Preserving Digital Evidence via Video Screen Recording
When technology-facilitated violence occurs, maintaining a record of events is important for criminal
and civil legal matters. While screenshots are regularly used in criminal and civil courts as a way to
exhibit and authenticate digital evidence, one of the easiest methods of preserving digital evidence is to
record a video of a smartphone screen.
If your smartphone has the capacity to video screen record, there are some benefits to using the video
record function of your phone for preserving digital evidence, compared to taking screenshots.
Screenshots are easy to manipulate with picture editing software, which may lead to the questioning of
their authenticity. However, printed screenshots are often easier for the courts to view compared to
videos.
Entire text conversations may be lengthy, lasting days or weeks, and require multiple screenshots to
capture the entirety of the exchange. This could potentially lead to a significant number of screenshots
that would need to be organized chronologically, which may take extra effort and time.
The following video screen recording information is for Apple iOS and Android devices of particular
models and is accurate as of July 2020.
Depending what version of a phone you have, it may not have this particular recording function or you
may need to look up different instructions if these ones do not match your current device. It can be easy
to find these types of instructions by searching for them on YouTube. However, remember to use a safe
computer or erase your search history if you are looking up this information as it may trigger additional
abuse from the perpetrator if they discover you are looking for help.
Safety Check
Before you screen record evidence or download a screen recording app, always think through any
potential risks to your safety. There may be a risk that the perpetrator is monitoring the activities on
your mobile device.
This could be happening in several ways. Your smartphone could be monitored if the perpetrator has
access to your device, which could be accessible if you share a home or they have made you share your
passwords with them. If the perpetrator knows your cloud storage (i.e., iCloud, Google Drive, or
Dropbox) ID and password, they will have access to some of your files, photos and videos. It is also
possible for the perpetrator to be monitoring your smartphone or computer via mobile spyware, such as