Filter your results
Results 11 - 20 of 21. To narrow results enter search keywords or select filters.
Email provides us a convenient and powerful communications tool. Unfortunately, it also provides scammers and other malicious individuals an easy means for luring potential victims. The scams they attempt run from old-fashioned bait-and-switch operations to phishing schemes using a combination of email and bogus web sites to trick victims into divulging sensitive information. To protect yourself from these scams, you should understand what they are, what they look like, how they work, and what you can do to avoid them.
Phishing is a scam where internet fraudsters send spam or pop-up messages to lure personal and financial information from unsuspecting victims. To avoid getting hooked, visit the link below and view the attached guide.
OnGuardOnline.gov provides practical tips from the federal government and the technology industry to help you be on guard against internet fraud, secure your computer, and protect your personal information.
Protecting your personal information can help reduce your risk of identity theft. There are four main ways to do it: know who you share information with; store and dispose of your personal information securely, especially your Social Security number; ask questions before deciding to share your personal information; and maintain appropriate security on your computers and other electronic devices...
Today’s home network may include a wide range of wireless devices, from computers and phones, to IP Cameras, smart TVs and connected appliances. Taking basic steps to secure your home network will help protect your devices – and your information – from compromise.
The internet offers access to a world of products and services, entertainment and information. At the same time, it creates opportunities for scammers, hackers, and identity thieves. Learn how to protect your computer, your information, and your online files...
Please click on the Third-Party Custody Guide below for more information regarding third-party custody in Idaho cases, including information on the De Facto Custodian Act and a grandparent's ability to seek third-party custody in a divorce action.
The National Council of Juvenile and Family Court Judges has created a guide on How to Gather Technology Abuse Evidence for Court, whether as evidence in a civil protection order case, a custody case, or a divorce case.
To view this guide, please visit: https://www.ncjfcj.org/publications/how-to-gather-technology-abuse-evidence-for-court/.
Idaho Legal Aid Services, Inc. has created a Custody Basics Guide to explain legal and physical custody in Idaho, as well as joint v. sole custody. Please view the attached document for more information.
Attached is a Word.doc template for a Motion for Temporary Orders for temporary custody, visitation, and/or support in a pending family law matter. You may use this template to draft your own motion.
Please review the advice and additional documents needed for this motion in the Temporary Orders Packet, created by Idaho Legal Aid Services, the Idaho Law Foundation, and the Women's and Children's Alliance, attached.
Pagination
Close
Filter your results
Type
Topics
Tags
Our Partners
LSC's support for this website is limited to those activities that are consistent with LSC restrictions.