You need to hire a criminal defense attorney immediately. The sooner a criminal defense attorney is involved, the better. The Commonwealth begins building their case
Absolutely. Even the least serious misdemeanor, an ungraded misdemeanor, carries a maximum one-year jail sentence. But there is something to consider that many people in
When looking for a criminal lawyer in Greensburg, there are a few things to expect and look for. It’s my policy to not charge for
Pennsylvania classifies crimes into three general categories, Felonies, Misdemeanors, and Summary offense. The difference between each of these is the severity of the crime. Felonies
The information you obtain at this site is not, nor is it intended to be, legal advice. You should consult an attorney for advice regarding your individual situation. We invite you to contact us and welcome your calls, letters and electronic mail. Contacting us does not create an attorney-client relationship. Please do not send any confidential information to us until such time as an attorney-client relationship has been established.
Information Collection, Use, and Sharing
We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.
We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary.
Your Access to and Control Over Information
You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:
We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.
We also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.