25 August 2017 | 4 replies
My first thought is that most evictions are for members of lease and/or anyone else residing at the physical address, so if your son is out then the eviction would fall on the wife.
26 August 2017 | 5 replies
Right, and to that point the guy wrote a book called Clouded Titles (i think) and his claim was that back in the 90's when the banks were finally allowed to play in the securities arena the MERS system was put in to place but when the banks utilized it they did so incorrectly (most likely on purpose to expedite the process) 100% of the time, and so of the 70 million or so titles that were put in to the system each and every property title could not by any means be traced, because the banks instead of going A, B, C, D just went from A - D and then shredded all the physical titles after they were loaded electronically.

27 August 2017 | 1 reply
I guess the tenant could physically block the door but then you should call the police if you want to get in.

14 November 2017 | 38 replies
They are also both making it more difficult to market your own brand, which means this needs to be moved down to the physical layer, in your properties.

28 August 2017 | 6 replies
We once got a U-haul truck and workers and physically helped a tenant get their stuff out and transported to the front yard of her grandmother's house.

27 August 2017 | 4 replies
They don't have title plants like we do.. they literally have to hire title abstractors to physically go to the court house and pull title the same way it was done in the 1800's.
27 August 2017 | 4 replies
Or, must the physical eviction actually take place, in order for her not to be a tenant?

31 August 2017 | 6 replies
I like the idea of contact PD immediately upon a physical threat being made.

30 August 2017 | 12 replies
You can just never use the property for personal use, you cannot physically do rehab yourself, and even managing through booking sites on your own is still a gray area legally.

17 January 2018 | 106 replies
Cyber security consulting, ethical hacking, social engineering, physical security for medium to enterprise business.