Once you have captured all of the evidence you wish to preserve, it is important to keep the saved files in a safe place. File storage options will depend on what storage methods you and your perpetrator can access. When considering where to store your evidence, it is important to assess any risks to your safety. For example, your safety may be at risk if the perpetrator still lives with you and is able to access your smartphone, uncovers saved recording, or has your login ID and password to an email address or cloud storage account where you were planning to store the evidence.
If you would like to learn more about creating a technology safety plan, connect with your local anti-violence organization (more information below) or see BCSTH’s “A guide for Canadian women experiencing technology-facilitated violence: Strategies for Enhancing Safety.”
Before you back up and store evidence, always think through any potential risks to your safety. This is especially important if there is a risk that the perpetrator is monitoring the activities on your device.
This could be happening in several ways
If you suspect that the perpetrator has access to your devices, accounts, or files, you will need to make a plan on how to avoid detection when collecting evidence. This is both to protect you from additional abuse and to avoid the risk of the perpetrator deleting important evidence.
Look at your account settings on your email, social media and other accounts to see what devices are connected and disconnect them from the account if it is safe to do so. You can also check to see what IP addresses are being used to look at your account. If you see an unusual IP address accessing your accounts, this may be important evidence that the perpetrator is accessing your accounts without consent.
Consider password safety and the importance of changing passwords on all relevant platforms and devices. If you have any concern that your device(s) may be infected with spyware, plan how to change passwords without alerting the perpetrator. Anti-violence advocates will assist you with safety planning and technology use.
You may also need to consider alternative ways to preserve evidence, some of which can be found in this toolkit.
Depending on the device you are using, video screen recordings, videos, photos, screenshots and audio recordings will automatically be saved in your photo album, gallery, hard drive or audio files.
Once you have preserved all of the information you need, keep the saved digital files in a safe place. File storage options will depend on your circumstances. For example, your safety may be at risk if the perpetrator still lives with you and is able to access your smartphone and uncovers the saved recording.
If you cannot keep the digital evidence on your device for safety or other reasons, transfer the file elsewhere (see below) and delete the file from the device. Once deleted, remove any “recycle bin” copies made. Some devices like Apple iOS store deleted photos and videos in a “Recently Deleted” album for 30 days, or until actually removed from the device. Navigating to this album and overriding it to delete photos and videos can be an important part of a safety plan.
Storing digital evidence on an external storage device like a USB memory stick or external hard drive can be a good alternative to storing it on your device. This process involves transferring the recordings off of your smartphone and onto another device. This process might require specific chords and adapters to transfer the files from one device, such as a smartphone, to another, such as a computer or USB. Check your device to see what is needed to transfer files from your smartphone to an external hard drive or USB memory stick. iPhones, for example, may need specific apps and adapters to transfer files from the smartphone to the USB memory stick. Most Android devices require the same connectors as your phone uses.
#TechSafetyTip: It is best to transfer the audio file as few times as possible in order to minimize questions about the authenticity or copying of your recording.
#TechSafetyTip: Keep a record of the times and ways you transferred the recording from one device to another.
Storing digital evidence in an online cloud storage solution like Dropbox, Google Drive, iCloud or others can be a good option if having a physically saved copy is too high a safety risk. Even if you have a hard copy of the evidence, it is worth saving a second backup copy. This option can also be simpler than external storage options and would remove the need to purchase any other devices or adapters.
Many cloud storage providers offer free trial plans that are limited in storage. Despite being limited in size, in most cases, these services offer enough storage to preserve digital evidence.
Some example services are:
Storing digital evidence in a cloud storage service can be beneficial for women who are still residing with their abuser; however, there are safety risks when accessing cloud storage services that necessitate developing a safety plan for the use of this storage method.
The following are cloud storage safety planning considerations:
In many app stores, there are apps commonly referred to as “decoy apps.” These are file storage apps designed to avoid suspicion by pretending to be different apps completely.
A common example is a calculator decoy app. This app works exactly like a traditional calculator. But, type in a special code like “36x%29=”, and it will open a file folder within the app to save pictures or videos.
It is important to note that files stored in the decoy app are still stored on the device, although hidden. There are ways to determine if a device contains a decoy app and if a device is being monitored by stalkerware, the perpetrator will have access to everything on your phone and will be able to see that you have a decoy app.
For more information about technology safety planning, see BCSTH’s A Guide for Canadian Women Experiencing Technology-Facilitated Violence: Strategies for Enhancing Safety.
For more information about stalkerware, see BCSTH’s information sheet on Mobile Spyware.
If you are unsure how to preserve evidence of technology-facilitated violence, contact an anti-violence program in your area for support and to develop a safety plan that includes technology safety considerations. Legal advocates available in BC communities may be able to assist.
BC anti-violence programs and legal advocates:
 In this toolkit we will be using the term “woman”, “violence against women” and feminine pronouns for simplicity and to recognize the significant impact technology-facilitated violence has on women and girls. Women and girls face higher rates of most forms of technology-facilitated violence. They also experience some of the most serious consequences as a result of this violence. However, technology-facilitated violence impacts transgender, non-binary, male and female people. We hope that all people impacted by this violence will find these documents useful.
Technology Safety Project
This document is a part of a series that details how to preserve evidence related to the misuse of technology in experiences of domestic violence, sexual assault, and stalking. The series is part of the Preserving Digital Evidence of Technology-Facilitated Violence Toolkit. This document, or any portion thereof, may be reproduced or used in any manner whatsoever as long as acknowledgment to the BC Society of Transition Houses is included in the product.
This document was published March 2021.