evidence

Types of Safe Documentation Methods

Comparing journals, apps, cloud tools, and printed logs for safety and privacy.

evidencedocumentation
This information is for education only. It is not legal, medical, or emergency advice.
SAFETY TOOLS

Types of Safe Documentation Methods

Overview: Comparing Documentation Options

This page outlines several options for storing notes, screenshots, and other records related to relationship harm. Each method has different benefits and risks, especially if someone else has access to your devices, accounts, or home.

Consider how closely the other person monitors your devices, accounts, and physical space when choosing any documentation method.

Key Questions Before You Choose a Method

Paper Logs

Paper logs include handwritten notes, printed emails or messages, and physical copies of photos or records.

How Paper Logs Work

Advantages of Paper Logs

Risks and Limitations of Paper Logs

Ways to Make Paper Logs Safer

Encrypted Apps

Encrypted apps include secure note apps, password managers with secure notes, or messaging apps with end-to-end encryption that you use for self-notes.

How Encrypted Apps Work

Advantages of Encrypted Apps

Risks and Limitations of Encrypted Apps

Ways to Make Encrypted Apps Safer

Cloud Backups

Cloud backups store files, photos, and notes on remote servers accessible through the internet using an account login.

How Cloud Backups Work

Advantages of Cloud Backups

Risks and Limitations of Cloud Backups

Ways to Make Cloud Backups Safer

Email-to-Self

Email-to-self means sending emails to your own email address (or to a trusted person) with descriptions, attachments, or photos as a way to timestamp and store records.

How Email-to-Self Works

Advantages of Email-to-Self

Risks and Limitations of Email-to-Self

Ways to Make Email-to-Self Safer

Hidden Folders on Devices

Hidden folders include disguised folders, “hidden” photo albums, or buried directories on a phone, computer, or tablet.

How Hidden Folders Work

Advantages of Hidden Folders

Risks and Limitations of Hidden Folders

Ways to Make Hidden Folders Safer

Choosing and Combining Methods

Many people combine several methods to balance ease of use and safety. For example:

Comparison Checklist

Periodic Review Steps

Recommended Articles