article

Documenting Patterns of Abuse

A safe, structured way to document behavior.

evidence
This information is for education only. It is not legal, medical, or emergency advice.
Evidence & Documentation

Logs, Screenshots, and Safe Storage

What “Evidence” Can Look Like

In many abusive or harmful situations, keeping some record of what is happening can be helpful later. This is sometimes called “documentation” or “evidence.” It might:

You are never required to collect evidence. You can decide whether it feels safe and useful for you.

If you are worried the abusive person monitors your devices or searches your belongings, you may want to focus first on whether keeping records is safe for you at all.

Understanding Logs

A log is a written record of incidents or patterns over time. It does not need to be perfect or formal to be useful.

What to Include in a Log

You can include whatever feels important. People often find these details useful later:

Simple Log Formats

You can keep a log in ways that fit your life and safety needs, for example:

If you think your phone or computer is monitored, you may want to avoid digital logs on that device or talk with a legal or tech safety expert before creating them.

Using Screenshots

Screenshots can capture what someone sends or posts before it’s deleted or changed. They may be useful if the abusive person uses:

What to Screenshot

You might choose to capture:

Details That Can Make Screenshots More Useful

When safe and possible, try to include:

If you cannot capture everything, even partial screenshots can still be helpful. Do what is realistically safe for you.

Other Helpful Records

In addition to logs and screenshots, other documentation may be useful, such as:

Thinking About Safety Before You Store Anything

Before you keep logs or screenshots, you may want to think through:

If collecting evidence seems likely to increase your risk, it is reasonable to pause or avoid it. Your safety comes first.

Safer Ways to Store Logs and Screenshots

No method is completely risk-free, but some options may be safer than others depending on your situation.

Physical Storage Options

Digital Storage Options

If you use digital storage, consider how much access the abusive person might have to your devices or accounts.

You may want to turn off automatic syncing to shared devices and avoid storing sensitive documentation on any account or device they can see or control.

If the Abusive Person Finds Your Evidence

If you are worried about what might happen if they find your records, it may help to:

You can explore additional support options through resources listed at DV.Support, including organizations that offer legal information and technology safety guidance.

Deciding What Is Right for You

Only you can judge what feels safe and manageable in your situation. You might decide to:

Your choices can change over time as your situation changes. Even small steps, like noting dates of key incidents or saving a few important screenshots, can make a difference later.

Recommended Articles