Evidence & Documentation Checklist
Guidance on documenting abuse safely, including what to record, how to store it, and how to stay within the law.
Evidence & Documentation Checklist
Before You Start
This checklist is general information, not legal advice. Laws about evidence, privacy, and recording can be very different depending on where you live.
You may want to speak with a local legal or advocacy service before recording conversations or sharing documentation, especially if you are unsure about the law in your area.
You can also explore additional support options through resources listed at DV.Support.
What to Document
You do not have to collect everything on this list. Choose what feels manageable and safest for you.
1. Incidents and Patterns
- Incident log or journal
- Date and approximate time of the incident
- Location (home, car, workplace, public place, online)
- Who was present (adults, children, pets, neighbors, coworkers)
- What was said or done, in your own words
- How it affected you (injuries, fear, loss of sleep, missed work)
- Any property damage or threats (to you, children, pets, or others)
- Pattern notes
- Escalation before or after specific events (payday, visits, court dates, alcohol use)
- Times of day or places where it tends to happen
- What the person does afterwards (apologies, blame, denial, promises)
2. Digital Evidence
- Texts, messaging apps, social media
- Threatening, harassing, or controlling messages
- Demands for passwords, location sharing, or constant check-ins
- Evidence of stalking, monitoring, or impersonation
- Messages breaking court orders or agreements
- Call logs and voicemails
- Repeated missed calls or hang-ups
- Threatening or abusive voicemails
- Calls made in breach of “no contact” rules (if in place)
- Emails
- Harassment, intimidation, or threats
- Attempts to pressure or manipulate you
- Evidence of financial control (demands for money, access to accounts)
3. Physical Evidence
- Photos or videos
- Visible injuries (bruises, cuts, swelling) at different stages of healing
- Property damage (broken doors, holes in walls, smashed items)
- Disordered rooms or signs of forced entry
- Stalking or tracking devices you discover
- Objects and items
- Written notes, letters, or cards that include threats or harassment
- Gifts used to pressure, control, or “buy back” forgiveness
4. Financial and Practical Evidence
- Money and accounts
- Bank statements showing unusual withdrawals or transfers
- Records of withheld wages or benefits
- Proof of accounts opened or closed without your consent
- Demands for receipts or extreme monitoring of your spending
- Bills and services
- Utility bills disconnected or unpaid to punish or control you
- Phone plans changed or cancelled without your agreement
- Evidence of debt taken out in your name
- Work and education
- Records of missed work, class, or performance issues linked to the abuse
- Emails or notes from employers or teachers documenting concerns
5. Health and Professional Records
- Medical and health
- Emergency room and doctor visit summaries
- Photos and descriptions taken by medical staff (when possible)
- Notes about how injuries occurred (using your own words)
- Records of anxiety, depression, sleep issues, or other health impacts
- Counseling and support services
- Appointment dates and attendance
- Any letters or documentation you are given (if you choose to request them)
- Police and legal
- Police report numbers and dates
- Copies of any statements you provided (if available)
- Court orders, such as restraining or protection orders
- Any breaches of those orders (with dates, times, and descriptions)
Storing Documentation Safely
How and where you store evidence can affect both your safety and how useful the information is later. You can choose the methods that feel safest for your situation.
1. General Safety Considerations
- Consider how closely the person monitors your phone, devices, mail, or movements.
- Think about whether they know your passwords or can guess them easily.
- Decide if it is safer to store some things outside the home or on a separate device.
2. Paper Records
- Keep copies of important documents (ID, children’s documents, court orders, financial records) in a discreet folder.
- Store them in a place the person is less likely to search, such as:
- At a trusted friend or family member’s home
- In a workplace drawer or locker (if allowed and safe)
- In a small, clearly labeled folder that does not attract attention
- Consider making photocopies or scanned versions in case originals are destroyed.
3. Digital Storage
- Separate accounts
- Use an email account the person does not know about, if safe for you.
- Avoid using obvious usernames or passwords related to your name or life.
- Backups
- Save copies of screenshots and photos to a secure cloud account (if safe).
- Or transfer copies onto a USB drive or external device stored outside the home.
- Phone safety
- Regularly delete items from the “recently deleted” or “trash” folders if you are worried about discovery.
- Be cautious with password managers or shared devices that may sync data automatically.
4. Organizing Your Records
- Use simple categories such as “Texts,” “Photos,” “Money,” “Medical,” and “Police.”
- Rename files with:
- Date (YYYY-MM-DD)
- Short description (“2025-03-10-broken-door.jpg”)
- Keep a brief summary page or note:
- Key dates (first incident you remember, major escalations, police reports, court dates)
- Names and contact details of professionals involved (if you want to keep this)
When to Share Documentation
You control if, when, and how you share evidence. You can choose to share only parts of it, and you can change your mind later.
1. Situations Where Sharing May Help
- Seeking protection or safety measures
- Applying for a protection or restraining order
- Requesting safety planning help from a support service
- Criminal or family court processes
- When reporting to police or giving a formal statement
- During child contact, custody, or divorce proceedings
- Work, school, or housing
- Explaining safety needs or absences to an employer or school
- Requesting security measures from a landlord or housing provider
2. Questions to Ask Yourself Before Sharing
- What do I want to achieve by sharing this (safety, legal protection, documentation)?
- What is the minimum amount of information I can share to reach that goal?
- Will sharing this increase any risks for me, children, or others?
- Who exactly will see the information, and how will they store it?
3. Who You Might Share With
- Legal professionals, if you choose to seek legal advice or representation
- Police, if you decide to report a crime or follow up on previous reports
- Support or advocacy workers, who may help you organize or explain your evidence
- Trusted friends or relatives, if they are helping you document patterns
Recording Conversations and Local Laws
Recording laws are different in many places. In some areas, only one person in the conversation needs to know about the recording. In others, everyone involved must be told and must agree.
Key Cautions
- In some locations, recording a private conversation without proper consent can be a crime, even if the recording shows abuse.
- Illegally obtained recordings may not be allowed in court, and could cause legal problems for you.
- Laws may be different for phone calls, in-person conversations, and video recordings.
- Laws can also vary between regions, states, provinces, or countries.
Safer Approaches to Consider
- Focus on written and digital evidence that is clearly allowed to keep, such as texts, emails, and call logs.
- Write detailed notes right after a conversation or incident while it is fresh in your mind.
- Ask a local legal professional or support worker about recording laws before you start recording conversations.
Keeping the Checklist Manageable
You do not have to do everything at once. You might choose to:
- Start with one type of evidence (for example, screenshots of texts)
- Update an incident log only when something major happens
- Ask a trusted person to help organize or store documentation, if that feels safe
Documentation is one tool among many. You can use as much or as little of this checklist as fits your situation and safety needs.