No contact

There will be much I untangle and write about in the coming weeks, but I genuinely feel as if I did the best I could to help my mom. They say the definition of insanity is doing the same thing over and over again and expecting a different result.

The last 48 hours have been a nightmare. I got a call Thursday night at around 1:38 am from Jade, who was crying. In the background, I heard Mike’s yelling, glass breaking, and things being thrown. The abuse had escalated yet again.

Mom had already called the police, and I followed up with a call of my own to ensure they responded. Mike packed his stuff and fled the state. On one hand, he faced immense pressure, but on the other, it’s unacceptable to abuse my mother and sister and then abandon mom when she was in real danger due to her current mental and physical state.

Mike knew that mom wasn’t taking her meds at IU Indy after her surgery, and they both lied to get her released. This decision is baffling, especially after we had to have mom arrested and taken to the hospital the previous Tuesday before her emergency cancer surgery. Refusing antibiotics post-surgery is dangerous and could have severe consequences.

Tuesday night, I stayed up coordinating help for mom. She was threatening Jade and believed she was being poisoned by her antibiotics. On the advice of a close family friend, I called the local crisis unit. It became a chaotic scene with 20-30 people involved. Mom was deemed mentally unfit by EMTs but still refused care. She had been calling everyone in her address book, reaching out as far as California for help.

Mike was unreachable during all this, and they never got the Power of Attorney notarized, which added to the complications. A family friend finally convinced mom to go to the ER, and after many hours, she was there. I kept several family friends updated while managing my work responsibilities.

The kicker is that Mike got her released from the hospital again, leading us back to a dangerous situation. I fear that someone might end up seriously harmed or in jail.

If Mike hadn’t returned, I would have pursued an emergency guardianship order, ensuring mom got the necessary care. But now, Mike is portraying me as the antagonist, despite my efforts to help. It’s infuriating to be painted as the bad guy when I’ve been the only one actually helping.

I’ve had my moments of frustration, and while I’ve said things I regret, my primary focus has always been on getting mom the help she needs. I’ve made the difficult decision to go no contact for my own mental health and well-being.

I know my mom isn’t in her right mind, and the hurtful things she’s said to me will take time to heal. But I can’t continue to be part of this chaotic and harmful situation. For my own sanity, I need to step back.

To Mike, it’s crucial to understand the impact of your actions. It’s not right to berate and attack those who are trying to help. Genuine support means working together to ensure mom’s well-being, not creating more chaos and conflict. Your actions have not only hindered mom’s recovery but have also caused unnecessary stress and harm to those around her.

We all need to be there for mom in a way that truly supports her recovery and well-being. This means making difficult decisions, prioritizing her health, and not letting personal conflicts get in the way. It’s about coming together as a family, despite our differences, to do what’s best for her.

In conclusion, while I wish things were different, I can’t continue to be part of this situation. I need to prioritize my mental health and safety.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Terms of Service — Closed Site / No-Access Agreement – YOUR IP ADDRESS, BROWSER AGENT, OS, ETC IS BEING FINGERPRINTED AND LOGGED

Last Updated: August 30, 2025
Operator: The operator of this website (“we,” “us,” “our”)
Site: This website (the “Site”)

0) Private Property Notice; No Public License

This Site is private, closed, and not open to the public. No license to access, view, retrieve, copy, store, save, record, or otherwise use the Site or its content (“Content”) is granted. You are not authorized to access or use the Site unless you are an individual expressly and specifically authorized in writing by us, and you access the Site only in accordance with that written authorization.

If you are not expressly authorized in writing, you must leave now and must not load, render, or otherwise access any page, media, API endpoint, or file.

1) Acceptance; Access Is a Breach Unless Pre-Authorized

By attempting to connect to the Site (including DNS lookup, TCP/IP connection, HTTP(S) request, or other protocol-level retrieval), you represent and warrant that you possess written authorization from us. If you do not, every access attempt constitutes a breach of this Agreement and trespass to our systems and resources. You agree that simply viewing any page without prior written authorization violates these Terms.

2) Definitions

  • Access means any technical act that requests, receives, renders, downloads, stores, caches, proxies, indexes, crawls, archives, screenshots, recordings, transcodes, transforms, or otherwise interacts with the Site or Content, including automated, manual, or assisted methods.
  • Content includes all text, images, audio, video, code, metadata, databases, models, logs, files, APIs, and derivatives.
  • Authorized User means a person we have approved in writing, within the scope we specify.

3) Non-Access Covenant (Core Rule)

Except for Authorized Users acting strictly within their written scope, you must not:

  1. View, read, watch, listen to, display, or render any Content.
  2. Copy, save, download, store, cache, print, screenshot, screen-record, transcribe, or archive any Content.
  3. Scrape, crawl, spider, probe, mine, harvest, index, or monitor the Site or traffic to/from it.
  4. Republish, redistribute, mirror, frame, embed, deep-link, or hotlink any part of the Site.
  5. Circumvent or attempt to circumvent access controls, rate limits, geo/IP blocks, robots directives, or consent gates.
  6. Use automated tools (including bots, headless browsers, RPA, and scripts) or third-party archiving/translation tools.
  7. Transmit, expose, or disclose any Content to others, including by AI/ML ingestion, summaries, or data extraction.
  8. Create derivative works from, or use any portion of, the Content.
  9. Commercialize, analyze, or evaluate the Content in any way.

4) Professional/Adverse-Use Prohibition (Deterrent Clause)

To the maximum extent permitted by law, you must not access the Site for any legal, regulatory, investigatory, insurance, expert-witness, e-discovery, claims, competitive-intelligence, or adverse-litigation purpose against us or our stakeholders. If you are an attorney, investigator, regulator, adjuster, expert, consultant, journalist, archivist, or similar professional—or acting at their direction—you are not permitted to access this Site without our prior written consent. Any such access is unauthorized and breaching.

5) AI/ML and Model-Training Ban

You must not use any Content (including metadata, layout, or user interactions) to train, fine-tune, evaluate, or improveany model or dataset; to generate embeddings; to perform feature extraction; or to create synthetic data. You must not provide the Content to third parties (including vendors) for any of the foregoing purposes.

6) No Caching, Archiving, or Indexing

You must not use or enable caching, proxying, content acceleration, or archiving (including but not limited to search engines, the Internet Archive, Common Crawl, or corporate archives). You must not add, submit, or permit the Site or any URL to be indexed, translated, summarized, or previewed by any service.

7) Security; Circumvention; Monitoring

You must not probe, scan, or test the vulnerability of the Site or any related network. We may employ technical measures (WAF, rate-limits, token gates, robots directives, canary content, and access logs). By attempting access, you consent to such measures and to our use of logs for enforcement.

8) Ownership; No License

All Content is owned by us or our licensors. No express or implied license is granted. Unauthorized access never creates a license.

9) Confidentiality by Conduct (Deterrent Clause)

All Content is deemed confidential and proprietary. If you obtain access without written authorization, you agree to treat all Content as confidential information, to immediately cease access, not disclose or use it, and to delete all copies (including caches, screenshots, and notes).

10) Takedown; Deletion; Return/Destruction

Upon our request—or upon learning you lack authorization—you must immediately stop access and permanently delete all Content in your possession or control (including backups, caches, logs, and derivative materials) and certify deletion in writing.

11) Accounts; Scope; Revocation

Any written authorization is personal, revocable, non-transferable, limited in scope, and may be revoked at any time. Sharing credentials or exceeding scope constitutes unauthorized access.

12) Remedies; Irreparable Harm; Injunction

Any breach causes irreparable harm for which monetary damages are inadequate. We may seek temporary, preliminary, and permanent injunctive relief, specific performance, expedited discovery, and equitable remedies without bond to the extent allowed by law, in addition to all other remedies.

13) Statutory & Common-Law Claims Preserved

We reserve all claims and defenses, including under computer-misuse/trespass statutes, copyright and trade-secret laws, contract and tort (including trespass to chattels), and unfair-competition law.

14) Indemnification

You will defend, indemnify, and hold harmless us and our affiliates, officers, directors, employees, and agents from any claims, liabilities, damages, losses, and expenses (including reasonable attorneys’ fees) arising from or related to your unauthorized access or use.

15) Disclaimers

THE SITE AND CONTENT ARE PROVIDED “AS IS” AND “AS AVAILABLE.” WE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, AVAILABILITY, AND SECURITY.

16) Limitation of Liability

TO THE MAXIMUM EXTENT PERMITTED BY LAW, WE WILL NOT BE LIABLE FOR INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, EXEMPLARY, OR PUNITIVE DAMAGES, OR FOR ANY LOSS OF DATA, PROFITS, GOODWILL, OR REPUTATION, ARISING FROM OR RELATED TO ANY ACCESS OR ATTEMPTED ACCESS. OUR AGGREGATE LIABILITY, IF ANY, SHALL NOT EXCEED US$100.

17) Termination; Survival

Any attempted access by an unauthorized person immediately terminates any putative license. Sections 3–17 survive termination.

18) Governing Law; Venue; Dispute Resolution

These Terms are governed by the laws of the State of Indiana, without regard to conflict-of-laws rules. You consent to exclusive jurisdiction and venue for injunctive or equitable relief in the state and federal courts located in Indianapolis, Indiana. At our election, all other disputes shall be resolved by binding arbitration under the AAA Commercial Arbitration Rules before a single arbitrator in Indianapolis, Indiana. Each party bears its own fees and costs, except as otherwise provided by law or these Terms.

19) Changes

We may modify these Terms at any time by posting an updated version with a new “Last Updated” date. Continued attempts to access after changes constitute acceptance.