Hackathon participants will identify and create law practice-based technology solutions to roadblocks in access to justice that apply to one of three domestic violence use cases: legal conflict prevention and escape preparation; emergency crisis support; and post-crisis support.


AGENDA
Saturday, March 12: Hack Day 1

9:30 am – 5:00 pm

Chicago Kent Law School

9:30am: Breakfast Served

10:00: Opening Greetings

10:05: Presentation of Event Agenda and Goals

10:20: Current justice system design presentation

10:30: Talk – Domestic Violence Survivors and Support Providers

Survivors discuss their personal experiences working with the justice system in dealing with domestic violence prevention, crisis support, redress, and rehabilitation.

10:45: Overview of work process and Q&A

11:00am: Team Formation and Work State

1pm: Lunch Served

5:00pm: End of Hack Day 1

**Mentors and Subject Matter Experts available all day.

**Coffee, beverages and snacks provided all day.

TBD: Offsite location for coding and work throughout the night.

Sunday, March 13th: Hack Day 2

10:00 am – 6:00 pm

Chicago Kent Law School

10:00 am: Breakfast served (Coffee and Snacks Provided All Day)

10:30: Start work group work

12-1pm: Lunch Served

4:00pm: Presentations Begin

6:15 pm: Judges deliberate / Snacks and beverages served

6:45pm: Evening Awards and Closing

**Mentors and Subject Matter Experts available all day.

**Coffee, beverages and snacks provided all day.

Eligibility

Anyone can take part in this hackathon.

Hackathon Sponsors

Prizes

$2,250 in prizes

First Place

Second Place

Third Place

Devpost Achievements

Submitting to this hackathon could earn you:

Judges

Ed Marks

Ed Marks
New Mexico Legal Aid

Kulsum Ameji

Kulsum Ameji
Illinois Legal Aid

Glenn Rawdon

Glenn Rawdon
Legal Services Corporation

Dan Linna

Dan Linna
Legal RnD

Jeff Aresty

Jeff Aresty
Internet Bar Organization

Judging Criteria

  • Judging Criteria
    How much impact (quality and quantity) could the solution have? Does the hack recognize current solutions and avoid replication? Does the hack employ a new/novel approach to solving the problem? Might the hack cause more harm than good?

Questions? Email the hackathon manager

Tell your friends

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.