LAMBERT V. LAMBERT Maternal grandfather who resided in Kentucky took possession of grandchildren whose mother resided in Pennsylvania, after mother took the children for a visit and never returned to retrieve the children. Grandfather filed a dependency, neglect, and abuse proceeding and was granted temporary custody of the children. Grandfather subsequently filed a petition for...Read More
PETTINGILL V. PETTINGILL Questions Presented: Domestic Violence. Appellate Procedure. Issues involve the use of “lethality factors” in a domestic violence determination and the interplay between CR 75.07(4) and CR 98 when the trial videotape is omitted from the record on appeal. Wife was granted DVO against husband by family court. The family court entered a...Read More
J.D.C v. CHFS, 2012-CA-000670-ME Published: Reversing and Remanding County: Barren Putative Father appealed FC’s judgment of paternity, claiming he should have been granted evidentiary hearing. FACTS:Read More
J.M., Father v. A.D., Mother No. 2012-CA-000358-ME Published: Opinion Vacating and Remanding County: Jefferson J.M. (Father) appeals from Jefferson Family Court order granting A.D.’s (Mother) petition to alter or amend a previous order.Read More
Cabinet for Health and Family Services, el al v. Ivy, extent of child support and arrearages to be paid by non-custodial parent receiving only SSI benefits. Keifer v. Keifer, oral findings are insufficient to support order modifying parenting time, written findings of fact are required. Digests to folow.Read More
Spousal team Sharon D. Nelson and John Simek of Sensei gave a great presentation at the AAML annual meeting in Chicago last week. I had been following Sharon’s blog, Ride The Lightning for a few weeks, so I was surprised and delighted to meet her and learn forensic electronic evidence tips from them. If you...Read More
Here are some quotes from a front page New York Times article today, Tell-All PCs and Phones Transforming Divorce. Divorce lawyers routinely set out to find every bit of private data about their clients’ adversaries, often hiring investigators with sophisticated digital forensic tools to snoop into household computers.Read More
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok