WomensLaw serves and supports all survivors, no matter their sex or gender.

About Abuse

Abuse Using Technology

View all
Updated: July 12, 2024

What does it mean to document my evidence?

Any evidence can be documented so that you can access it later. For purposes of this section, documenting your evidence means that you are taking steps to:

  • keep (preserve) evidence of abuse; or
  • accurately record incidents of abuse as they happen, by writing the incidents in a log, for example.

Part of documenting technological evidence means that you are not changing the evidence at all – so, for example, if the abuser sends a threatening email that is unsigned, you cannot add his/her name to the email just because you know that s/he wrote it. You also want to document your evidence in a format that contains the most reliable information for the judge or law enforcement to consider. This means documenting the phone number, email address, username, or other account information associated with the evidence. For instance, if you wanted to document a text message from your employer who is saved under your phone contacts as “Boss,” you would want to save the text message with your boss’s phone number displayed instead of “Boss.” You would also want to display the date and time stamps to show when the message was received. If you do not know how to find the sender information or date and time stamps for your messages on your device or account, a simple Internet search can help.

Why is documenting evidence important in cases involving technology abuse?

If an abuser is using technology to abuse you, often the evidence of that abuse is located on the Internet or on a device like a cell phone, tablet, computer, or video camera. Documenting this evidence can be very helpful if, at some point, you want to try to have the legal system hold the abuser accountable. It is important to document the evidence as soon as possible because if an abuser has access to your accounts or your devices, s/he may be able to access and delete it. You may have to take extra precautions to make sure your evidence isn’t deleted by accident or through your account/device settings. For instance, your phone may be set to delete text messages after a certain time period to save storage space on your device. You will want to make sure that such features are turned off or that the particular evidence you are documenting is saved in a safe place.

It may be your first instinct to delete threatening messages from an abuser or to “block” the abuser if s/he is harassing you on social media. This is a completely understandable response. However, before you do this, it’s important to understand and think through how this will impact your ability to document evidence. If you delete the messages, there may no longer be evidence that you can access, and it may be difficult or impossible to access them from the abuser’s accounts or devices.

There are ways you can minimize having to see the abusive material while still being able to collect and document evidence of the abuser’s crimes and behaviors. For instance, you can silence message notifications from that particular person or set up a folder in your email account and create a rule for messages from that sender to go straight to a separate folder. Filtering the abuser’s communications will allow you to have access to the information when you want to without constantly having to see it. If your device is not accessible to the abuser, you can also save screenshots of abusive or threatening messages in folders or hidden photo albums on your devices so that you do not have to see them until you need to access them. You should be careful, however, not to save any evidence to cloud storage if the abuser may have access to your cloud account.

Documenting this evidence is so important because you may later need it in a court hearing. In an order of protection trial, for example, the judge is making decisions about whether to grant an order and what protections to include in the order. Having your evidence documented in a form that you can bring to court allows you to present it to the judge to support your testimony. It can also help you show the judge why you need a particular protection to be included in the order. You may also need to show the evidence to law enforcement in certain situations or to your lawyer so that s/he can prepare for court.

How should I document the abuse?

The best way to document evidence of abuse will depend on the exact circumstances of your case and the way that the abuser is using technology to commit the abuse. You may wish to speak with a lawyer or domestic violence advocate in your state about what records you should keep. If you aren’t sure what could be useful, it is generally better to keep more evidence rather than less.

These are some ways in which you could consider documenting evidence of abuse:

  • Keep a log or a record of the details of each incident as the incidents occur. The log could include:
    • a list of the date and time of each incident;
    • what the abuser did or said;
    • what actions, if any, you took; and
    • what witnesses or evidence you have related to the incident.

You can download a sample technology abuse log to help with this.

  • Save any voicemails, call logs, emails, or text messages and take screenshots or photographs of the phone or computer screen and store them in a safe location separate from the device on which you originally accessed them. When taking screenshots or photographs, be sure to include as much information as possible. For instance, you will want to show the phone number of the person who is sending harassing messages, not just the contact name you assigned to that person in your phone.
  • Print out emails with the full header information included so that details such as the date and time of the email and the IP address it was sent from can be easily identified. It is important to document this from the original email. If the email has been forwarded, you will no longer have the information related to the original sender. If you do not know how to find the full header information, a simple Internet search can help explain the specific steps based on whether you use Outlook, Gmail, or another email service provider.
  • Take screenshots of any posts made on social media by the abuser to preserve them in case s/he later deletes them. When you do this, be sure to include the full URL from the bar at the top of the window and take screenshots of the abuser’s profile page as well as any time and date information for the posts.
  • Download the data on your social media account in case your account later gets hacked or deleted. You may need to be able to explain to the judge how you downloaded your account information and whether it accurately reflects what you saw on the social media site or app. If you have filed criminal charges, law enforcement may be able to send a letter or subpoena to the social media company or website asking them to keep the account information but it can’t hurt to also download it yourself.
    • Note: Some apps, such as Snapchat, notify the sender of a snap or chat if a screenshot is taken of it. A safer way to document an abusive or threatening snap or chat is to take a picture of it with another device. Since snaps and chats in Snapchat are set up to disappear from your device after a certain amount of time set by the sender, have a separate camera ready before you open the snap or chat.
  • Document any suspicious account activity or login history if the abuser is accessing your accounts. You can do this by taking screenshots of user logs or logins by unknown devices. While this won’t prove that it was the abuser accessing your accounts, if you can provide additional evidence or testimony in court, the judge might believe that the abuser was more likely than not the person accessing your accounts.
  • Save anonymous messages or messages from unknown senders that you receive via email, text, an app, or on social media. While you may not be able to tie the messages to the abuser directly, other information, such as the content of the message, the actions of the abuser, or another piece of information may be enough to convince the judge why you believe they came from the abuser.
  • Consider the impact of removing or interfering with any hidden cameras, recording devices, air tags, or GPS trackers you find. Removing it could not only affect your safety if the abuser knows that you found it, but also it could impact your ability to document their existence. You could take a picture of the monitoring device or tracker where you found it and even consider asking the police to document the evidence before removing it. You may want to work with a domestic violence advocate to think about how removing the equipment may impact your safety and create a safety plan accordingly. Additionally, if you believe the abuser has remote or physical access to your device, you will want to be careful how you collect evidence from the device and not do any Internet searches on the device regarding documenting evidence or presenting it in court. Those types of searches could instead be done on a computer at a public library, community center, legal help center, or domestic violence advocacy program. Domestic violence programs may also be able to help you set up safe accounts for court-related communication and to safety plan around the abuser’s access.