How to organize evidence for a restraining order
Protection order applications succeed or fail based on how clearly the evidence demonstrates a pattern. Courts don't grant restraining orders based on a single message or a vague description of feeling unsafe. They look for documented incidents - specific dates, specific behaviors, specific words - that together show a pattern of conduct warranting legal protection.
If you're considering a protection order, consult an attorney. This article covers practical approaches to organizing your communication records for that process. It is not legal advice.
What courts look for
Protection order standards vary by jurisdiction, but most courts evaluate the same core elements: a pattern of unwanted contact, specific threatening or harassing behavior, and evidence that the behavior has caused reasonable fear or disruption.
The key word is "pattern." A single aggressive message may not be enough. Twenty messages over three weeks - each one escalating, each one sent after you asked for no contact - demonstrates a pattern that a court can act on.
Your communication records are often the strongest evidence available because they're timestamped, verbatim, and difficult to dispute. The challenge is organizing them so the pattern is visible to someone reviewing the case for the first time.
Gather everything first, organize second
Before you start selecting and arranging evidence, collect every relevant communication record you have. Text messages, emails, voicemail transcriptions, social media messages, messages sent through third parties, messages from alternate accounts. Cast a wide net.
Export full conversation threads rather than individual screenshots where possible. Platform exports (from WhatsApp, iMessage, email clients) include metadata like timestamps and sender information that screenshots sometimes crop out. If screenshots are your only option, make sure each one shows the sender, the date and time, and enough surrounding messages to provide context.
Don't delete anything, even messages that seem irrelevant or that don't support your case. Completeness matters. An attorney may identify relevance that isn't obvious to you, and omitting messages can undermine credibility if the other party produces a more complete record.
Create a chronological incident log
The most effective format for protection order evidence is a chronological incident log paired with supporting documentation.
The log itself is a simple document listing each relevant incident with:
- The date and time
- The communication platform (text, email, Instagram DM, phone call, in-person)
- A brief factual description of what happened
- A reference to the supporting evidence ("see Exhibit 4, page 2")
Keep descriptions factual and specific. "Sent 14 text messages between 11pm and 2am after I asked them not to contact me" is more effective than "harassed me all night." "Showed up at my workplace and sent a message saying 'I see you'" is more specific than "stalked me."
The incident log gives the judge a roadmap. The supporting documents - the actual messages, the call logs, the screenshots - provide the proof.
Organizing the supporting documents
Number your exhibits sequentially and reference them in your incident log. Group them by incident rather than by platform. If a single incident involved both text messages and emails, put them together under one exhibit number so the judge can see the full picture without flipping between sections.
For each exhibit, include a brief cover page or header: "Exhibit 3: Text messages from [phone number], March 14-16, 2026. 23 messages sent after written request for no contact."
Print clearly. If the text in screenshots is small, enlarge it. If messages are in a language other than the court's language, include a certified translation alongside the original.
Documenting patterns across the record
Beyond individual incidents, courts also respond to evidence of escalation and persistence. If you can show that behavior started at one level and intensified over time, that pattern is significant.
Consider highlighting:
- Frequency: How contact attempts increased over a period. "3 messages in January, 12 in February, 47 in March" tells a story.
- Escalation in language: Messages that started neutral and progressed to threatening. Arrange them chronologically so the shift is visible.
- Contact after explicit requests to stop: Any message you sent clearly asking for no further contact, followed by continued contact, is important evidence. Place these prominently in the timeline.
- Use of multiple platforms or accounts: If the person contacted you from new accounts after being blocked, document each platform switch with dates.
Working with an attorney
An attorney who handles protection orders will know what the courts in your jurisdiction require. Some courts want evidence submitted in specific formats. Some have limits on the number of pages or exhibits. Some require declarations under penalty of perjury alongside the documentary evidence.
Bring your organized records to your attorney rather than a pile of unsorted screenshots. The chronological incident log saves billable hours and helps the attorney identify the strongest evidence quickly. They can then advise on what to include, what to leave out, and how to present it for maximum clarity.
If you don't have an attorney, many jurisdictions offer self-help resources through the courthouse or legal aid organizations. Some domestic violence advocacy organizations provide assistance with documentation and filing.
A note on safety
If you're documenting behavior by someone who has access to your devices or accounts, take precautions. Use a device they don't have access to. Store records in an account they can't reach. Be aware that exporting messages or changing account settings may generate notifications.
Your safety takes priority over documentation. If collecting or organizing evidence puts you at risk, talk to an advocate or attorney about safer approaches.
Receipts helps organize message records into chronological timelines with pattern analysis - structuring scattered communications into clear, court-ready documentation.