Skip to Main Content Skip to Main Navigation

Social media are online systems which allow community collaborative systems to communicate with large numbers of people at the same time. They are very useful for raising awareness, responding to questions, or posting information which may be useful to the public.

Stalking, Part II: Technological Misuse in Intimate Partner Violence Cases

Part II of this webinar series will explore ways in which offenders misuse technology, including smartphones, computers, cameras, global positioning systems (GPS), and many online spaces to harass, abuse, and stalk. We will explore evidentiary concerns including authentication and potentially fake evidence. As gatekeepers of the evidence, it is critical that judges understand what technology exists, how technology can be used against victims, and considerations for admitting the evidence. At the end of this webinar, participants will have a better understanding of how common technology can easily be misused by offenders as well as the evidentiary considerations the technology presents.

Teen Dating Violence: Cyber Abuse, Social Media, and the Courts

With more teens than ever using social media to connect with their friends, it is important that courts and court staff stay abreast of the latest trends and techniques used to abuse. Moreover, with nearly half of middle school students reporting they were victims of electronic dating violence, this webinar provides a better understanding of teen culture and the role technology plays in teen dating violence.

Helping Survivors Gather Evidence of Technology Abuse

Social media, texting, and emails are everywhere. And in the hands of an abuser, they become yet another tactic. For a domestic violence survivor trying to demonstrate the abuse to the court, however, documenting evidence of electronic abuse and harassment can be confusing – it’s not as simple as handing the judge your smartphone. This webinar will help you support your clients with guidance on evidence concepts and clear, step-by-step instructions for how to get tech abuse evidence in a form that the court can consider.

Documents

  • Opens in new windowInformed Decisions: Technology in the Courtroom

    An article describing the principles behind technology at the Center for Court Innovation's demonstration projects.

  • Opens in new windowHow to Gather Technology Abuse Evidence for Court

    If someone is using technology like text messages, email, or social media (like Facebook) to harass you, this guide will help you “capture” the evidence of the harassment, so you can bring it to court. You might think you can just show the judge your phone in court—but you probably won’t be allowed to just show your device. Even if you are allowed, you could risk the court taking your device as evidence. To be sure the judge considers your evidence and that you don’t lose your phone (or other devices), you need to gather evidence in a form allowed by the court. This guide will provide suggestions on how to capture evidence that can be admitted in court from your devices, such as your cell phone, computer, or tablet (such as an iPad). This quick guide has links to websites and some national telephone numbers that may help you.

  • Opens in new windowCourt-Focused Technology Platform Comparison Guide

    As courts across the country adjust to the rapidly changing environment that COVID-19 has presented, the use of technology has become even more critical. The use of various modes of technology, including online video conferencing platforms has assisted courts with adapting to new ways of conducting hearings and remaining open during this pandemic. As courts work to re-open, technology will continue to play a critical role and be a valuable resource. This Court-Focused Technology Comparison Guide provides information on some of the most commonly used technology platforms but does not identify courts currently using each platform. This guide is not exhaustive, nor meant as an endorsement by the National Council of Juvenile and Family Court Judges (NCJFCJ), and the platforms listed were selected based on their widespread use, security features, and accessibility.

Links