AN ACT TO ADD PROCEDURAL EFFICIENCIES WHEN A DEFENDANT IS ORDERED TO ATTEND AN ABUSER TREATMENT PROGRAM, TO CLARIFY THE SPECIFIC TIME THAT A DOMESTIC VIOLENCE PROTECTION ORDER EXPIRES ON THE LAST DAY THAT THE ORDER IS VALID, AND TO PROVIDE THAT SUBSEQUENT COURT ORDERS SUPERSEDE SIMILAR PROVISIONS IN ORDERS ISSUED UNDER THE DOMESTIC VIOLENCE LAWS.
House committee substitute to the 2nd edition makes the following changes.
Makes organizational changes to the proposed changes to GS 50B-3, which specify the expiration of domestic violence protective orders. Further amends GS 50B-3 as follows. Requires a defendant ordered to attend an abuser treatment program pursuant to subdivision (a)(12) to begin regular attendance of the program within 60 days of the entry of the order. Requires the court to specify the date and time for a review hearing with the court to assess whether the defendant has complied as soon as practicable after 60 days from the entry of the original order. Requires that date and time to be set when entering the original order, and requires the clerk to issue a Notice of Hearing for the compliance review to be given to or served, as appropriate, upon the defendant and filed with the court on the same day as entry of the original order. Permits the plaintiff to attend the review hearing. Provides for the defendant to give the clerk a written statement showing compliance with the order prior to the review hearing, at which time the clerk must remove the hearing from the court docket and notify the plaintiff of the defendant's compliance and that no review hearing will occur.
Makes conforming changes to the act's titles.
© 2022 School of Government The University of North Carolina at Chapel Hill
This work is copyrighted and subject to "fair use" as permitted by federal copyright law. No portion of this publication may be reproduced or transmitted in any form or by any means without the express written permission of the publisher. Distribution by third parties is prohibited. Prohibited distribution includes, but is not limited to, posting, e-mailing, faxing, archiving in a public database, installing on intranets or servers, and redistributing via a computer network or in printed form. Unauthorized use or reproduction may result in legal action against the unauthorized user.