Victims are encouraged to safely gather and preserve the following information, where possible, before or during an investigation:
-
-
Screenshots of messages, emails, chats, social media posts, or threats, including visible dates, times, and usernames
-
URLs or links to abusive profiles, posts, websites, or advertisements
-
Email headers, sender addresses, and subject lines for suspicious or threatening emails
-
Copies of images or videos involved in abuse, stored securely without editing
-
Transaction records, payment requests, bank statements, or proof of financial demands
-
Phone numbers, email addresses, usernames, and platform names used by the perpetrator
-
A short timeline describing when the abuse started, how it escalated, and key incidents
-
Any prior reports made to platforms, service providers, or law enforcement, including reference numbers
-
Details of known relationships to the perpetrator, if applicable
-
Victims should avoid confronting the perpetrator once evidence is secured and should not delete content, even if it is distressing. Preserving original data helps ensure evidence remains usable and credible.
If safety is a concern, evidence should be collected discreetly and stored on a secure device or trusted cloud account.
