Purchase Solution

Stalking and Domestic Violence in Michigan

Not what you're looking for?

Ask Custom Question

Alice pressed charges for domstic violence against her now ex-spouse Robert. Despite the charges, Robert is still and large and Alice is frightened. Although she has the locks changed shortly after her release from the hospital, she recently returns home to find a black rose on the kitchen counter. She receives threatening notes through e-mail in which Robert cautions her to back off and drop the charges she filed against him. He states that next time he will kill their daughter Serena as well. Alice knows that without her testimony, the prosecution would not have a case against Robert. She seriously considers taking Serena and running to another state under an assumed name to get away from Robert.

- Explain current stalking legislation in Michigan
- Describe cyberstalking, and list some safety measures Alice could take to avoid detection on the Internet.
- Walk Alice through the steps necessary to obtain a protective order.
- Address the problems inherent in obtaining the order and in enforcing it.
- Discuss the forms of relief, with reasons, Alice may request.
- Include suggestions for Alice on ways she can protect herself.
- Do a threat assessment, and advise Alice of the results.
- Recommend whether or not she should continue with the case.

Purchase this Solution

Solution Summary

The expert examines stalking and domestic violence in Michigan. Cyber-stalking and the safety measures Alice could take to avoid detection on the internet is examined.

Solution Preview

Explain current stalking legislation in Michigan

Michigan's stalking law provides that unconsented contact includes, but is not limited to, any of the following:
1. Following or appearing within sight of that individual.
2. Approaching or confronting that individual in a public place or on private property.
3. Appearing at that individual's workplace or residence.
4. Entering onto or remaining on property owned, leased, or occupied by that individual.
5. Contacting that individual by telephone.
6. Sending mail or electronic communications to that individual.
7. Placing an object on or delivering an object to property owned, leased, or occupied by that individual (NCJRS, 2012).

https://www.ncjrs.gov/ovc_archives/bulletins/legalseries/bulletin1/2.html

Describe cyberstalking, and list some safety measures Alice could take to avoid detection on the Internet.

Cyberstalking involves the use of social media devices such as smartphones, the ...

Solution provided by:
Education
  • Associates of Arts , Lone Star Community College
  • Bachelor of Science , Sam Houston State University
  • Masters of Science, Kaplan University
  • Masters of Science , Kaplan University
Recent Feedback
  • "Thank you however I have two questions: 1.) where in this passage is the actual problem statement? 2.) if you used references can you please provide them? This is great work and I am so grateful. "
  • "Thank you very much"
  • "excellent analysis"
  • "graet job very helpful"
  • "Thank you, excellent and very detailed."
Purchase this Solution


Free BrainMass Quizzes
Contract Requirments

How much do you know about the legal requirements for a contract? Find out with this quiz!

Constitutional Law Rights

How much do you know about Constitutional Law Rights? Find out with this quiz!

Title VII Laws

Learn the basics of the laws under Title VII.

Evidence

Do you know your evidence objections? Find out with this quiz!

Title VII

This Quiz pertains to the spectrum of Human Rights through Title VII