Brief summary of state statutes and laws related to conducted electrical weapons (CEWs).
State statutes and laws applicable to Conducted Electrical Weapons (CEWs).
Product liability litigation risk. For law enforcement agencies there is civil risk and for individual officers there are civil and criminal excessive use-of-force liability and litigation risks under 42 U.S.C. § 1983 and state specific causes of action. Law enforcement use-of-force risks and device manufacturer risks are separate and distinct liability and litigation risks—manufacturers and distributors are not liable for excessive force claims and law enforcement agencies and individual officers are not liable for product liability claims.
Bryan v. McPherson regarding the use of a TASER CEW
Resources for the legal aspects of Conducted Electrical Weapons (CEWs)
A library containing many articles and case summaries involving the use of conducted electrical weapon as well as general use-of-force topics.
This Acceptable Use Policy (Policy) describes prohibited uses of the web services and mobile applications offered by TASER International, Inc. and its affiliates (Services). The examples described in this Policy are not exhaustive. We may modify this Policy at any time by posting a revised version on the EVIDENCE.com and TASER.com sites. By using the Services, you agree to the latest version of this Policy.
No Illegal, Harmful, or Offensive Use or Content
You may not use, or encourage, promote, facilitate or instruct others to use, the Services for any illegal, harmful or offensive use, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, or offensive. Prohibited activities or content include:
No Security Violations
You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:
No Network Abuse
You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:
No E-Mail or Other Message Abuse
You will not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another internet service provider if those messages violate this Policy or the acceptable use policy of that provider.
Our Monitoring and Enforcement
We reserve the right, but do not assume the obligation, to investigate any violation of this Policy or misuse of the Services. We may:
We may report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Our reporting may include disclosing appropriate customer information. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy.
Reporting of Violations of this Policy
[Document Revised 01-07-2013]