Collier County Clerk of the Circuit Court
Juvenile Department
3315 Tamiami Trail East, Ste. 102
Naples, FL 34112-5324
Phone: (239) 252-2846
Email: Juvenile



Juvenile delinquency is when a minor has allegedly committed a law violation.

Public Defender Representation

Public defenders are experienced trial attorneys licensed by the Florida Bar who specialize in criminal law. If you are unable to afford a private attorney, you may complete an application for a Public Defender. The Court determines if a person applying for appointment of a Public Defender is indigent, pursuant to Fla. Stat. 27.52. The Court can make a provisional appointment of the Public Defender, private attorney, or any other due process services on an interim basis, pending the Clerk’s determination of indigent status. The Affidavit of Indigent Status must be filed with the Clerk’s Office even if a provisional appointment has been made.

The provision of a Public Defender or court-appointed Attorney is not free. An application fee of $50 will be assessed whether the Public Defender is appointed or not. To request a Public Defender, you need to complete an “Affidavit of Indigent Status” and pay the $50 application fee.


Due to the confidential nature of these cases, only limited information is provided over the telephone. To obtain information, a person must appear in person with a valid photo identification. Information can only be provided to the juvenile, attorney of record and parents. Per Fla. Statutes, all juvenile records are confidential.

You Are Now Leaving Our Website

Links to external, or third-party websites, are provided solely for visitors’ convenience. Following links to other sites is done so at your own risk and the owners of this website accept no liability for any linked sites or their content. Any link from our site to an external website does not imply that we endorse or accept any responsibility for its use. It is important for users to take necessary precautions, especially to ensure appropriate safety from viruses, worms, trojans, and other potentially destructive items. Users should review the privacy policies of external websites and other terms of use to learn more about what, why, and how they collect and use any personally identifiable information.