Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Skip to content

Impact of Proactive Enforcement of No-Contact Orders on Victim Safety and Repeat Victimization in Lexington County, South Carolina, 2005-2008

Metadata Updated: March 12, 2025

The study focused on domestic violence victims whose alleged batterers were free on bond with a no-contact order (NCO) as a condition of their release in Lexington County, South Carolina between 2005 and 2008. The project involved a prospective, randomized experimental study in which 466 NCO cases were randomly assigned to either the current level of NCO enforcement (the control condition, N=229) or to proactive enforcement (the treatment condition, N=237). An additional 51 interim control cases were enrolled in the study during a coverage gap between the two officers that implemented the treatment condition over the course of the study. The treatment condition involved the following intervention: (1) a special domestic violence investigator assigned by the jurisdiction's sheriff proactively "checked in" with the "treatment" group of victims to verify that they understood the NCO and to monitor compliance; (2) the investigator provided advice on mobilizing law enforcement and collecting evidence to help sanction the offender if the order was violated. Data were collected from official Lexington County Sheriff's Department (LCSD), Criminal Domestic Violence Court (CDVC), and Office of Diversion Programs (ODP) records (Dataset 1, Offender Data). Efforts were made to interview victims at six weeks (Dataset 2, Time 1 Victim Interview Data, N=141) and six months (Dataset 3, Time 2 Victim Interview Data, N=100) after the gateway arrest. Dataset 4 (Combined Time 1/Time 2 Victim Interview Data, N=97) include overall measures for respondents who completed both the Time 1 and Time 2 interviews. The victim interviews include measures on background characteristics, life experiences, circumstances surrounding the "gateway incident" which resulted in the case being enrolled in the study, and subsequent victimization experiences and no-contact order compliance levels.

Access & Use Information

Restricted: This dataset can only be accessed or used under certain conditions. License: us-pd

Downloads & Resources

Dates

Metadata Created Date August 18, 2021
Metadata Updated Date March 12, 2025

Metadata Source

Harvested from DOJ JSON

Additional Metadata

Resource Type Dataset
Metadata Created Date August 18, 2021
Metadata Updated Date March 12, 2025
Publisher National Institute of Justice
Maintainer
Identifier 3615
Data First Published 2013-07-31T12:15:42
Language eng
Data Last Modified 2013-07-31T14:45:41
Rights These data are restricted due to the increased risk of violation of confidentiality of respondent and subject data.
Public Access Level restricted public
Aicategory Not AI-ready
Bureau Code 011:21
Metadata Context https://project-open-data.cio.gov/v1.1/schema/catalog.jsonld
Metadata Catalog ID https://www.justice.gov/data.json
Schema Version https://project-open-data.cio.gov/v1.1/schema
Catalog Describedby https://project-open-data.cio.gov/v1.1/schema/catalog.json
Harvest Object Id 12b34183-5cec-464f-bcde-900b16fa647c
Harvest Source Id 3290e90a-116f-42fc-86ac-e65521ef3b68
Harvest Source Title DOJ JSON
Internalcontactpoint {"@type": "vcard:Contact", "fn": "Jennifer Scherer", "hasEmail": "mailto:Jennifer.Scherer@usdoj.gov"}
Jcamsystem {"acronym": "OJP_EXT", "id": 8, "name": "External system not available in CSAM"}
License http://www.usa.gov/publicdomain/label/1.0/
Metadatamodified 9/2/2022 6:22:00 PM
Program Code 011:060
Publisher Hierarchy Office of Justice Programs > National Institute of Justice
Sourceidentifier https://doi.org/10.3886/ICPSR25261
Source Datajson Identifier True
Source Hash 94b3d188fe7b00a59ce1a911bdae777daa5b9c3c401f9005f5f8ef27e55986bf
Source Schema Version 1.1

Didn't find what you're looking for? Suggest a dataset here.