search3

Evidence Preservation

View/Download as PDF

  1. First, before you delete anything, or ask anyone else to, be sure to preserve all the evidence! Here is how.

    Technology can be a tool for abuse. But, if you’re savvy, it can also be a great tool for evidence preservation.1 Take the opportunity to turn every harassing email, text, phone call, and website into an exhibit that can be presented as evidence in court, if needed. Here are some ways to preserve evidence:


    • Save the webpages as PDFs.
    • Take screenshots of the pages (and make sure to get the whole page, including the URL and time and date).
    • Print the pages out and store them securely.
    • If the content in question is a video, be sure to download the entire video to a secure hard drive.
    • If you have text messages or email that may be relevant, make sure you save copies of all the messages that might be relevant in a reliable manner.
    • Consider Whether To Include A Litigation Hold Request. If you might need evidence from intermediaries — like websites and email service providers — to unmask an anonymous defendant, you need to ask those online service providers to save that evidence for later use.

    When preserving evidence, do not just preserve evidence that you believe is favorable to you - preserve all evidence that may be relevant to a dispute, including email, text messages, correspondence, documents, photographs, videos, etc. Failure to properly preserve all the evidence — even if you believe it may be negative or unfavorable to you — may result in sanctions or adverse findings against you by a court.

    For evidence you plan to present in support of your complaint, we recommend that you save: (1) a digital copy to a computer file; and (2) a printout to a binder. Take the binder with you when you go to your local police precinct, domestic violence clinic, or family court self-help center to file papers. Your printouts can then be attached to a police report or an application for a restraining order. The more organized you are, the greater the likelihood that law enforcement, restraining order clinics, online platforms, and prospective legal counsel will be able to help you.

    Further reading: Josh Gilliland, The Admissibility of Social Media Evidence, American Bar Association (Winter 2013), http://www.americanbar.org/publications/litigation_journal/2012_13/winter/the_admissibility_social_media_evidence.html, archived at perma.cc/MS7G-L5NK.

    1. See Protecting Domestic Violence Survivors and Children in California: Pro Bono Representation in Low-Income Domestic Violence Restraining Order Cases 2015 (Free), Domestic Violence 101 and Client Interview, Practicing Law Institute (June 2015), http://pli.edu/Content/OnDemand/Protecting_Domestic_Violence_Survivors_and/_/N-4nZ1z12a0o?fromsearch=false&ID=223147, archived at perma.cc/JK8E-VR2D.
    ↑ Back to top
  2. Consider Whether To Include A Litigation Hold Request

    Some people simply want the content taken down, and have no interest in getting a restraining order, filing a criminal complaint, or speaking with a civil attorney.

    If, however, you are considering legal action, you might need evidence from third parties who may have evidence relevant to your dispute. For example, in order to determine and/or prove who the perpetrator is, you may need evidence from intermediaries — like websites and email service providers — used by the perpetrator.

    Intermediaries generally maintain logs of everyone who accesses their systems (for example, to post information or send an email). These logs may contain information that can identify a user or provide other important information, including the date and time a user accessed the site, or the user’s IP address. An IP address is a numerical sequence — like “172.16.254.1” — assigned to every computer connected to the Internet that functions much like a street address or telephone number for the computer to which it is assigned. These addresses are automatically leased to internet users for a period of time by their internet service providers (ISPs). Thus, you can identify an internet user by asking a website for the IP address associated with the content, and then asking the IP address’ owner (the ISP) who it was leased to at the time in question. Generally, websites will not give this type of information out without a subpoena; but even without a subpoena they will likely preserve it for a while if you or your lawyer sends them a hold letter.1

    Unless requested otherwise, intermediaries may not keep data for very long (some may only retain data for a month or two; others longer). At the same time, it may take a while to find the right attorney or the proper detective to investigate your case. So, in many cases, a hold letter may serve to preserve crucial evidence and increase your chance of success at identifying the perpetrator and having necessary evidence to pursue a legal action.

    The litigation hold letter should at a minimum: (1) inform the website that you are considering taking legal action; (2) provide links to the material, and (3) request that the website provide to you now, or, archive and hold all identifying information regarding the party or parties responsible for posting the material, including IP addresses. Here is an example of the type of information one might seek in a litigation hold request in a digital abuse case, seeking to identify an anonymous poster.

    1. Note that although you can generally obtain IP address and other log information with a subpoena, a law called the Stored Communications Act, 18 U.S.C. 121 §§ 2701-2712, may limit your ability to request the contents of communications and/or certain other data. For further reading on the Stored Communications Act, see Orin S. Kerr, A User’s Guide to the Stored Communications Act — and a Legislator’s Guide to Amending It, 72 Geo. Wash. L. Rev. 1208, 1218-20 (2004).
    ↑ Back to top
  3. Use Without My Consent’s Evidence Chart

    To help victims organize their evidence, Without My Consent recommends creating an evidence chart. WMC provides a sample evidence chart below so that you can see what a completed chart looks like. Here are instructions on how to create and fill in your own evidence chart. You can use your evidence chart as the table of contents for your binder. Later, if you are seeking legal action you or your attorney can use this chart and its attachments to create a declaration in support of your claim.

    • Create a six-column chart.
    • Title the columns: 

      1. Date: The date of the event you’re describing. Try to list events in chronological order, so the chart will serve as a timeline of events, as well as a guide to the evidence you are marshaling in support of your claim. Use the chart to tell a story.

      2. What Happened: Describe each item/event briefly, but with enough clarity that someone who doesn’t know much about it can understand it. Don’t use vague descriptions like:

        He’s always texting me.

        Instead, state facts like:

        He sent 7 texts between 10:00 p.m. and 4:00 a.m. The texts say, ‘[quote texts].’ The texts are on my phone, which I’d be happy to make available for the judge to see. Screen shots of the texts are attached as Exhibit A.

        Attach your screen shots and printouts as exhibits to the chart.

      3. Evidence That It Happened
: Identify the evidence that you already have. Is it a screen shot and PDF of a harassing post/email? Is it a voicemail message saved to your phone? Is it a statement you would be willing to make under oath that something happened the way you say it did? Is it a statement that you believe a third party witness would be willing to make under oath? Make high-quality, reliable copies of the evidence (e.g., if a web page make sure to capture the whole page, along with its URL and the date/time you captured it).

      4. Who Do You Think Did It
: For each item, identify the party or parties responsible.


      5. Evidence That They Did It
: Identify why you think this party or parties is responsible for the event listed. List any other contextual clues within the messages themselves that reveal the identity of the sender. For example:

        • Texts display sender’s name and phone number.
        • Ex-partner has threatened me with the photos in the past. For example, [insert specifics].
        • The 4:00 a.m. text message states, “You’ll be sorry.”
        • The photos were posted to a webpage along with comments about me [or our relationship or him] that only he could know. [Insert specifics.]
      6. Evidence Still Needed/Who Has It
: If you believe you will be able to obtain evidence for the items listed in 3 and 5, but do not have it yet, list it here. Describe briefly but clearly what you believe the evidence is, what you believe it will show, and where you think you will be able to obtain it. If you believe a third party may be in possession of important evidence, consider whether you should ask them for it sooner rather than later, or send a litigation hold request, to ensure it is preserved.

    When you reach out for assistance, be prepared to talk about the three most recent incidents of abuse and the three worst incidents of abuse — those may be two separate things. If there are more than three incidents, continue to fill in the Evidence Chart until have documented every incident.

    Evidence Chart

    Download as an empty Word doc file that you can fill in yourself.

    ↑ Back to top