Establishing secure connection… Loading editor… Preparing document…
Navigation

Fill and Sign the Stalking Can Be Form

Fill and Sign the Stalking Can Be Form

How it works

Open the document and fill out all its fields.
Apply your legally-binding eSignature.
Save and invite other recipients to sign it.

Rate template

4.8
39 votes
© 2016 - U.S. Legal Forms, Inc USLegal Guide to Stalking INTRODUCTION Stalking can be generally defined as a physical proximity, nonconsensual communication, or verbal, written or implied threats or a combination thereof, that would cause a reasonable person to fear. States categorize the crime of stalking as either general intent crimes or specific intent crimes. A stalker commits a general intent crime when the stalker intends the actions in which he engages, but the intent to bring about the consequences (fear in the victim) do not need to be proven. On the other hand, when stalking is a specific intent crime, the stalker must intend to cause the result of his actions to commit the crime of stalking. Specific intent stalking statutes may be more difficult to prosecute. Stalking is a crime under the laws of all 50 states, the District of Columbia, the U.S. Territories, and the federal government. Less than 1/3 of states classify stalking as a felony upon first offense. More than 1/2 of states classify stalking as a felony upon second offense or subsequent offense or when the crime involves aggravating factors. C IVIL VERSUS CRIMINAL O FFENSES Stalking is a crime that is often difficult to prosecute. The nature of stalking allegations are sometimes not easily able to be proven beyond a reasonable doubt, the standard of proof in criminal prosecutions. Harmless reasons are often given to explain the defendant’s conduct. For that reason, stalking is sometimes more easily pursued as a civil action rather than a criminal prosecution. A civil case requires a lower standard of proof based on a preponderance of the evidence (more likely than not). A civil stalking statute may be more effective than criminal prosecution in lowering the number of stalking incidents. Civil actions provide a means of recourse in addition to the criminal justice system. Other available remedies, such as restraining orders, may not effectively abate stalking conduct, leaving victims with no alternative but to wait for a stalker to act in a more severe and dangerous manner. Civil statutes allow stalking victims to recover for monetary losses incurred as a result of a stalker's conduct. These losses may include the cost of implementing security measures to combat a stalker's threats, losing a job as a result of a stalker's conduct, or attending counseling sessions to handle the emotional strain of a stalker's harassment. Civil stalking claims may be brought in some states, such as California, Kentucky, Michigan, Nebraska, Oregon, Rhode Island, South Dakota, Texas, Virginia, and Wyoming. Under these statutes, a stalking victim may recover civil damages from a stalker regardless of whether the stalker has been charged or convicted under the criminal law. Recoverable damages include expenses incurred by the victim as a result of a stalker's conduct, as well as punitive damages. Some states also allow stalking victims to recover attorney fees and court costs. PROTECTIVE ORDERS Protective orders are typically used in domestic disputes to ban one party from contact with another or from interfering with an order of the court with respect to child visitation or custody rights. They are also frequently used in cases of spousal abuse to keep the violent party from coming into contact with the victim. A protective order to is a method to help keep a victim of family abuse safe or stalking from further acts of violence or stalking A permanent protective order will usually only be issued after a full hearing before the appropriate court. An Order For Protection is a court order that protects a victim from domestic abuse. Any family or household member may ask the court for an Order For Protection. Specific procedures vary by court, so local court rules need to be consulted. A protection order may address domestic abuse, direct or indirect contact with petitioner, stalking evicting the respondent, housing for the petitioner when the respondent is the sole owner or lessee, temporary custody of minor children, financial support, or counseling. Protective orders may sometimes be granted ex parte, that is without the presence of the party sought to be restrained, but only when there is substantial evidence that the party applying for the order is under an imminent threat of injury or when there is good evidence that an order of the court will be violated. Ex parte refers to a motion or petition by or for one party. An ex parte judicial proceeding is one where the opposing party has not received notice nor is present. This is an exception to the usual rule of court procedure and due process rights that both parties must be present at any argument before a judge. It is in contrast to the rule that an attorney may not notify a judge without previously notifying the opposition. Ex parte hearings, petitions, or motions are usually temporary orders, such as a restraining order or temporary custody, pending a formal hearing or an emergency request for a continuance. Most jurisdictions require at least a good faith effort to notify the opposing lawyer of the time and place of any ex parte hearing. Protective orders are often granted on a temporary basis to preserve the current state of affairs until a hearing can be held to determine a more permanent resolution. They vary in duration according to the facts in each case. Typically, they last for one year with extensions possible under certain particular circumstances. Six states allow imposition of protective orders for up to three years, and three other states limit them to just 90 days. Ohio has enacted a law that sets the duration of a protective order at five years, the longest of any state. Violations of protective orders also vary widely. Although most states impose a maximum one year sentence and a $1,000 fine, eight states require mandatory jail time for violating a protective order. The distance required to be maintained is governed by the language of each specific order, which may include places of work, school, etc. Temporary restraining orders typically expire on the hearing date, but local law should be consulted for specific requirements. Often the restrained person will ask for a mutual stay- away order. A no contact order is a prohibition of direct or indirect physical, verbal, and/or written contact with another individual or group. Such orders are most commonly associated with family or household violence, stalking or sex offenses. No contact orders are primarily governed by state laws, which vary by state. Direct contact includes phone calls, letters, going within sight of the protected person, his/her residence, place of employment, or school. Non-physical contact includes, but is not limited to, telephone calls, mail, e-mail, fax and written notes. Indirect contact includes messages through a third person at the direction of the respondent. Virtually all states require transmission of protective orders to local law enforcement agencies. Twelve states require transmission within 48 hours. A few states have set up state- wide registries or information systems that keep track of protective orders that are presently in effect. Utilization of technology, such as the internet, and wide area networks, permit easy access to statewide registries. In Iowa, for example, it is required to get certified copies of protective orders into the hands of law enforcement agencies within six hours of issuance. C YBERSTALKING The Internet is commonly used by individuals to harass, annoy, and stalk others. Annoying e-mails are generally reported and handled in the same manner as annoying telephone calls. An individual can be subjected to criminal liability for placing or posting information on the Internet that causes a credible threat to a victim. The first U.S. cyberstalking law went into effect in 1999 in California. Other states include prohibitions against cyberstalking in their harassment or stalking legislation. In Florida, banned cyberstalking in October 2003. Alabama, Arizona, Connecticut, Hawaii, Illinois, New Hampshire, and New York have passed statutes against harassing electronic, computer or e-mail communications in their harassment legislation. Alaska, Florida, Oklahoma, Wyoming, and California, have incorporated electronically communicated statements as conduct constituting stalking in their anti-stalking laws. Texas enacted the Stalking by Electronic Communications Act, 2001. Missouri revised its state harassment statutes to include stalking and harassment by telephone and electronic communications (as well as cyber-bullying) after the Megan Meier suicide case of 2006. A few states have both stalking and harassment statutes that criminalize threatening and unwanted electronic communications. Other states have laws other than harassment or anti-stalking statutes that prohibit misuse of computer communications and e- mail, while statutes in other areas have language that is broad and could be interpreted to include cyberstalking behaviors Cyberstalking is also covered under recent U.S. federal law. For example, the Violence Against Women Act, passed in 2000, made cyberstalking a part of the federal interstate stalking statute. Under 18 U.S.C. 875(c), it is a federal crime, punishable by up to five years in prison and a fine of up to $250,000, to transmit any communication in interstate or foreign commerce containing a threat to injure the person of another. Section 875(c) applies to any communication actually transmitted in interstate or foreign commerce - thus it includes threats transmitted in interstate or foreign commerce via the telephone, e-mail, beepers, or the Internet. 18 U.S.C. 875 applies only to communications of actual threats. Thus, it would not apply in a situation where a cyberstalker engaged in a pattern of conduct intended to harass or annoy another (absent some threat). Also, it is not clear that it would apply to situations where a person harasses or terrorizes another by posting messages on a bulletin board or in a chat room encouraging others to harass or annoy another person. Certain forms of cyberstalking also may be prosecuted under 47 U.S.C. 223. One provision of this statute makes it a federal crime, punishable by up to two years in prison, to use a telephone or telecommunications device to annoy, abuse, harass, or threaten any person at the called number. The statute also requires that the perpetrator not reveal his or her name. See 47 U.S.C. 223(a)(1)(C). Although this statute is broader than 18 U.S.C. 875 -- in that it covers both threats and harassment -- Section 223 applies only to direct communications between the perpetrator and the victim. Thus, it would not apply to a cyberstalking situation where a person harasses or terrorizes another person by posting messages on a bulletin board or in a chat room encouraging others to harass or annoy another person. Moreover, Section 223 is only a misdemeanor, punishable by not more than two years in prison. The Interstate Stalking Act, signed into law by President Clinton in 1996, makes it a crime for any person to travel across state lines with the intent to injure or harass another person and, in the course thereof, places that person or a member of that person's family in a reasonable fear of death or serious bodily injury. See 18 U.S.C. 2261A. Because of the requirement that the stalker physically travel across state lines makes it isn’t often used in cyberstalking cases. RESOURCES : http://www.abanet.org/d omviol/pdfs/stalkingHar assment_cpo_chart.pdf http://www.ncvc.org/src/ Main.aspx http://www.vaw.umn.ed u/categories/3

Practical advice on creating your ‘Stalking Can Be’ online

Are you fed up with the inconvenience of managing documentation? Look no further than airSlate SignNow, the leading eSignature service for individuals and businesses. Wave farewell to the tedious process of printing and scanning documents. With airSlate SignNow, you can seamlessly fill out and sign documents online. Utilize the robust features incorporated into this user-friendly and economical platform and transform your method of document administration. Whether you need to approve forms or collect eSignatures, airSlate SignNow manages it all effortlessly, with just a few clicks.

Follow this detailed guide:

  1. Sign in to your account or begin a free trial with our service.
  2. Click +Create to upload a file from your device, cloud storage, or our form library.
  3. Open your ‘Stalking Can Be’ in the editor.
  4. Click Me (Fill Out Now) to finalize the document on your side.
  5. Add and assign fillable fields for others (if required).
  6. Continue with the Send Invite settings to solicit eSignatures from others.
  7. Save, print your copy, or convert it into a multi-usable template.

Don’t be concerned if you need to collaborate with your colleagues on your Stalking Can Be or send it for notarization—our platform offers everything you require to accomplish such tasks. Sign up with airSlate SignNow today and elevate your document management to a new level!

Here is a list of the most common customer questions. If you can’t find an answer to your question, please don’t hesitate to reach out to us.

Need help? Contact Support

The best way to complete and sign your stalking can be form

Save time on document management with airSlate SignNow and get your stalking can be form eSigned quickly from anywhere with our fully compliant eSignature tool.

How to Sign a PDF Online How to Sign a PDF Online

How to complete and sign paperwork online

In the past, working with paperwork took lots of time and effort. But with airSlate SignNow, document management is fast and easy. Our robust and user-friendly eSignature solution enables you to easily complete and electronically sign your stalking can be form online from any internet-connected device.

Follow the step-by-step guide to eSign your stalking can be form template online:

  • 1.Register for a free trial with airSlate SignNow or log in to your account with password credentials or SSO authentication.
  • 2.Click Upload or Create and import a form for eSigning from your device, the cloud, or our form catalogue.
  • 3.Click on the document name to open it in the editor and use the left-side toolbar to fill out all the empty fields accordingly.
  • 4.Put the My Signature field where you need to approve your form. Provide your name, draw, or upload a photo of your handwritten signature.
  • 5.Click Save and Close to accomplish editing your completed document.

After your stalking can be form template is ready, download it to your device, export it to the cloud, or invite other individuals to electronically sign it. With airSlate SignNow, the eSigning process only requires several clicks. Use our robust eSignature solution wherever you are to handle your paperwork successfully!

How to Sign a PDF Using Google Chrome How to Sign a PDF Using Google Chrome

How to fill out and sign paperwork in Google Chrome

Completing and signing documents is simple with the airSlate SignNow extension for Google Chrome. Installing it to your browser is a quick and effective way to manage your paperwork online. Sign your stalking can be form template with a legally-binding eSignature in a couple of clicks without switching between applications and tabs.

Follow the step-by-step guide to eSign your stalking can be form in Google Chrome:

  • 1.Navigate to the Chrome Web Store, locate the airSlate SignNow extension for Chrome, and install it to your browser.
  • 2.Right-click on the link to a document you need to eSign and choose Open in airSlate SignNow.
  • 3.Log in to your account using your credentials or Google/Facebook sign-in buttons. If you don’t have one, sign up for a free trial.
  • 4.Utilize the Edit & Sign menu on the left to fill out your sample, then drag and drop the My Signature option.
  • 5.Add a photo of your handwritten signature, draw it, or simply enter your full name to eSign.
  • 6.Make sure all the details are correct and click Save and Close to finish editing your paperwork.

Now, you can save your stalking can be form sample to your device or cloud storage, email the copy to other individuals, or invite them to eSign your document with an email request or a protected Signing Link. The airSlate SignNow extension for Google Chrome enhances your document processes with minimum effort and time. Try airSlate SignNow today!

How to Sign a PDF in Gmail How to Sign a PDF in Gmail How to Sign a PDF in Gmail

How to fill out and sign paperwork in Gmail

Every time you receive an email containing the stalking can be form for signing, there’s no need to print and scan a document or save and re-upload it to a different program. There’s a much better solution if you use Gmail. Try the airSlate SignNow add-on to quickly eSign any documents right from your inbox.

Follow the step-by-step guide to eSign your stalking can be form in Gmail:

  • 1.Go to the Google Workplace Marketplace and locate a airSlate SignNow add-on for Gmail.
  • 2.Set up the program with a related button and grant the tool access to your Google account.
  • 3.Open an email with an attachment that needs approval and use the S sign on the right sidebar to launch the add-on.
  • 4.Log in to your airSlate SignNow account. Choose Send to Sign to forward the file to other people for approval or click Upload to open it in the editor.
  • 5.Put the My Signature option where you need to eSign: type, draw, or import your signature.

This eSigning process saves efforts and only takes a few clicks. Take advantage of the airSlate SignNow add-on for Gmail to update your stalking can be form with fillable fields, sign forms legally, and invite other parties to eSign them al without leaving your mailbox. Boost your signature workflows now!

How to Sign a PDF on a Mobile Device How to Sign a PDF on a Mobile Device How to Sign a PDF on a Mobile Device

How to complete and sign paperwork in a mobile browser

Need to quickly complete and sign your stalking can be form on a smartphone while doing your work on the go? airSlate SignNow can help without needing to install additional software apps. Open our airSlate SignNow tool from any browser on your mobile device and create legally-binding electronic signatures on the go, 24/7.

Follow the step-by-step guidelines to eSign your stalking can be form in a browser:

  • 1.Open any browser on your device and go to the www.signnow.com
  • 2.Register for an account with a free trial or log in with your password credentials or SSO authentication.
  • 3.Click Upload or Create and import a file that needs to be completed from a cloud, your device, or our form catalogue with ready-made templates.
  • 4.Open the form and fill out the blank fields with tools from Edit & Sign menu on the left.
  • 5.Add the My Signature area to the sample, then type in your name, draw, or add your signature.

In a few easy clicks, your stalking can be form is completed from wherever you are. When you're finished editing, you can save the document on your device, generate a reusable template for it, email it to other individuals, or invite them eSign it. Make your documents on the go quick and effective with airSlate SignNow!

How to Sign a PDF on iPhone How to Sign a PDF on iPhone

How to complete and sign documents on iOS

In today’s business community, tasks must be completed quickly even when you’re away from your computer. With the airSlate SignNow application, you can organize your paperwork and approve your stalking can be form with a legally-binding eSignature right on your iPhone or iPad. Set it up on your device to close deals and manage forms from just about anywhere 24/7.

Follow the step-by-step guide to eSign your stalking can be form on iOS devices:

  • 1.Open the App Store, search for the airSlate SignNow app by airSlate, and install it on your device.
  • 2.Launch the application, tap Create to upload a form, and choose Myself.
  • 3.Opt for Signature at the bottom toolbar and simply draw your autograph with a finger or stylus to eSign the form.
  • 4.Tap Done -> Save right after signing the sample.
  • 5.Tap Save or utilize the Make Template option to re-use this paperwork in the future.

This process is so easy your stalking can be form is completed and signed within a couple of taps. The airSlate SignNow app works in the cloud so all the forms on your mobile device are kept in your account and are available whenever you need them. Use airSlate SignNow for iOS to improve your document management and eSignature workflows!

How to Sign a PDF on Android How to Sign a PDF on Android

How to fill out and sign paperwork on Android

With airSlate SignNow, it’s easy to sign your stalking can be form on the go. Set up its mobile application for Android OS on your device and start enhancing eSignature workflows right on your smartphone or tablet.

Follow the step-by-step guidelines to eSign your stalking can be form on Android:

  • 1.Go to Google Play, find the airSlate SignNow app from airSlate, and install it on your device.
  • 2.Log in to your account or create it with a free trial, then import a file with a ➕ option on the bottom of you screen.
  • 3.Tap on the imported document and select Open in Editor from the dropdown menu.
  • 4.Tap on Tools tab -> Signature, then draw or type your name to electronically sign the template. Fill out empty fields with other tools on the bottom if required.
  • 5.Use the ✔ button, then tap on the Save option to end up with editing.

With an easy-to-use interface and full compliance with major eSignature requirements, the airSlate SignNow app is the perfect tool for signing your stalking can be form. It even works without internet and updates all record changes when your internet connection is restored and the tool is synced. Fill out and eSign documents, send them for approval, and create re-usable templates anytime and from anyplace with airSlate SignNow.

Sign up and try Stalking can be form
  • Close deals faster
  • Improve productivity
  • Delight customers
  • Increase revenue
  • Save time & money
  • Reduce payment cycles