Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

History Repeats Itself: Parallels Between Current-Day Threats To Immigrant Parental Rights And Native American Parental Rights In The Twentieth Century, Vinita B. Andrapalliyal Apr 2014

History Repeats Itself: Parallels Between Current-Day Threats To Immigrant Parental Rights And Native American Parental Rights In The Twentieth Century, Vinita B. Andrapalliyal

University of Massachusetts Law Review

Immigrant parents are currently burdened with unique risks to their parental rights, risks that bear little relation to their ability to care for their children. Recent developments in family and immigration law, historical cultural prejudices against non-Western parenting traditions, and poor immigrants’ limited access to the U.S. legal system are largely to blame. This Note explores the inadequacies in our legal system contributing to the struggles of immigrant parents to maintain family unity and connects the current situation to the disproportionate number of terminations of parental rights within the Native American community in the mid-twentieth century. It suggests that a …


Intimate Terrorism And Technology: There's An App For That, Justine A. Dunlap Mar 2014

Intimate Terrorism And Technology: There's An App For That, Justine A. Dunlap

University of Massachusetts Law Review

Technology enhances the ability of the domestic violence prepetrator. It also holds the promise of assisting domestic violence survivors in their quest for safety. This is true in practical, daily ways and is becoming increasingly true in the legal treatment of these cases. Perpetrators can use technology to stalk and find their victims; survivors can use it to access necessary information to get away from their batterers. Laws are being amended to take into account cyber-enhanced domestic violence techniques. Domestic or intimate terrorists are among the class of criminals targeted for use of GPS monitoring. This article discusses the way …