Recently Added
Prosecutor’s Guide to Stalking
This guide is intended to assist prosecutors in analyzing the elements of their stalking statute(s); recognizing stalking in cases where it has been employed by the offender in connection with some other criminal offense; appreciating the strategic value of charging stalking in cases where it is related to other criminal offenses; determining what evidence is necessary to prove the elements of the crime and ensuring that such evidence is properly documented and preserved; and effectively prosecuting a stalking charge.
PROTECTING THE RIGHTS OF IMMIGRANT SURVIVORS: INSECURE COMMUNITIES
Current policies and programs that enmesh immigration enforcement with local law enforcement are jeopardizing survivors’ chances to be free from violence in their lives. This document provides a background of selected Immigration and Customs Enforcement (ICE) programs and how they impact survivors’ safety. This document also provides additional considerations for working with survivors against the backdrop of these policies. Finally, the outline provides some advocacy strategies when working with systems to help ensure safety for our communities.
National Center for State Courts
Protection Order Repositories, Web Portals, and Beyond: Technology Solutions to Increase Access and Enforcement
This report was produced by the National Center for State Courts in collaboration with the Center for Court Innovation and the National Center for Protection Orders and Full Faith and Credit and supported by Grant No. 2016 TA-AX-K054 awarded by the Office on Violence Against Women, U.S. Department of Justice. It provides an overview of state protection order repositories and issues that impact transmission of data to the NCIC POF; offers guidance on the basic elements of designing, developing, and improving the quality and security of protection order data exchanges; and highlights state efforts to apply innovative technologies to their protection order systems.
National Council of Juvenile and Family Court Judges
Protection Orders 101 – Let’s Be Real
This will go over the following questions: 1. What is a protection order? 2. Where can I get a protection order? 3. Who can get a protection order? 4. Who can help me get one? 5. How long will the order last? 6. What can a protection order do for you? *Former product of Break the Cycle now a resource of NCJFCJ*
National Council of Juvenile and Family Court Judges
Protection Orders: Special Considerations for Minors
A protection order (also known as a restraining order) can help protect victims of physical, sexual, or emotional abuse from the person being abusive. It is called an “order” because it is signed by a judge and orders the person being abusive to do certain things, like stay away from you. There are many types of protection orders. In this handout, we are talking about domestic violence protection orders. A minor is anyone under the age of 18, unless they are emancipated. Minors and their guardians need to know special information in order to secure a protection order. *Former product of Break the Cycle now a resource of NCJFCJ*
Quantitative and Qualitative Data
This resource goes over the difference between quantitative and qualitative data with examples.
Safe Havens Interfaith Partnership Against Domestic Violence (Third Sector New England, Inc.)
Quick Tips-Lo que usted puede hacer
Spanish resource: These quick tips can help faith communities take first steps towards supporting victims and survivors of sexual and domestic violence.
Ramos v. Louisiana and its implications for ITWG members
Analysis of Ramos v. Louisiana and its implications for SDVCJ jurisdiction.
National Network to End Domestic Violence
Redes de atencion coordinada en linea y sistemas de derivacion
Las bases de datos de derivaci?n (o bases de datos de la red de atenci?n coordinada) almacenan y comparten electr?nicamente informaci?n entre muchos socios de la comunidad.
National Network to End Domestic Violence
Removing Sensitive Content from the Internet
This resource explains steps that survivors or victim service providers can take to have survivors’ personally identifying and/or intimate content from both host websites and search engine results in the course of privacy planning. It contains entirely new content.