Imp. de Bailly-Baillière é


hijos.
*** END OF THE PROJECT GUTENBERG EBOOK ORÍGENES DE
LA NOVELA - TOMO II ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright
in these works, so the Foundation (and you!) can copy and
distribute it in the United States without permission and without
paying copyright royalties. Special rules, set forth in the General
Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree to
abide by all the terms of this agreement, you must cease using
and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project
Gutenberg™ works in compliance with the terms of this
agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms
of this agreement by keeping this work in the same format with
its attached full Project Gutenberg™ License when you share it
without charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it
away or re-use it under the terms of the Project Gutenberg
License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country where
you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of the
copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite
these efforts, Project Gutenberg™ electronic works, and the
medium on which they may be stored, may contain “Defects,”
such as, but not limited to, incomplete, inaccurate or corrupt
data, transcription errors, a copyright or other intellectual
property infringement, a defective or damaged disk or other
medium, a computer virus, or computer codes that damage or
cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES -


Except for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU
AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE,
STRICT LIABILITY, BREACH OF WARRANTY OR BREACH
OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE
TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER
THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR
ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE
OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF
THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If


you discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person or
entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS

You might also like