If you are experiencing technology-facilitated violence, you will want to document what is happening to you. This will help you keep a timeline of what has happened, serve as a memory aid and may be used as evidence if you need to go to court. Because websites can be changed, social media content can be deleted, or people can block you and erase relevant evidence, it is important that you document what is happening to you as soon as it occurs. This could include taking screenshots of texts or direct message (DM) conversations, downloading videos or photos posted of you, recording voice memos, or taking notes of reasons why you think someone might be reading your emails or tracking your movements through your devices.
This guide provides you with practical tips on information you should be collecting and how to document and store that information.
When experiencing technology-facilitated violence, it is important to preserve what is happening to you through documentation and to save that documentation in a safe place. Ideally, you will back up the documentation in more than one location, so that if a copy is deleted or lost, you will have an alternative. It can also be helpful to print hard copies of the evidence. If you document the abuse as it occurs and you decide to go to court, you will have evidence of what happened to you in an organized and accessible format.
Document all the information that you have access to of the technology-facilitated violence you are experiencing. This includes noting who the perpetrators involved in the abuse are and your relationship with them, the duration of the abuse (i.e., how often it happens and when it started), the impact of the abuse on your life, and any action you have taken, such as asking them to stop contacting or posting about you. You will also want to keep a log of all of the platforms you communicated on (for example, all of the apps, social media sites, messaging apps, phone numbers, etc.) and all of the devices you use (for example, your laptop, your smart phone, your work computer, etc.).
When you become aware of a harassing or threatening message, photo, or video, your first instinct might be to delete it immediately or report it to get it taken down off of the social media website it was posted on. This is particularly true for nude images that have been posted without your consent. However, even though there is a risk that the content might spread if you don’t take it down immediately, it is important to collect evidence on the post or image before you delete it or report it to the social media company. If you report it to a social media company and it does break their rules or terms of service, they may take it down immediately. Once the content is taken down, you may not be able to prove who posted it or that it was ever posted in the first place. It doesn’t take much time to document the evidence you need, so it is important to do so before deleting it or reporting it to the social media company. See Step 2 for more information about how to document this evidence.
Once you start collecting information, a documentation log will help keep your evidence organized. You may want to include additional comments where you can include any notes, such as witnesses of particular events, conversations you had with people about the abuse, or messages sent to other people about the evidence.
As you are documenting what is happening to you, you will want to think of what information to collect according to the type of violence which is occurring. For example, you will always want to take a screenshot or a video recording of a threatening chat. But that will not be enough to prove what is happening to you. If you decide to report the abuse to the police or start a civil trial, you will need to prove both what happened to you and who did it. You will also want to show who is associated with the account or phone number that sent or posted the harmful content, the time and date it occurred, and other relevant information. Creating a log of what happened to you, with a list of the information you have collected, can be helpful to ensure you have what you need to prove your case in court.
BCSTH has created a Technology-Facilitated Violence Log which can be used as a template to document your experiences of technology-facilitated violence. If it is safe to do so, you can download the PDF template or read the information on our Technology Safety and Privacy Toolkit webpage.
While gathering evidence, keep an updated collection log that includes the following information for each piece of evidence:
This would include the date and time you received threatening messages and the date and time of when you took a screenshot of the messages.
An important contextual detail would be if your ex started sending you threatening messages after you ran into them at the grocery store with your new partner. That detail might not show up in the chat, but may be relevant to your evidence in court.
This may include screenshots of texts or social media posts, emails, or voicemails. Below are examples of how you can document technology-facilitated violence. You will want to save this information somewhere safe, back it up and/or print hard copies of the evidence. It is important to store this evidence somewhere safe. This is especially important if you are worried that the perpetrator has access to your accounts or devices and may be able to delete files or messages from your devices or accounts.
For example, taking a screenshot of the person’s account profile that includes their name, phone number, email address, or photo. If it is not clear from their profile who it is, you should document why you think it is a particular person. For example, if they called you by a nickname they only use to call you, if their identity has been confirmed in a message with a friend, or they said something about you that only they would know.
This could include the screenshots of the perpetrator’s profile with their identifying information, such as photos of them, and a screenshot of the threat that shows the person associated with the profile who made the threat.
This could include things such as changes in your behaviour, having to take time off from work or school, feeling fearful and other emotional reactions, needing to confer with health care providers because of health impacts, limiting or closing your social media accounts, blocking people, impacts on relationships, and financial impacts resulting from purchasing new devices and security programs.
When collecting digital evidence, always remember to collect information related to the person’s account or username. Identifying the perpetrator is important for legal proceedings. This includes the email or phone number associated with the account. If the violence occurred in a group chat, you will want to collect the information about each person in the group. You may also want to save information on who “liked” or commented on the content and what was said. Sometimes only a shortened version of a comment will show up in long group chats, so you will want to make sure you open up each shortened version to show the entire message.
Collect the “metadata” associated with the content as well, including timestamps, IP addresses, hyperlinks, or URLs, wherever possible.
Save a digital copy of your evidence, back it up in a second location, and print out a hard copy to store in a binder. Saving the evidence and storing it in chronological order will help document your case and keep you organized. Proving a pattern of abusive behaviour can be supported by this type of detailed and chronological evidence collection. In addition, having a digital copy available is important as it often contains metadata that can be relevant to your case. For example, the screenshots you take often include a date stamp of when you took it.
Protect your evidence by making multiple copies, saving them in secured digital locations organized by date and time, as well as in a physical evidence binder organized similarly. Make sure to print all pieces of evidence, including images of the webpage where the videos are posted.
If you know or suspect that the perpetrator has the passwords to your accounts, change all of your passwords immediately to a password that the perpetrator would not be able to guess. Changing passwords can be done on your own device, or a device that the perpetrator does not have access to. Some internet browsers, such as Chrome, have a “Save Passwords” function, which can be turned off in the settings. This can prevent your abuser from gaining access to and removing or tampering with your evidence.
After capturing all necessary evidence, you may want to report and remove the content where possible. All popular social media platforms provide a “Report” option. This function should be used to notify the platform of the technology-facilitated abuse, and depending on their content removal policies, can result in the company’s content moderators removing the post. For websites and posts on webpages, you can also submit a removal form to all search engines, such as Google. This won’t take down the website itself, but may remove the content from being searchable through the search engine (Google or Bing). Many of these platforms have content moderation policies that prohibit the posting of non-consensual nude images and other harmful abusive content.
Be aware that once you report the content it may be taken down, so be sure to collect the evidence you need for court before you report the abusive content.
Other Considerations:
In order to introduce digital evidence effectively in court, you will want to ensure that it is in an organized and accessible format.
Call the court ahead of time to find out what programs they have to view, hear, or see your evidence, and to make sure that they have the necessary equipment available in the courtroom. Make sure your evidence is saved in a file format that the court is able to use. Even if you can use a screen, you should still bring four paper copies of documents wherever possible (one for you, one for the opposing party, one for the judge, and one for any witnesses to review while they are on the stand).
For screenshots, you may want to have both printed copies and digital copies saved on a USB. Make sure that the information stored on the USB is compatible with the court’s computer systems.
A variety of organizations have developed their own tool kits or tip sheets related to technology-facilitated violence that you may find helpful. When reading these guides, be sure to note what country or province they were published in. If it is from an organization located in a country or province that you don’t live in, the laws, evidence rules, and court systems may differ from where you live. However, the practical tips on how to preserve evidence will be helpful across jurisdictions.
BC Society of Transition Houses
“Technology Safety”
https://bcsth.ca/projects/technology-safety/
“Tech Safety Toolkit”
https://bcsth.ca/techsafetytoolkit/
New York Cyber Sex Task Force
“Combatting Cyber Sexual Assault Manual” (American laws but good tips on digital evidence preservation)
National Network to End Domestic Violence (USA)
“Legal Systems Toolkit”
https://www.techsafety.org/legal-toolkit
“Documentation Tips”
https://www.techsafety.org/documentationtips/
WITNESS
“Video as Evidence Basic Practices”
https://www.witness.org/portfolio_page/video-as-evidence-basic-practices/
“Basic Practices: Capture, Storing and Sharing Video Evidence” [Appendix B]
https://library.witness.org/product/video-evidence-basic-practices-capturing-storing-sharing/
“Developing a Collection Plan” [Appendix C]
Badass Army
“Get Help”
https://badassarmy.org/gethelp/
National Council of Juvenile and Family Court Judges
“How to Gather Technology Abuse Evidence for Court”
https://www.ncjfcj.org/wp-content/uploads/2018/02/NCJFCJ_SRL_HowToGatherTechEvidence_Final.pdf
Australia’s eSafety Commissioner
“Collecting Evidence of Adult Cyber Abuse”
https://www.esafety.gov.au/report/adult-cyber-abuse/collecting-evidence
“Collecting Evidence of Cyberbullying”
https://www.esafety.gov.au/report/cyberbullying/collecting-evidence
Without My Consent
“Evidence Preservation”
https://withoutmyconsent.org/resources/something-can-be-done-guide/evidence-preservation/
TrollBusters
“Are You Being Harassed Online?”
Endtab.org
“Deepfake Victim Guide”
Global Investigative Journalism Network
“How to Save Evidence and Why It Matters: Part 1”
https://gijn.org/2016/03/07/how-to-save-online-evidence-and-why-it-matters-part-one/
“How to Save Evidence and Why It Matters: Part 2”
https://gijn.org/2016/03/08/how-to-save-online-evidence-and-why-it-matters-part-two/
Law Technology Today
“Six Best Practices for Capturing Social Media for Use as Evidence in the Court of Law”
Cyber Civil Rights Initiative
“Online Removal”: https://www.cybercivilrights.org/online-removal/
Stillio
“How to Archive Website: The Ultimate Guide”: https://www.stillio.com/how-to-archive-website
Technology Safety Project
This document is a part of a series that details how to preserve evidence related to the misuse of technology in experiences of domestic violence, sexual assault, and stalking. The series is part of the Preserving Digital Evidence of Technology-Facilitated Violence Toolkit. This document, or any portion thereof, may be reproduced or used in any manner whatsoever as long as acknowledgment to the BC Society of Transition Houses is included in the product.
This document was published March 2021.
We gratefully acknowledge Suzie Dunn and Rachel Sombach of the University of Ottawa and Kim Hawkins of Rise Women’s Legal Centre for providing expertise and guidance on the creation of this information sheet.
Suite 325, 119 W. Pender St. Vancouver BC V6B 1S5
T: 604.669.6943 or 1.800.661.1040
F: 604.682.6962
E: info@bcsth.ca
(Charitable Number: 135667822 RR 0001)
Website developed by Affinity Bridge.
If you think someone is monitoring your devices, visit this webpage from a computer, tablet or smartphone that isn’t being monitored.
EXIT NOW from this website and delete it from your browser history.