Important Idaho, Washington State & Federal Statues

Citizen’s Public Safety Network VP Task Force Educational Resources. 

Idaho, Washington Statues & Federal ACTs concerning Vulnerable Person Protection.

Idaho Statutes

I.C. § 18-1505(1), § 39-5302(7)

IC 39-5303, CMS and SSA Title 28  & SSA Subtitle B – Elder JusticeElder Mistreatment and The Elder Justice Act


Washington Statutes

Repeating ABA Model Rule Violations common in Vulnerable Person and Estate Planning and Guardians and Conservator Litigation:

Rule 1.1, Rule 1.7, Rule 1.8, Rule 1.10, Rule 1.14, Rule 1.15, Rule 1.16, Rule 4.1, Rule 4.2, Rule 4.3, Rule 4.4, Rule 7.1, Rule 8.1 and Rule 8.3.


IRS Circular 230; Section 10.5. See Table 2 Below & TEDRA Violations:

I.C § 15-8-103 (e), IC 5-219, IC 18-2403, IC 5-218


Legal protection Federal Statutes when Restricted Access at Hospitals and Eldercare Facilities.

Restricted Access of Vulnerable Person with Family at Kootenai Health or other regional Facilities and Hospitals.

Department of Health and Human Services – Centers for Medicare and Medicaid Services: 42 CFR 482

Hospital and healthcare facility access and visitation

If you are being denied visitation to a loved one who is in a nursing home or hospital, this federal bill will help you in all 50 states.

42 CFR 482.13 – Condition of participation: Patient’s rights.

  • 482.13 Condition of participation: Patient‘s rights.

hospital must protect and promote each patient‘s rights.

(a)Standard: Notice of rights – (1) A hospital must inform each patient, or when appropriate, the patient‘s representative (as allowed under State law), of the patient‘s rights, in advance of furnishing or discontinuing patient care whenever possible.

Access and Visitation

The resident has the right and the facility must provide—subject to the resident’s right to deny or withdraw consent at any time—immediate access to any resident by:

  • Immediate family or other relatives of the resident. (42 C.F.R. §483.10(j)(1)(vii))
  • Others who are visiting with the consent of the resident, subject to reasonable restrictions. (42 C.F.R. §483.10(j)(1)(viii))
  • The facility must provide reasonable access to any resident by any entity or individual that provides health, social, legal or other services to the resident. (42 C.F.R. §483.10(j)(2))
  • If a resident is married, he or she and their spouse must be assured privacy and to be able to share a room if both are residents in the facility and both agree to do so.  (42 C.F.R. §483.10(e)(1)  and (m))

Data Curated by Corruption Maps – Publishing Newsworthy Public Safety Information.

Crowd-sourced and AI RSS Publication System; Data Gathered from Public Resources, Events,  News Articles and Advocate/Victim Witness Accounts of White-Collar Misdemeanor Infractions or Felonious that Often Results in re Irreparable Devastation to Vulnerable Persons. 


Citizen’s Public Safety Network – Vulnerable Person – VP Task Force:  White Collar Crime Tracking GEO API and Relational Database Social Technology Applications.


Person’s Submitting Evidence are Protected By Federal Whistleblower Protection Statutes In Conjunction With the US Constitution.

National, state and municipal white-collar civil, felony offences and corruption trends based on AI and crowd-sourced newsworthy public safety awareness sources. Information is  then cross-referenced with curated data of alleged or convicted perpetrator profiles. Information is based on historical and current crowd-sourced, advocate researcher and AI harvested news articles, national, state and local news events, and Geo API database resources. This platform uses the latest AI and open-source social technology platforms in combination with citizen public safety reporting systems and public domain data.  The sites GEO API maps layer and filter profiles and infractions to visually depict the trends of vulnerable person exploitation, domestic violence and inter-related vulnerable person crimes as each is a systemic societal epidemic;  crimes which often are perpetrated hand-in-hand with  professional malpractice, collusion and corruption pre-established in various urban and rural regional professionally affiliated networks.


One state example  of the  legal resources Law Enforcement can utilize to address the  repeating patterns of vulnerable person infractions and felonies  that consistently occur over a period of time by the same offenders with Federal and statutory civil and criminal violations occurring across county lines, State and even national borders.






18-7803.  DEFINITIONS. As used in this chapter, (a) “Racketeering” means any act which is chargeable or indictable under the following sections of the Idaho Code or which are equivalent acts chargeable or indictable as equivalent crimes under the laws of any other jurisdiction:

(1)  Homicide (section 18-4001, Idaho Code);

(2)  Robbery, burglary, theft, forgery, counterfeiting, and related crimes (sections 18-140118-140518-2403,18-240718-312318-312418-312518-360118-360218-360318-360518-360618-360718-360918-361018-361418-361518-463018-6501 and 49-518, Idaho Code);

(3)  Kidnapping (section 18-4501, Idaho Code);

(4)  Prostitution (sections 18-560118-560218-560318-560418-560518-560618-5608 and 18-5609, Idaho Code);

(5)  Arson (sections 18-80118-80218-80318-804 and 18-805, Idaho Code);

(6)  Assault (sections 18-908 and 18-4015, Idaho Code);

(7)  Lotteries and gambling (sections 18-380118-380218-380918-490218-490318-490418-490518-4906 and18-4908, Idaho Code);

(8)  Indecency and obscenity (sections 18-151518-151818-410318-4103A18-410418-410518-4105A and 18-4107, Idaho Code);

(9)  Poisoning (sections 18-4014 and 18-5501, Idaho Code);

(10) Fraudulent practices, false pretenses, insurance fraud, financial transaction card crimes and fraud generally (sections 18-240318-270618-300218-310118-312418-312518-312618-671341-29341-294 and41-1306, Idaho Code);

(11) Alcoholic beverages (sections 23-60223-60623-61023-70323-90523-91423-92823-934 and 23-938, Idaho Code);

(12) Cigarette taxes (sections 63-2505 and 63-2512(b), Idaho Code);

(13) Securities (sections 30-14-40130-14-40230-14-40330-14-40430-14-50130-14-50230-14-505 and 30-14-506, Idaho Code);

(14) Horseracing (section 54-2512, Idaho Code);

(15) Interest and usurious practices (sections 28-45-401 and 28-45-402, Idaho Code);

(16) Corporations (sections 18-190118-190218-190318-190418-190518-1906 and 30-1510, Idaho Code);

(17) Perjury (sections 18-5401 and 18-5410, Idaho Code);

(18) Bribery and corrupt influence (sections 18-1352 and 18-1353, Idaho Code);

(19) Controlled substances (sections 37-2732(a), (b), (c), (e) and (f), 37-2732B37-2734 and 37-2734B, Idaho Code);

(20) Motor vehicles (sections 49-22849-23149-232 and 49-518, Idaho Code);

(21) Terrorism (section 18-8103, Idaho Code).

(b)  “Person” means any individual or entity capable of holding a legal or beneficial interest in property;

(c)  “Enterprise” means any sole proprietorship, partnership, corporation, business, labor union, association or other legal entity or any group of individuals associated in fact although not a legal entity, and includes illicit as well as licit entities; and

(d)  “Pattern of racketeering activity” means engaging in at least two (2) incidents of racketeering conduct that have the same or similar intents, results, accomplices, victims or methods of commission, or otherwise are interrelated by distinguishing characteristics and are not isolated incidents, provided at least one (1) of such incidents occurred after the effective date of this act and that the last of such incidents occurred within five (5) years after a prior incident of racketeering conduct.


Report Perpetrator’s and Contact your Congressman’s office.


Please contact your Congressman’s office and State legislators to inform them how in-partitive that Vulnerable Persons and those assisting them need their attention and commitment to help the public citizens combat professional exploitation, negligence and malpractice. Vulnerable persons, especially dependent persons need to have have greater protection when perpetrators have ceased control of their free agency or when they the VP is  to afraid or deceived to understand their precarious circumstance.

These person are often unduly influenced, in fear,  denial or acquiesced to a state of perpetual submission and  learned helplessness in order to survive their abuser and those acting in concert with the exploiter to achieve their ambitions, These vulnerable victims  and  and those advocating for therm need  access to affordable resources to: 1) report their circumstance in a safe environment, 2) have their circumstances accurately vetted and objectively investigated on every side of the circumstances, not just the non-fact based accounts or fictitious projections of the current persons  whom have insidiously usurped control of their affairs and confidential relations. 

It is often best to contact political offices supported by the public taxpayer to ensure thier public safety  in writing and send a copy of your letters to Vulnerable PErson Advocacy groups limke the Citizen’s Public Safety Network.


Abuse, Negligence, Exploitation, Malpractice: 

“See It, Lot It, Blog It, Post It, Share It,  Map It, . . . STOP IT! 


Data Curated by Corruption Maps – Publishing Newsworthy Public Safety Information.

Crowd-sourced and AI RSS Publication System; Data Gathered from Public Resources, Events,  News Articles and Advocate/Victim Witness Accounts of White-Collar Misdemeanor Infractions or Felonious that Often Results in Irreparable Devastation to Vulnerable Persons. 


Citizen’s Public Safety Network – Vulnerable Person – VP Task Force :  White Collar Crime Tracking GEO API and Relational Database Social Technology Applications.



One thought on “Important Idaho, Washington State & Federal Statues

  1. THis happened to someone I know at Kootenai Health this year 3 times.

    Kasem Cares is having a seminar and workshop on how to deal with elder iscolation, abuse, negligence and exploitation and they are well aware this occurs in the nations hospitals. Below are details:

    Kasem Cares 2nd Annual Conference on Elder and Dependent Abuse with the California District Attorney Association to be held in Orange County!

    Why attend?

    This conference is designed for individuals interested in learning more about the challenges that exist within today’s elder community. Whether you are an advocate or victim, you can benefit from the issues faced in elder abuse and dependent abuse. You will get answers, resources and support if you or your loved one are facing issues in elder or dependent abuse.
    WHAT YOU WILL LEARN and who you will meet at our two day conference:

    Survivors Panel: Kerri Kasem, Kelly Rooney, Travis Campbell, Trudy Campbell, Julie Belshe, Kathy Brawn, Phyllis Kalbach, Ione Daniels, Laurie Martinez, Carrie Jones and Olivia Robinson. Hear stories of isolation and elder abuse directly from those affected, including the children of Glenn Campbell, Casey Kasem and Mickey Rooney.

    It Can Happen To Anyone: Lessons Learned From Cases of Celebrity Isolation & Elder Abuse Troy Martin – Attorney at Law; Lurie, Zepeda, Schmalz, Hogan & Martin

    Fraudulent Guardianships: Everything Law Enforcement Needs To Know – Rick Black

    Look Deeper: Unraveling Deceitful Guardianships – Diane Dimond

    How To Overcome Barriers To Successful Investigations and Prosecution: Paul Greenwood, Deputy District Attorney, San Diego County, CA

    Preying on the Disabled: One Family’s Journey and Advice – Mayor Dr. Lee McGunnigle & Leigh McGunnigle

    Kerri Kasem Closing Keynote – with special guests Kathy Brawn and Mark Mermelstein

    The conference takes place November 28-29, 2017.
    Limited tickets are available.
    To purchase tickets, click here.

    Sponsorship opportunities are available. Contact us today!

    Thank you for taking the time to join and learn from leaders in the field of elder and dependent abuse. All proceeds support and benefit Ka sem Cares, a 501(c)(3) non-profit organization. Donations are tax deductible.

    Kasem Cares · United States

Leave a Reply

Your email address will not be published. Required fields are marked *