C.Chan=Winning Results! AFFORDABLE! 4.7/5 Ratings by Clients Friendly+Affordable!CHICO NEW PH.#530.497-0777

Sunday, July 7, 2019

Domestic Violence , Technology Abuse, evidence Issues

DOMESTIC VIOLENCE VICTIMS+SURVIVORS AND MEGAN'S LAW....and
Issues in Technology Abuse against Victims

https://static1.squarespace.com/static/51dc541ce4b03ebab8c5c88c/t/54e3d1b6e4b08500fcb455a0/1424216502058/NNEDV_Glimpse+From+the+Field+-+2014.pdf  (Abusers misusing technology; and see down below, for specific data)

https://www.meganslaw.ca.gov/Docs/Survivors_CA_Legal_Rights.pdf

https://www.cityofsacramento.org/Police/News-Alerts/Megans-Law

Registration as a sex offender under Penal Code 290 PC (known as the Sex Offender Registration Act) is, perhaps, one of the most devastating penalties you face if convicted of a California sex offense. ... Tier two requires registration as a sex offender for at least twenty (20) years.

Sex offender registration in California (SB 384 & the 3-tiered system)
https://www.womenslaw.org/about-abuse




*Attorney has access to experts in most technology
issues, including tracing, cell phone technology issues
and improper or illegal spying on cell phones, computers and the like. It should be noted that although attorney does file domestic violence TRO cases, attorney also defends people who are accused of DV. Some DV cases are valid but certainly not all of them...
        Attorney usually ends up representing the person being sued, but that's probably due to the fact that those who have to defend themselves from lies and misrepresentation will need a very strong defense attorney, and therefor seek out someone who is not afraid to fight for them.
=========================================
In a 2015 survey of victim service providers, 97 percent of programs reported that their clients experienced harassment, monitoring, and threats by abusers through the misuse of technology.    

Technology misuse can include tracking devices to monitor where you go (such as putting an app on your phone to track where your phone is); listening in on your conversations; monitoring your activity on your cell phone, tablet or computer; using technology to impersonate someone; and sending harassing or threatening messages via text, email, etc.