R.P.B. VS. D.R.(FV-21-0354-16, WARREN COUNTY AND STATEWIDE)(RECORD IMPOUNDED) ( 2017 )


Menu:
  •                              RECORD IMPOUNDED
    NOT FOR PUBLICATION WITHOUT THE
    APPROVAL OF THE APPELLATE DIVISION
    This opinion shall not "constitute precedent or be binding upon any court."
    Although it is posted on the internet, this opinion is binding only on the
    parties in the case and its use in other cases is limited. R.1:36-3.
    SUPERIOR COURT OF NEW JERSEY
    APPELLATE DIVISION
    DOCKET NO. A-2604-15T1
    R.P.B.,
    Plaintiff-Respondent,
    v.
    D.R.,
    Defendant-Appellant.
    ______________________________
    Argued March 1, 2017 – Decided August 29, 2017
    Before    Judges    Fuentes,    Carroll    and   Gooden
    Brown.
    On appeal from the Superior Court of New
    Jersey, Chancery Division, Family Part, Warren
    County, Docket No. FV-21-0354-16.
    Michael R. Ascher argued the cause for
    appellant (Einhorn, Harris, Ascher, Barbarito
    & Frost, attorneys; Mr. Ascher and Bonnie C.
    Frost, on the brief).
    Respondent has not filed a brief.
    PER CURIAM
    Defendant appeals from a January 14, 2016 final restraining
    order (FRO) entered against her in favor of plaintiff pursuant to
    the Prevention of Domestic Violence Act of 1991 (PDVA), N.J.S.A.
    2C:25-17 to -35.    We affirm.
    We summarize the relevant facts.     Plaintiff is a carpenter
    contractor and defendant is one of his former clients. The parties
    had a brief dating relationship from September to November 2015.
    On January 7, 2016, plaintiff filed a complaint against defendant
    seeking injunctive relief under the PDVA alleging that she had
    committed acts of domestic violence, specifically harassment under
    N.J.S.A. 2C:33-4, by sending plaintiff numerous e-mails on January
    2, 3, 4, 5 and 6, 2016.
    The Family Part judge conducted a final hearing on January
    14, 2016.     Both parties were self-represented and were the sole
    witnesses at the hearing.   During the hearing, plaintiff testified
    that after the dating relationship ended, he cancelled a pending
    construction project at defendant's home, which involved building
    a wall unit.     However, in 2015, on Thanksgiving Day, defendant
    called and emailed plaintiff several times insisting that she
    would bring a cash deposit for the cancelled job to plaintiff's
    residence.
    In response, plaintiff told defendant not to bring the money
    because she did not owe him anything.   In addition, plaintiff told
    defendant to "leave [him] alone, and that [he] was going to return
    her money."     Defendant ignored plaintiff's requests and left an
    2                          A-2604-15T1
    "envelope full of cash" under a rock at plaintiff's residence on
    Thanksgiving, while indicating that plaintiff did not have to "do
    the work for her."       Subsequently, on November 30, 2015, plaintiff
    obtained    a    certified   cashier's      check   and   returned    the     money
    defendant had left at his house on Thanksgiving along with "a
    letter asking her to leave [him] alone" and again cancelling the
    pending construction project.
    Nonetheless, according to plaintiff, between November 28 and
    December 18, 2015, defendant called him "approximately [thirty]"
    times.      Although    he   ignored    most   of   the   calls,    he   admitted
    answering a call from defendant on December 18 because he did not
    recognize       the   incoming   number.       During     that     conversation,
    plaintiff "emphatically asked [defendant] to please leave [him]
    alone again, and [he] explained to her that if she didn't stop
    . . . that [he] would file for a restraining order[.]"
    Thereafter, plaintiff went on vacation to Morocco in North
    Africa.    He returned on January 6, 2016.           According to plaintiff,
    over a five-day period from January 2 to January 6, 2016, defendant
    sent him approximately forty-five emails, all of which he ignored.
    Generally, in the emails, defendant accused plaintiff of hacking
    her   electronic      devices,   an    accusation    plaintiff      denied,      and
    expressed frustration over the relationship ending and plaintiff
    not responding to her numerous messages.
    3                                   A-2604-15T1
    On January 2, 2016 at 10:43 p.m., plaintiff received the
    first in the series of emails from defendant with an attachment
    stating:
    You treated me like shit. Wouldn't take my
    calls or speak to me.    You then want sexy
    pictures of me.
    In addition, I don't know if you have
    been spying on me for two months. I figured
    this out a couple of . . . weeks ago.      You
    sneak a HI on POF, [referring to "a dating
    site called Plenty of Fish"].        You took
    advantage of my insecurities after my divorce.
    Invading my privacy and deleting files is much
    worse than any stalking, threat, or [sic] I
    made it within inches of your property.
    The vast majority of the calls were to
    resolve business issues.
    I know you still like me -- in
    parentheses -- but maybe find it hard to deal
    with those feelings and have had some of the
    best sex we've both ever had.
    Is it too difficult to say you are
    sorry[?] . . . That's all I'm looking for,
    an acknowledgment that you treated me badly
    . . . the last month and we should resolve
    our petty issues.
    You spoke about honesty many times,
    that's where I want to start at, no spying,
    and to treat me better. I'm a good person.
    And with regard to sex, getting better and
    better, but maybe that's not what you want.
    If so, admit you want one tramp after the
    other. But I think you're still hung up on
    me. You let me believe that I liked you more,
    but you couldn't admit the opposite . . . when
    I had a date with Vin [referring to "one of
    her previous boyfriends"] I think your words
    4                          A-2604-15T1
    were, I have one up my sleeve, as though it
    was a competition.
    The    following   day,   January     3,   2016,   plaintiff      received
    sixteen emails from defendant pestering him for not responding.
    One of the emails accused him of "monitoring all of [her] devices:
    PC's, tablets, phone or just [her] Lenovo PC" and threatened that
    she would "figure it out."       On January 4, 2016, plaintiff received
    four separate emails from defendant, accusing him of "gathering
    information for a harassment suit against [her]" and of invading
    her privacy, and admitting that she trespassed on his property and
    made a number of calls.         In one of those emails, defendant also
    "strongly recommend[ed]" that they meet at her house "on the
    evening after [he] returned" from vacation "for [plaintiff] to
    explain to [defendant] why [he was] invading [her] PC without
    permission."
    On January 5, 2016, plaintiff received six additional emails
    from defendant.       Beginning at 3:19 a.m., plaintiff received an
    email from defendant including a picture that plaintiff had posted
    on   his    Twitter   account   depicting    him     riding   a    four-wheeler.
    Plaintiff suspected that defendant used "a search engine called
    www[.]picturetrail.com" to locate the image online.                   Defendant
    sent plaintiff a second email, just four minutes later at 3:23
    a.m.,   which    included   additional      screen    shots   of    pictures    of
    5                                  A-2604-15T1
    plaintiff   from   his    online      public   profiles.    That   same    day,
    plaintiff received a third email from defendant at 8:32 p.m.
    stating   plaintiff      owed   her    "roughly   $4,600   compensation     for
    chasing [him] for the last [four] days" and attributing the slow
    speed on her computer to plaintiff "still [being] in [her] files."
    Later that day, plaintiff received another email from defendant
    stating "[w]hatever you tried to send failed two times."            However,
    plaintiff denied attempting to make contact with defendant on
    January 5, 2016, and refuted defendant's claim that he had a friend
    attempt to communicate with her on his behalf.
    On January 6, 2016, plaintiff received fifteen additional
    emails from defendant. Defendant sent plaintiff a string of emails
    at 5:08 a.m., 5:11 a.m., 5:15 a.m., and 5:20 a.m., in which the
    content of each looped into one another.            Defendant wrote:
    I will send you a bill for the amount it cost
    to have all of this removed from my devices.
    . . . Includes a phone, laptop, three tablets,
    and a new router, which you saw. . . . [A]nd
    as I mentioned, [you] should also include my
    time for the lack of real work for about
    $4,500.
    . . . .
    [Y]ou also stole some files of mine. I want
    all of them back. Whether they related to you
    or not, they were my files. I did not give
    or offer them to you.
    . . . .
    6                              A-2604-15T1
    There was also a word document that had
    all of my pics that was not yet returned, among
    other files. Again, you should bring your PC
    with you tomorrow, actually both of them and
    all thumb drives you have.
    . . . .
    I am still expecting my wall unit by the
    end of January.
    That same day, defendant sent another email at 7:34 a.m.
    stating, "did you contemplate that your tech friend now has all
    my personal and financial data now.         I will need to spend all
    weekend    changing   bank   accounts,   credit   cards,   passwords,    et
    cetera."    Later, at 10:31 a.m., defendant emailed,
    I am now wasting hours of work in the office
    . . . because you are fucking around with my
    files and passwords. Can't you just leave me
    alone. Getting a big kick and laughter at my
    expense. I can't even type because my eyes
    are welling up. Are you satisfied with that
    now[?]
    Throughout the remainder of the day, defendant sent plaintiff
    additional emails at 2:31 p.m., 2:43 p.m., 2:49 p.m., 6:30 p.m.,
    and 7:53 p.m., similarly alleging that plaintiff was hacking her
    devices, wasting her time by forcing her to get her "devices
    fixed[,]" and expressing frustration that he would not respond to
    her messages.    The 2:31 p.m. email stated
    I just can't comprehend what I . . . could
    have possibly done to deserve this. No, I am
    consumed in a whole different way. I have to
    7                             A-2604-15T1
    dial in to meetings rather than go in person,
    because my eyes are red and swollen.
    I've said this already, but I just don't get
    it and I am so pissed at myself for being
    naïve and buying into your bullshit. I said
    I was a skeptic. This just reinforced to be
    one even more so.
    The 2:49 p.m. email stated in part, "I hope you got the humor you
    were hoping for, my entire digital life to bring you countless
    hours of humor, now and going forward."
    Plaintiff   testified   that   he   did   not   respond   to   any    of
    defendant's repeated emails.        He explained that defendant was
    "badgering [him] regarding the emails or regarding the files" and
    he reiterated he had "no idea what she's talking about" and "no
    connection to that at all."     When asked by the judge whether he
    feared for his safety, plaintiff specifically stated:
    I'd say yes, it's pretty alarming to have
    someone bring money to your house when you've
    asked them not to do it, for a job you're not
    doing.
    Our business relationship had long been
    over at that point. And her insistence on
    coming to my house on a Federal holiday is
    quite, you know, quite alarming.
    Plaintiff explained that he sought a restraining order against
    defendant because he does not want "to be annoyed at work all the
    time . . . or annoyed at home all the time[.]"
    8                               A-2604-15T1
    Defendant declined the court's invitation to cross-examine
    plaintiff.        In    her    defense,       defendant    admitted       sending
    approximately forty-five emails to plaintiff between January 2 and
    January 6, 2016, after receiving plaintiff's December 2, 2015
    letter with a certified cashier's check returning her money for
    the   cancelled   job   and    asking   her    not   to   contact   him    again.
    However, she explained that her conduct was motivated by her belief
    that plaintiff was hacking into her devices, rather than a purpose
    to harass him.    Defendant explained that she continued to contact
    plaintiff because she believed he was "orchestrating . . . spyware"
    or installing software on her computer.              Her belief was based on
    the type of data that was targeted.
    To support her contention, defendant testified that she "saw
    flashing" on her computer, her "machine was extremely slow," and
    she "had pictures on [her] machine that [she] had no way of
    getting."    Defendant also testified that she was "missing pictures
    on [her] phone[,] . . . virtually every text . . . [and] every
    email" between her and plaintiff.           However, when questioned by the
    court, defendant could not provide a plausible explanation for how
    these   occurrences     were    connected      to    plaintiff.       Defendant
    explained "the malware that I suspected . . . was causing part of
    the problem was dated October 30th[, 2015] and . . . the last time
    that [plaintiff] was at my house was October 31st[, 2015.]"
    9                                 A-2604-15T1
    Defendant testified that she had taken her computer to be
    evaluated by two experts; a forensics expert at Prudential where
    defendant was employed, and a computer expert at Best Buy.                             In
    addition,     defendant   stated       that    her    administrative        assistant
    witnessed files disappear from her computer.                  Defendant also spoke
    to a Norton Antivirus representative on the phone who told her "he
    saw about [twenty] or [twenty-five] computer IP addresses, foreign
    IP addresses, on [her] phone."                 Defendant explained that she
    thought the information about "those foreign IP addresses [was]
    important"     because    if    they    "correlated      to     the    places      where
    [plaintiff] was," it would confirm that she was being hacked and
    that plaintiff was "the hacker[.]"              However, the court ruled that
    without the expert "here to testify[,]" plaintiff's testimony
    regarding a phone call she had with a Norton representative
    constituted     inadmissible      hearsay      evidence       that     could    not    be
    considered by the court.
    At plaintiff's request, the court asked why defendant started
    her    communications     with    plaintiff      on    January        2,   2016,    with
    "relationship issues" if she suspected that plaintiff was hacking
    into    her   devices.         Defendant      provided    a    convoluted        answer
    explaining that she did not understand the question and that she
    could not "speak to dates" because the "forensics" on her devices
    were not completed.       At plaintiff's request, the court also asked
    10                                      A-2604-15T1
    defendant why she waited "so long to take [her] devices to the
    experts,       if   [she]   believed,   back    in   December,   that   .    .   .
    [plaintiff] somehow committed . . . a breach of [her] security in
    [her] devices."       Defendant replied, "I'm just guessing . . . . I'm
    not sure that I had the time to literally go out and investigate
    and give up my computer . . . . if I'm behind with work and trying
    to get caught up with work."            Defendant offered to come back to
    court later with her devices and supporting information, but the
    court denied her request.
    In an oral opinion rendered immediately after the hearing,
    the judge found that the entry of a FRO was justified.             Initially,
    the    judge    determined    that   the     parties   were   subject   to   the
    jurisdiction of the PDVA by virtue of their dating relationship.
    Applying the two-prong Silver1 analysis, under the first Silver
    prong, the judge found by a preponderance of the evidence that
    defendant committed the predicate act of harassment, pursuant to
    N.J.S.A. 2C:33-4(a) and (c), based on her "barrage of emails about
    their relationship" sent to plaintiff after he "sent to defendant,
    by certified and regular mail on November 30th, a cancellation for
    the work he was doing for her, a return of her payment on account
    1
    Silver v. Silver, 
    387 N.J. Super. 112
    (2006).
    11                              A-2604-15T1
    of that work, and a letter saying don't contact me anymore, it's
    over."
    Finding plaintiff's testimony "far more credible because of
    the logic and rational nature of his testimony, as opposed to
    defendant's which was all over the place," the court rejected
    defendant's claim "that the only reason she contacted . . .
    plaintiff [was] because she felt that he had installed some kind
    of malware in her electronic devices[.]"       The court concluded that
    defendant's purported "issues about her computer" were a pretext
    to   contact   plaintiff   "about   their   relationship."   The   court
    considered the history of plaintiff receiving "[thirty] plus phone
    calls" from defendant "between November 30th and December 18th"
    and plaintiff telling defendant on December 18, 2015, "when he
    answered such a call, that he wanted her to leave him alone[.]"
    The court concluded that defendant's "ultimate purpose was
    to get plaintiff to respond to [her] and to get him to engage in
    a dialog[ue] with [her]."     The court explained:
    But the immediate objective was to make
    all   kinds    of   accusations    about   the
    relationship, about things he sent her that
    he actually never sent her, to refer to issues
    that were made up in her mind to get him to
    engage.
    And that kind of behavior is certainly
    intended to annoy him and possibly alarm him
    in some respects . . . .
    12                          A-2604-15T1
    So I do find a purpose to harass both
    annoying and alarming, depending on which
    made-up accusation one is talking about.
    . . . .
    And   certainly   these   communications,
    especially the ones about suggesting that he
    owed her money, and suggesting that he had
    responded to her, installed malware on her
    computer, and other similar accusations, would
    cause the annoyance and the alarm, . . . that
    she intended.
    The court determined further        that entry of the FRO was
    necessary under the second Silver prong to protect plaintiff and
    prevent further abuse.    The court described defendant's behavior
    as "[bordering] on the obsessive . . . .        These many emails with
    made-up . . . accusations . . . or based on made-up communications,
    made-up   malware   installations,    made-up   stories   involving   the
    plaintiff, smacks of the obsessive."      The court explained:
    [Plaintiff's] fear is that there will
    continue to be an alarming number of emails,
    and . . . phone calls, and text messages
    intruding into his life. He just wants to be
    left alone and not to be annoyed at work or
    at home.    He has a life and he wants to
    continue with it without defendant and without
    intrusion from her.
    This appeal followed.    On appeal, defendant argues that the
    evidence was insufficient to sustain a violation under the PDVA.
    Defendant also argues that she was deprived of due process because
    the court's procedural and evidentiary errors precluded her from
    13                              A-2604-15T1
    presenting a defense that plaintiff had hacked into her computer.
    Specifically,      defendant    asserts    that    the   court   should       have
    adjourned the case sua sponte to afford her the opportunity to
    bring in her witness and computer expert to establish her intent
    and   state   of   mind.       Defendant   also    argues   that    the     court
    mischaracterized her computer expert evidence as inadmissible
    hearsay when it was not sought for the truth of the matter asserted
    but rather to explain her resulting belief and actions.
    Factual findings of the trial court should not be disturbed
    unless they "are so manifestly unsupported by or inconsistent with
    the competent, relevant and reasonably credible evidence as to
    offend the interests of justice."          Cesare v. Cesare, 
    154 N.J. 394
    ,
    412 (1998) (quoting Rova Farms Resort, Inc. v. Investors Ins. Co.,
    
    65 N.J. 474
    , 484 (1974)).        Deference to the trial court's factual
    findings "is especially appropriate 'when the evidence is largely
    testimonial    and   involves    questions    of    credibility[,]'"        
    ibid. (quoting In re
    Return of Weapons to J.W.D., 
    149 N.J. 108
    , 117
    (1997)), and "[b]ecause of the family courts' special jurisdiction
    and expertise in family matters[.]"               
    Id. at 413.
         Reversal is
    warranted only "if the court ignores applicable standards[.]"
    Gotlib v. Gotlib, 
    399 N.J. Super. 295
    , 309 (App. Div. 2008).
    The PDVA provides that a FRO may be issued if the court
    determines "by a preponderance of the evidence[,]" N.J.S.A. 2C:25-
    14                                   A-2604-15T1
    29(a), that the defendant has committed an act of domestic violence
    "upon a person protected under" the PDVA, N.J.S.A. 2C:25-19(a).
    A person protected under the PDVA includes "any person who has
    been subjected to domestic violence by a person with whom the
    victim has had a dating relationship."   N.J.S.A. 2C:25-19(d).    The
    term "domestic violence" is defined in N.J.S.A. 2C:25-19(a) to
    mean "the occurrence of one or more" specified acts, known as
    predicate acts, including harassment.    N.J.S.A. 2C-19(a)(13).
    A person commits the offense of harassment if, "with purpose
    to harass another," he or she
    a.   Makes,   or  causes   to   be  made,  a
    communication or communications anonymously
    or at extremely inconvenient hours, or in
    offensively coarse language, or any other
    manner likely to cause annoyance or alarm;
    . . . .
    c.   Engages in any other course of alarming
    conduct or of repeatedly committed acts with
    purpose to alarm or seriously annoy such other
    person.
    [N.J.S.A. 2C:33-4(a), (c).]
    Harassment requires that the defendant act with the purpose
    of harassing the victim and judges must be mindful that "a party
    may mask an intent to harass with what could otherwise be an
    innocent act."    J.D. v. M.D.F., 
    207 N.J. 458
    , 488 (2011).        "A
    finding of a purpose to harass may be inferred from the evidence
    15                          A-2604-15T1
    presented" and a judge may use "[c]ommon sense and experience"
    when determining a defendant's intent.       State v. Hoffman, 
    149 N.J. 564
    , 577 (1997). To that end, an analysis of whether an underlying
    act of harassment in the context of domestic violence has occurred
    requires consideration of the totality of the circumstances to
    determine whether the harassment statute has been violated.                
    Id. at 584-85.
    Pursuant to 
    Silver, supra
    , 387 N.J. Super. at 125-26, when
    determining whether to grant a FRO under the PDVA, the judge must
    make two determinations.      Under the first Silver prong, the judge
    "must   determine   whether     the     plaintiff   has   proven,     by    a
    preponderance of the credible evidence, that one or more of the
    predicate acts set forth in N.J.S.A. [2C:25-19(a)] has occurred."
    
    Id. at 125.
    Although a court is not obligated to find a
    past history of abuse before determining that
    an act of domestic violence has been committed
    in a particular situation, a court must at
    least consider that factor in the course of
    its analysis.    Therefore, not only may one
    sufficiently   egregious   action   constitute
    domestic violence under the Act, even with no
    history of abuse between the parties, but a
    court may also determine that an ambiguous
    incident qualifies as prohibited conduct,
    based on a finding of [abuse] in the parties'
    past.
    
    [Cesare, supra
    , 154 N.J. at 402.]
    16                               A-2604-15T1
    Under the second Silver prong, a judge must also determine
    whether a restraining order is required to protect the plaintiff
    from future acts or threats of violence.    
    Id. at 126-27.
      Although
    the latter determination "is most often perfunctory and self-
    evident, the guiding standard is whether a restraining order is
    necessary, upon an evaluation of the factors set forth in N.J.S.A.
    [2C:25-29(a)(1) to -29(a)(6)], to protect the victim from an
    immediate danger or to prevent further abuse."      A.M.C. v. P.B.,
    
    447 N.J. Super. 402
    , 414 (App. Div. 2016) (quoting 
    Silver, supra
    ,
    387 N.J. Super. at 127).
    We are satisfied there is sufficient credible evidence in the
    record to support the judge's finding that defendant committed
    acts of harassment, as defined in N.J.S.A. 2C:33-4(a) and (c), by
    sending plaintiff approximately forty-five emails over the course
    of five days after he repeatedly told her to leave him alone and
    returned her deposit for the cancelled project.   Given defendant's
    conduct, which was aptly described by the judge as bordering on
    the obsessive, the judge's rejection of defendant's claim that she
    did not have the requisite purpose to harass is amply supported
    by the record.   We are also convinced that the record supports the
    judge's determination that a FRO was required to protect plaintiff
    and prevent further acts of harassment.    Defendant's argument that
    17                            A-2604-15T1
    the evidence was "insufficient to sustain a finding of a violation"
    of the PDVA under Silver is simply belied by the record.
    Defendant also argues that the court failed to provide her
    with "a fair, full and meaningful hearing, violating [her] rights
    to due process."        Specifically, defendant argues that her right
    "to present a defense was vitiated" by the court's failure to
    inform her of her ability to obtain "an adjournment or continuance
    of the trial" in order to marshal evidence of the suspected hacking
    from her expert and her administrative assistant.                      According to
    defendant, such evidence was vital to establish "the non-harassing
    reasons for the communication" and thereby disprove the requisite
    mental state for harassment.            Further, defendant asserts that the
    court "mistakenly deemed reference to outside experts as hearsay
    which it could not consider" when the evidence "was not presented
    to prove the truth of what the experts might have told her" but
    rather "to establish her state of mind" and "belief about the
    hacking[.]"
    Both     the     Fourteenth    Amendment        to    the    United       States
    Constitution    and    Article     I,    paragraph    1,   of    the    New    Jersey
    Constitution protect the due process rights of defendants in
    actions brought under the PDVA.               H.E.S. v. J.C.S., 
    175 N.J. 309
    ,
    321 (2003).    In the context of a domestic violence case, minimal
    due process requires "notice defining the issues and an adequate
    18                                   A-2604-15T1
    opportunity to prepare and respond."       
    Id. at 321-22
    (quoting
    McKeown-Brand v. Trump Castle Hotel & Casino, 
    132 N.J. 546
    , 559
    (1993)).    A domestic violence defendant is also entitled to have
    the opportunity to cross-examine witnesses and to call witnesses.
    Peterson v. Peterson, 
    374 N.J. Super. 116
    , 125 (App. Div. 2005).
    We are satisfied from our review of the record that the
    hearing below complied with the due process requirements outlined
    above.     Defendant received notice that she was a defendant in a
    domestic violence case and notice of the allegations contained in
    the complaint at 5:30 p.m. on January 7, 2016.   Defendant did not
    request an adjournment before the final hearing was conducted on
    January 14, 2016.    This is in sharp contrast to the defendant in
    H.E.S., whose request for an adjournment was denied and who was
    given inadequate notice and insufficient time to prepare.    
    Id. at 324.
    Here, in accordance with the PDVA, a final hearing was held
    "within [ten] days of the filing of [the] complaint[,]" N.J.S.A.
    2C:25-29(a), and no new allegations were made at the final hearing.
    While a trial judge is not precluded from granting a continuance
    so that a party may prepare for trial, the right to a continuance
    in appropriate circumstances is not self-executing and a party who
    has not had an adequate opportunity to prepare for a final hearing
    must affirmatively seek a continuance.     See H.E.S., supra, 175
    19                         A-2604-15T1
    N.J. at 323.    Accordingly, we reject defendant's argument that the
    judge erred in failing to grant an adjournment that was never
    sought.
    Likewise, we reject defendant's assertion that the judge's
    evidentiary ruling regarding her discussion with an outside expert
    constituted reversible error.      "As a general rule, admission or
    exclusion of proffered evidence is within the discretion of the
    trial judge whose ruling is not disturbed unless there is a clear
    abuse of discretion."     Dinter v. Sears, Roebuck & Co., 252 N.J.
    Super. 84, 92 (App. Div. 1991), certif. denied, 
    140 N.J. 329
    (1995)
    (citations omitted).     Evidence with probative value to a material
    issue is relevant, N.J.R.E. 401, and "all relevant evidence is
    admissible"    unless   excluded   by   evidential   rule   or   statute.
    N.J.R.E. 402.
    Hearsay "is a statement, other than one made by the declarant
    while testifying at the trial or hearing, offered in evidence to
    prove the truth of the matter asserted[,]" N.J.R.E. 801(c), and
    "is not admissible except as provided by [the Rules of Evidence]
    or by other law[,]" N.J.R.E. 802.       Here, contrary to defendant's
    argument, her intent in introducing the statement made to her by
    the Norton computer expert was to prove the truth of the matter
    asserted, specifically, to establish that her computer was, in
    fact, hacked and that plaintiff was, in fact, the hacker.            As a
    20                             A-2604-15T1
    result,   we   discern   no   abuse    of   discretion   in   the   judge's
    evidentiary ruling excluding the testimony.
    Affirmed.
    21                            A-2604-15T1