                             RECORD IMPOUNDED

                         NOT FOR PUBLICATION WITHOUT THE
                       APPROVAL OF THE APPELLATE DIVISION
     This opinion shall not "constitute precedent or be binding upon any court."
      Although it is posted on the internet, this opinion is binding only on the
         parties in the case and its use in other cases is limited. R.1:36-3.



                                       SUPERIOR COURT OF NEW JERSEY
                                       APPELLATE DIVISION
                                       DOCKET NO. A-2604-15T1

R.P.B.,

        Plaintiff-Respondent,

v.

D.R.,

        Defendant-Appellant.

______________________________

              Argued March 1, 2017 – Decided August 29, 2017

              Before    Judges    Fuentes,    Carroll    and   Gooden
              Brown.

              On appeal from the Superior Court of New
              Jersey, Chancery Division, Family Part, Warren
              County, Docket No. FV-21-0354-16.

              Michael R. Ascher argued the cause for
              appellant (Einhorn, Harris, Ascher, Barbarito
              & Frost, attorneys; Mr. Ascher and Bonnie C.
              Frost, on the brief).

              Respondent has not filed a brief.

PER CURIAM

        Defendant appeals from a January 14, 2016 final restraining

order (FRO) entered against her in favor of plaintiff pursuant to
the Prevention of Domestic Violence Act of 1991 (PDVA), N.J.S.A.

2C:25-17 to -35.    We affirm.

     We summarize the relevant facts.     Plaintiff is a carpenter

contractor and defendant is one of his former clients. The parties

had a brief dating relationship from September to November 2015.

On January 7, 2016, plaintiff filed a complaint against defendant

seeking injunctive relief under the PDVA alleging that she had

committed acts of domestic violence, specifically harassment under

N.J.S.A. 2C:33-4, by sending plaintiff numerous e-mails on January

2, 3, 4, 5 and 6, 2016.

     The Family Part judge conducted a final hearing on January

14, 2016.     Both parties were self-represented and were the sole

witnesses at the hearing.   During the hearing, plaintiff testified

that after the dating relationship ended, he cancelled a pending

construction project at defendant's home, which involved building

a wall unit.     However, in 2015, on Thanksgiving Day, defendant

called and emailed plaintiff several times insisting that she

would bring a cash deposit for the cancelled job to plaintiff's

residence.

     In response, plaintiff told defendant not to bring the money

because she did not owe him anything.   In addition, plaintiff told

defendant to "leave [him] alone, and that [he] was going to return

her money."     Defendant ignored plaintiff's requests and left an

                                 2                          A-2604-15T1
"envelope full of cash" under a rock at plaintiff's residence on

Thanksgiving, while indicating that plaintiff did not have to "do

the work for her."       Subsequently, on November 30, 2015, plaintiff

obtained    a    certified   cashier's      check   and   returned    the     money

defendant had left at his house on Thanksgiving along with "a

letter asking her to leave [him] alone" and again cancelling the

pending construction project.

      Nonetheless, according to plaintiff, between November 28 and

December 18, 2015, defendant called him "approximately [thirty]"

times.      Although    he   ignored    most   of   the   calls,    he   admitted

answering a call from defendant on December 18 because he did not

recognize       the   incoming   number.       During     that     conversation,

plaintiff "emphatically asked [defendant] to please leave [him]

alone again, and [he] explained to her that if she didn't stop

. . . that [he] would file for a restraining order[.]"

      Thereafter, plaintiff went on vacation to Morocco in North

Africa.    He returned on January 6, 2016.           According to plaintiff,

over a five-day period from January 2 to January 6, 2016, defendant

sent him approximately forty-five emails, all of which he ignored.

Generally, in the emails, defendant accused plaintiff of hacking

her   electronic      devices,   an    accusation    plaintiff      denied,      and

expressed frustration over the relationship ending and plaintiff

not responding to her numerous messages.

                                        3                                   A-2604-15T1
    On January 2, 2016 at 10:43 p.m., plaintiff received the

first in the series of emails from defendant with an attachment

stating:

           You treated me like shit. Wouldn't take my
           calls or speak to me.    You then want sexy
           pictures of me.

                In addition, I don't know if you have
           been spying on me for two months. I figured
           this out a couple of . . . weeks ago.      You
           sneak a HI on POF, [referring to "a dating
           site called Plenty of Fish"].        You took
           advantage of my insecurities after my divorce.
           Invading my privacy and deleting files is much
           worse than any stalking, threat, or [sic] I
           made it within inches of your property.

                The vast majority of the calls were to
           resolve business issues.

                I know you still like me -- in
           parentheses -- but maybe find it hard to deal
           with those feelings and have had some of the
           best sex we've both ever had.

                Is it too difficult to say you are
           sorry[?] . . . That's all I'm looking for,
           an acknowledgment that you treated me badly
           . . . the last month and we should resolve
           our petty issues.

                You spoke about honesty many times,
           that's where I want to start at, no spying,
           and to treat me better. I'm a good person.
           And with regard to sex, getting better and
           better, but maybe that's not what you want.
           If so, admit you want one tramp after the
           other. But I think you're still hung up on
           me. You let me believe that I liked you more,
           but you couldn't admit the opposite . . . when
           I had a date with Vin [referring to "one of
           her previous boyfriends"] I think your words

                                 4                          A-2604-15T1
             were, I have one up my sleeve, as though it
             was a competition.

      The    following   day,   January     3,   2016,   plaintiff      received

sixteen emails from defendant pestering him for not responding.

One of the emails accused him of "monitoring all of [her] devices:

PC's, tablets, phone or just [her] Lenovo PC" and threatened that

she would "figure it out."       On January 4, 2016, plaintiff received

four separate emails from defendant, accusing him of "gathering

information for a harassment suit against [her]" and of invading

her privacy, and admitting that she trespassed on his property and

made a number of calls.         In one of those emails, defendant also

"strongly recommend[ed]" that they meet at her house "on the

evening after [he] returned" from vacation "for [plaintiff] to

explain to [defendant] why [he was] invading [her] PC without

permission."

      On January 5, 2016, plaintiff received six additional emails

from defendant.       Beginning at 3:19 a.m., plaintiff received an

email from defendant including a picture that plaintiff had posted

on   his    Twitter   account   depicting    him     riding   a    four-wheeler.

Plaintiff suspected that defendant used "a search engine called

www[.]picturetrail.com" to locate the image online.                   Defendant

sent plaintiff a second email, just four minutes later at 3:23

a.m.,   which    included   additional      screen    shots   of    pictures    of


                                      5                                  A-2604-15T1
plaintiff   from   his    online      public   profiles.    That   same    day,

plaintiff received a third email from defendant at 8:32 p.m.

stating   plaintiff      owed   her    "roughly   $4,600   compensation     for

chasing [him] for the last [four] days" and attributing the slow

speed on her computer to plaintiff "still [being] in [her] files."

Later that day, plaintiff received another email from defendant

stating "[w]hatever you tried to send failed two times."            However,

plaintiff denied attempting to make contact with defendant on

January 5, 2016, and refuted defendant's claim that he had a friend

attempt to communicate with her on his behalf.

     On January 6, 2016, plaintiff received fifteen additional

emails from defendant. Defendant sent plaintiff a string of emails

at 5:08 a.m., 5:11 a.m., 5:15 a.m., and 5:20 a.m., in which the

content of each looped into one another.            Defendant wrote:

            I will send you a bill for the amount it cost
            to have all of this removed from my devices.
            . . . Includes a phone, laptop, three tablets,
            and a new router, which you saw. . . . [A]nd
            as I mentioned, [you] should also include my
            time for the lack of real work for about
            $4,500.

            . . . .

            [Y]ou also stole some files of mine. I want
            all of them back. Whether they related to you
            or not, they were my files. I did not give
            or offer them to you.

            . . . .


                                        6                              A-2604-15T1
                 There was also a word document that had
            all of my pics that was not yet returned, among
            other files. Again, you should bring your PC
            with you tomorrow, actually both of them and
            all thumb drives you have.

            . . . .

                 I am still expecting my wall unit by the
            end of January.

    That same day, defendant sent another email at 7:34 a.m.

stating, "did you contemplate that your tech friend now has all

my personal and financial data now.         I will need to spend all

weekend    changing   bank   accounts,   credit   cards,   passwords,    et

cetera."    Later, at 10:31 a.m., defendant emailed,

            I am now wasting hours of work in the office
            . . . because you are fucking around with my
            files and passwords. Can't you just leave me
            alone. Getting a big kick and laughter at my
            expense. I can't even type because my eyes
            are welling up. Are you satisfied with that
            now[?]

    Throughout the remainder of the day, defendant sent plaintiff

additional emails at 2:31 p.m., 2:43 p.m., 2:49 p.m., 6:30 p.m.,

and 7:53 p.m., similarly alleging that plaintiff was hacking her

devices, wasting her time by forcing her to get her "devices

fixed[,]" and expressing frustration that he would not respond to

her messages.    The 2:31 p.m. email stated

            I just can't comprehend what I . . . could
            have possibly done to deserve this. No, I am
            consumed in a whole different way. I have to


                                    7                             A-2604-15T1
          dial in to meetings rather than go in person,
          because my eyes are red and swollen.

          I've said this already, but I just don't get
          it and I am so pissed at myself for being
          naïve and buying into your bullshit. I said
          I was a skeptic. This just reinforced to be
          one even more so.

The 2:49 p.m. email stated in part, "I hope you got the humor you

were hoping for, my entire digital life to bring you countless

hours of humor, now and going forward."

     Plaintiff   testified   that   he   did   not   respond   to   any    of

defendant's repeated emails.        He explained that defendant was

"badgering [him] regarding the emails or regarding the files" and

he reiterated he had "no idea what she's talking about" and "no

connection to that at all."     When asked by the judge whether he

feared for his safety, plaintiff specifically stated:

          I'd say yes, it's pretty alarming to have
          someone bring money to your house when you've
          asked them not to do it, for a job you're not
          doing.

               Our business relationship had long been
          over at that point. And her insistence on
          coming to my house on a Federal holiday is
          quite, you know, quite alarming.

Plaintiff explained that he sought a restraining order against

defendant because he does not want "to be annoyed at work all the

time . . . or annoyed at home all the time[.]"




                                    8                               A-2604-15T1
      Defendant declined the court's invitation to cross-examine

plaintiff.        In    her    defense,       defendant    admitted       sending

approximately forty-five emails to plaintiff between January 2 and

January 6, 2016, after receiving plaintiff's December 2, 2015

letter with a certified cashier's check returning her money for

the   cancelled   job   and    asking   her    not   to   contact   him    again.

However, she explained that her conduct was motivated by her belief

that plaintiff was hacking into her devices, rather than a purpose

to harass him.    Defendant explained that she continued to contact

plaintiff because she believed he was "orchestrating . . . spyware"

or installing software on her computer.              Her belief was based on

the type of data that was targeted.

      To support her contention, defendant testified that she "saw

flashing" on her computer, her "machine was extremely slow," and

she "had pictures on [her] machine that [she] had no way of

getting."    Defendant also testified that she was "missing pictures

on [her] phone[,] . . . virtually every text . . . [and] every

email" between her and plaintiff.           However, when questioned by the

court, defendant could not provide a plausible explanation for how

these   occurrences     were    connected      to    plaintiff.       Defendant

explained "the malware that I suspected . . . was causing part of

the problem was dated October 30th[, 2015] and . . . the last time

that [plaintiff] was at my house was October 31st[, 2015.]"

                                        9                                 A-2604-15T1
       Defendant testified that she had taken her computer to be

evaluated by two experts; a forensics expert at Prudential where

defendant was employed, and a computer expert at Best Buy.                             In

addition,     defendant   stated       that    her    administrative        assistant

witnessed files disappear from her computer.                  Defendant also spoke

to a Norton Antivirus representative on the phone who told her "he

saw about [twenty] or [twenty-five] computer IP addresses, foreign

IP addresses, on [her] phone."                 Defendant explained that she

thought the information about "those foreign IP addresses [was]

important"     because    if    they    "correlated      to     the    places      where

[plaintiff] was," it would confirm that she was being hacked and

that plaintiff was "the hacker[.]"              However, the court ruled that

without the expert "here to testify[,]" plaintiff's testimony

regarding a phone call she had with a Norton representative

constituted     inadmissible      hearsay      evidence       that     could    not    be

considered by the court.

       At plaintiff's request, the court asked why defendant started

her    communications     with    plaintiff      on    January        2,   2016,    with

"relationship issues" if she suspected that plaintiff was hacking

into    her   devices.         Defendant      provided    a    convoluted        answer

explaining that she did not understand the question and that she

could not "speak to dates" because the "forensics" on her devices

were not completed.       At plaintiff's request, the court also asked

                                        10                                      A-2604-15T1
defendant why she waited "so long to take [her] devices to the

experts,       if   [she]   believed,   back    in   December,   that   .    .   .

[plaintiff] somehow committed . . . a breach of [her] security in

[her] devices."       Defendant replied, "I'm just guessing . . . . I'm

not sure that I had the time to literally go out and investigate

and give up my computer . . . . if I'm behind with work and trying

to get caught up with work."            Defendant offered to come back to

court later with her devices and supporting information, but the

court denied her request.

       In an oral opinion rendered immediately after the hearing,

the judge found that the entry of a FRO was justified.             Initially,

the    judge    determined    that   the     parties   were   subject   to   the

jurisdiction of the PDVA by virtue of their dating relationship.

Applying the two-prong Silver1 analysis, under the first Silver

prong, the judge found by a preponderance of the evidence that

defendant committed the predicate act of harassment, pursuant to

N.J.S.A. 2C:33-4(a) and (c), based on her "barrage of emails about

their relationship" sent to plaintiff after he "sent to defendant,

by certified and regular mail on November 30th, a cancellation for

the work he was doing for her, a return of her payment on account




1
    Silver v. Silver, 387 N.J. Super. 112 (2006).

                                        11                              A-2604-15T1
of that work, and a letter saying don't contact me anymore, it's

over."

      Finding plaintiff's testimony "far more credible because of

the logic and rational nature of his testimony, as opposed to

defendant's which was all over the place," the court rejected

defendant's claim "that the only reason she contacted . . .

plaintiff [was] because she felt that he had installed some kind

of malware in her electronic devices[.]"       The court concluded that

defendant's purported "issues about her computer" were a pretext

to   contact   plaintiff   "about   their   relationship."   The   court

considered the history of plaintiff receiving "[thirty] plus phone

calls" from defendant "between November 30th and December 18th"

and plaintiff telling defendant on December 18, 2015, "when he

answered such a call, that he wanted her to leave him alone[.]"

      The court concluded that defendant's "ultimate purpose was

to get plaintiff to respond to [her] and to get him to engage in

a dialog[ue] with [her]."     The court explained:

                But the immediate objective was to make
           all   kinds    of   accusations    about   the
           relationship, about things he sent her that
           he actually never sent her, to refer to issues
           that were made up in her mind to get him to
           engage.

                And that kind of behavior is certainly
           intended to annoy him and possibly alarm him
           in some respects . . . .


                                    12                          A-2604-15T1
                So I do find a purpose to harass both
           annoying and alarming, depending on which
           made-up accusation one is talking about.

                . . . .

                And   certainly   these   communications,
           especially the ones about suggesting that he
           owed her money, and suggesting that he had
           responded to her, installed malware on her
           computer, and other similar accusations, would
           cause the annoyance and the alarm, . . . that
           she intended.

     The court determined further        that entry of the FRO was

necessary under the second Silver prong to protect plaintiff and

prevent further abuse.    The court described defendant's behavior

as "[bordering] on the obsessive . . . .        These many emails with

made-up . . . accusations . . . or based on made-up communications,

made-up   malware   installations,    made-up   stories   involving   the

plaintiff, smacks of the obsessive."      The court explained:

                [Plaintiff's] fear is that there will
           continue to be an alarming number of emails,
           and . . . phone calls, and text messages
           intruding into his life. He just wants to be
           left alone and not to be annoyed at work or
           at home.    He has a life and he wants to
           continue with it without defendant and without
           intrusion from her.

     This appeal followed.    On appeal, defendant argues that the

evidence was insufficient to sustain a violation under the PDVA.

Defendant also argues that she was deprived of due process because

the court's procedural and evidentiary errors precluded her from


                                 13                              A-2604-15T1
presenting a defense that plaintiff had hacked into her computer.

Specifically,      defendant    asserts    that    the   court   should       have

adjourned the case sua sponte to afford her the opportunity to

bring in her witness and computer expert to establish her intent

and   state   of   mind.       Defendant   also    argues   that    the     court

mischaracterized her computer expert evidence as inadmissible

hearsay when it was not sought for the truth of the matter asserted

but rather to explain her resulting belief and actions.

      Factual findings of the trial court should not be disturbed

unless they "are so manifestly unsupported by or inconsistent with

the competent, relevant and reasonably credible evidence as to

offend the interests of justice."          Cesare v. Cesare, 154 N.J. 394,

412 (1998) (quoting Rova Farms Resort, Inc. v. Investors Ins. Co.,

65 N.J. 474, 484 (1974)).        Deference to the trial court's factual

findings "is especially appropriate 'when the evidence is largely

testimonial    and   involves    questions    of    credibility[,]'"        ibid.

(quoting In re Return of Weapons to J.W.D., 149 N.J. 108, 117

(1997)), and "[b]ecause of the family courts' special jurisdiction

and expertise in family matters[.]"               Id. at 413.      Reversal is

warranted only "if the court ignores applicable standards[.]"

Gotlib v. Gotlib, 399 N.J. Super. 295, 309 (App. Div. 2008).

      The PDVA provides that a FRO may be issued if the court

determines "by a preponderance of the evidence[,]" N.J.S.A. 2C:25-

                                     14                                   A-2604-15T1
29(a), that the defendant has committed an act of domestic violence

"upon a person protected under" the PDVA, N.J.S.A. 2C:25-19(a).

A person protected under the PDVA includes "any person who has

been subjected to domestic violence by a person with whom the

victim has had a dating relationship."   N.J.S.A. 2C:25-19(d).    The

term "domestic violence" is defined in N.J.S.A. 2C:25-19(a) to

mean "the occurrence of one or more" specified acts, known as

predicate acts, including harassment.    N.J.S.A. 2C-19(a)(13).

     A person commits the offense of harassment if, "with purpose

to harass another," he or she

          a.   Makes,   or  causes   to   be  made,  a
          communication or communications anonymously
          or at extremely inconvenient hours, or in
          offensively coarse language, or any other
          manner likely to cause annoyance or alarm;

                 . . . .

          c.   Engages in any other course of alarming
          conduct or of repeatedly committed acts with
          purpose to alarm or seriously annoy such other
          person.

          [N.J.S.A. 2C:33-4(a), (c).]

     Harassment requires that the defendant act with the purpose

of harassing the victim and judges must be mindful that "a party

may mask an intent to harass with what could otherwise be an

innocent act."    J.D. v. M.D.F., 207 N.J. 458, 488 (2011).        "A

finding of a purpose to harass may be inferred from the evidence


                                15                          A-2604-15T1
presented" and a judge may use "[c]ommon sense and experience"

when determining a defendant's intent.       State v. Hoffman, 149 N.J.

564, 577 (1997). To that end, an analysis of whether an underlying

act of harassment in the context of domestic violence has occurred

requires consideration of the totality of the circumstances to

determine whether the harassment statute has been violated.                Id.

at 584-85.

     Pursuant to Silver, supra, 387 N.J. Super. at 125-26, when

determining whether to grant a FRO under the PDVA, the judge must

make two determinations.      Under the first Silver prong, the judge

"must   determine   whether     the     plaintiff   has   proven,     by    a

preponderance of the credible evidence, that one or more of the

predicate acts set forth in N.J.S.A. [2C:25-19(a)] has occurred."

Id. at 125.

          Although a court is not obligated to find a
          past history of abuse before determining that
          an act of domestic violence has been committed
          in a particular situation, a court must at
          least consider that factor in the course of
          its analysis.    Therefore, not only may one
          sufficiently   egregious   action   constitute
          domestic violence under the Act, even with no
          history of abuse between the parties, but a
          court may also determine that an ambiguous
          incident qualifies as prohibited conduct,
          based on a finding of [abuse] in the parties'
          past.

          [Cesare, supra, 154 N.J. at 402.]



                                   16                               A-2604-15T1
     Under the second Silver prong, a judge must also determine

whether a restraining order is required to protect the plaintiff

from future acts or threats of violence.    Id. at 126-27.   Although

the latter determination "is most often perfunctory and self-

evident, the guiding standard is whether a restraining order is

necessary, upon an evaluation of the factors set forth in N.J.S.A.

[2C:25-29(a)(1) to -29(a)(6)], to protect the victim from an

immediate danger or to prevent further abuse."      A.M.C. v. P.B.,

447 N.J. Super. 402, 414 (App. Div. 2016) (quoting Silver, supra,

387 N.J. Super. at 127).

     We are satisfied there is sufficient credible evidence in the

record to support the judge's finding that defendant committed

acts of harassment, as defined in N.J.S.A. 2C:33-4(a) and (c), by

sending plaintiff approximately forty-five emails over the course

of five days after he repeatedly told her to leave him alone and

returned her deposit for the cancelled project.   Given defendant's

conduct, which was aptly described by the judge as bordering on

the obsessive, the judge's rejection of defendant's claim that she

did not have the requisite purpose to harass is amply supported

by the record.   We are also convinced that the record supports the

judge's determination that a FRO was required to protect plaintiff

and prevent further acts of harassment.    Defendant's argument that



                                17                            A-2604-15T1
the evidence was "insufficient to sustain a finding of a violation"

of the PDVA under Silver is simply belied by the record.

     Defendant also argues that the court failed to provide her

with "a fair, full and meaningful hearing, violating [her] rights

to due process."        Specifically, defendant argues that her right

"to present a defense was vitiated" by the court's failure to

inform her of her ability to obtain "an adjournment or continuance

of the trial" in order to marshal evidence of the suspected hacking

from her expert and her administrative assistant.                      According to

defendant, such evidence was vital to establish "the non-harassing

reasons for the communication" and thereby disprove the requisite

mental state for harassment.            Further, defendant asserts that the

court "mistakenly deemed reference to outside experts as hearsay

which it could not consider" when the evidence "was not presented

to prove the truth of what the experts might have told her" but

rather "to establish her state of mind" and "belief about the

hacking[.]"

     Both     the     Fourteenth    Amendment        to    the    United       States

Constitution    and    Article     I,    paragraph    1,   of    the    New    Jersey

Constitution protect the due process rights of defendants in

actions brought under the PDVA.               H.E.S. v. J.C.S., 175 N.J. 309,

321 (2003).    In the context of a domestic violence case, minimal

due process requires "notice defining the issues and an adequate

                                         18                                   A-2604-15T1
opportunity to prepare and respond."       Id. at 321-22 (quoting

McKeown-Brand v. Trump Castle Hotel & Casino, 132 N.J. 546, 559

(1993)).    A domestic violence defendant is also entitled to have

the opportunity to cross-examine witnesses and to call witnesses.

Peterson v. Peterson, 374 N.J. Super. 116, 125 (App. Div. 2005).

       We are satisfied from our review of the record that the

hearing below complied with the due process requirements outlined

above.     Defendant received notice that she was a defendant in a

domestic violence case and notice of the allegations contained in

the complaint at 5:30 p.m. on January 7, 2016.   Defendant did not

request an adjournment before the final hearing was conducted on

January 14, 2016.    This is in sharp contrast to the defendant in

H.E.S., whose request for an adjournment was denied and who was

given inadequate notice and insufficient time to prepare.    Id. at

324.

       Here, in accordance with the PDVA, a final hearing was held

"within [ten] days of the filing of [the] complaint[,]" N.J.S.A.

2C:25-29(a), and no new allegations were made at the final hearing.

While a trial judge is not precluded from granting a continuance

so that a party may prepare for trial, the right to a continuance

in appropriate circumstances is not self-executing and a party who

has not had an adequate opportunity to prepare for a final hearing

must affirmatively seek a continuance.     See H.E.S., supra, 175

                                 19                         A-2604-15T1
N.J. at 323.    Accordingly, we reject defendant's argument that the

judge erred in failing to grant an adjournment that was never

sought.

     Likewise, we reject defendant's assertion that the judge's

evidentiary ruling regarding her discussion with an outside expert

constituted reversible error.      "As a general rule, admission or

exclusion of proffered evidence is within the discretion of the

trial judge whose ruling is not disturbed unless there is a clear

abuse of discretion."     Dinter v. Sears, Roebuck & Co., 252 N.J.

Super. 84, 92 (App. Div. 1991), certif. denied, 140 N.J. 329 (1995)

(citations omitted).     Evidence with probative value to a material

issue is relevant, N.J.R.E. 401, and "all relevant evidence is

admissible"    unless   excluded   by   evidential   rule   or   statute.

N.J.R.E. 402.

     Hearsay "is a statement, other than one made by the declarant

while testifying at the trial or hearing, offered in evidence to

prove the truth of the matter asserted[,]" N.J.R.E. 801(c), and

"is not admissible except as provided by [the Rules of Evidence]

or by other law[,]" N.J.R.E. 802.       Here, contrary to defendant's

argument, her intent in introducing the statement made to her by

the Norton computer expert was to prove the truth of the matter

asserted, specifically, to establish that her computer was, in

fact, hacked and that plaintiff was, in fact, the hacker.            As a

                                   20                             A-2604-15T1
result,   we   discern   no   abuse    of   discretion   in   the   judge's

evidentiary ruling excluding the testimony.

    Affirmed.




                                      21                            A-2604-15T1
