Home

UNITED STATES FEDERAL COURTS

Eighth Circuit

Model Jury Instructions Builder




This Jury Instructions Builder is intended to serve as an aid to practitioners and the District Courts throughout the Eighth Circuit in preparing instruction packets for trial with the understanding that the posting of these instructions is not an adjudicative approval of the content which must await case-by-case review by the Eighth Circuit.

Create Jury Instructions:

Select Case Type Civil
Criminal



❗ The Jury Instruction Builder is undergoing an important update to help streamline the publication of approved changes. Until this is completed, the Jury Instructions via the Builder (above) are current as of October 2021. For the most current Criminal and Civil Jury Instructions from July 2022, use the full documents available below in Reference Materials. A list of sections affected from the 2022 updates is available here.

Summary of Changes for the 2022 Edition (PDF)  View Civil Instructions



Reference Materials

Current Complete Civil Model Jury Instructions (PDF)  View Civil Instructions

Current Complete Civil Model Jury Instructions (DOCX)  View Civil Instructions

Current Complete Criminal Model Jury Instructions (PDF)  View Criminal Instructions

Current Complete Criminal Model Jury Instructions (DOCX)  View Criminal Instructions



Feedback

Substantive comments about the Model Jury Instructions or the usability of the Builder application may be sent to Jury_Instruction_Feedback@ca8.uscourts.gov.



Security Notice

This is a restricted government system for official judiciary business only. All activities on this system for any purpose, and all access attempts, may be recorded and monitored or reviewed by persons authorized by the federal judiciary for improper use, protection of system security, performance of maintenance, and appropriate management by the judiciary of its systems. By using this system or any connected system, users expressly consent to system monitoring and to official access to data reviewed and created by them on the system. Any evidence of unlawful activity, including unauthorized access attempts, may be reported to law enforcement officials.