Georgia Criminal Law – Preliminary Hearings

Defendants held in custody without bond are entitled to a preliminary hearing under Georgia law. Preliminary hearings are a vital pre-trial proceeding where the defendant has an opportunity to be released from custody if the State cannot prove the existence of probable cause for the charges against the defendant. This adversarial proceeding affords the defendant […]

Family Violence Battery in Cobb County, Georgia

A conviction for Family Violence Battery in Georgia can have consequences that go far beyond a conviction for other misdemeanors.   For some clients, this is their first interaction with law enforcement and their concerns include: jail time, a permanent mark on their criminal history , and the possibility of trial.   All of these concerns are […]

Understanding Computer Trespass Crimes in Georgia

By Mary Agramonte   In response to a growing number of computer-related crimes in both the government and private sectors, the State of Georgia enacted the Georgia Computer Systems Protection Act, O.C.G.A. §16-9-90 et. seq. The Act establishes four criminal offenses, all felonies, for violations of the Act: Computer Theft, Computer Trespass, Computer Invasion of […]

Possession of Marijuana with Intent to Distribute, How a Misdemeanor becomes a Felony

I had a misdemeanor amount of weed (less than one ounce) but I am being charged with a felony, what gives? The Offense Pursuant to O.C.G.A. §16-13-30(j)(1), “it is unlawful for any person to manufacture, deliver, distribute, dispense, administer, sell, or possess with intent to distribute marijuana.” Even though the police and prosecutor may not […]

Understanding Computer Theft Crime in Georgia

In response to a growing number of computer-related crimes in both the government and private sectors, the State of Georgia enacted the Georgia Computer Systems Protection Act (Act), O.C.G.A. §16-9-90 et. seq. The Act establishes four criminal offenses, all major felonies, for violations of the Act: Computer Theft, Computer Trespass, Computer Invasion of Privacy, and […]