Receipts / Learn / When documentation crosses into surveillance

When documentation crosses into surveillance

There is a meaningful distinction between keeping records of communication that involves you and monitoring someone else's communication without their knowledge. The first is documentation. The second is surveillance. The line between them can feel blurry in practice, but it matters - legally, ethically, and practically.

This article is not a substitute for legal advice. Surveillance and privacy laws vary significantly by jurisdiction, and the consequences of crossing the line can be serious. If you're unsure whether your documentation practices are appropriate, consult an attorney.

What documentation looks like

Documentation, in this context, means preserving records of communications you participated in. You received a text message - you save it. You sent an email - you keep a copy. You were part of a group chat - you export the thread. You had a phone call and followed up with a written summary - you retain that summary.

The defining feature is participation. You are recording exchanges you were a part of, using records that are already in your possession by virtue of having been a party to the conversation.

This is generally straightforward. When you receive a message, that message is on your device. Saving it, exporting it, or backing it up is preserving your own records. You don't need the other person's permission to keep a copy of a message they sent to you, in most jurisdictions.

What surveillance looks like

Surveillance involves accessing, monitoring, or recording communications you are not a party to, or tracking someone's activity without their knowledge or consent.

Examples include: accessing someone's phone, email account, or social media without their permission to read their private messages. Installing monitoring software on someone's device. Reading messages between someone and a third party. Tracking someone's location through their device. Recording conversations you're not part of.

The defining feature is that you are obtaining information you would not have access to through your own participation in the communication.

The gray areas

Several common situations fall into territory that isn't clearly one or the other.

Shared devices. If two people share a tablet, computer, or family account, messages visible on that device may be technically accessible to both parties. Whether accessing them constitutes documentation or surveillance depends on the circumstances, the expectations of privacy, and the jurisdiction.

Screenshots from someone else. If a friend or family member shares screenshots of their conversations with the person you're documenting, you are now in possession of communications you weren't party to. This is different from preserving your own communications, even if the information feels relevant.

Monitoring a child's communications. Parents may have legal authority to monitor their minor children's communications in many jurisdictions. But using access to a child's device to monitor the other parent's communications raises different questions.

Forwarded messages. If someone forwards you a message from a third party, you have a copy of that message. Whether you obtained it through surveillance depends on how and why it was forwarded and what you do with it.

Asking someone to share their conversations. Requesting that a friend show you what someone said about you is different from hacking into an account. But the resulting information is still a third-party communication you weren't part of.

In each of these situations, the relevant questions are: Were you a participant in the communication? Did you obtain the records through means available to you as a participant? Would the other parties expect privacy from you in this context? What does your jurisdiction's law say about it?

Legal considerations

Many jurisdictions have laws specifically addressing unauthorized access to electronic communications. In the United States, the Stored Communications Act and various state laws address unauthorized access to electronic accounts. The Computer Fraud and Abuse Act can apply to accessing devices or accounts without authorization. State wiretapping laws may govern recording of conversations.

In the European Union, GDPR imposes restrictions on how personal data - including communications - can be collected and processed. Other jurisdictions have their own frameworks.

The legal consequences of crossing the line can include criminal charges, civil liability, and - in family court proceedings - adverse credibility findings. Evidence obtained through unauthorized surveillance may also be inadmissible, meaning that even if the content is relevant, the court may refuse to consider it.

Ethical considerations beyond legality

Even when monitoring is technically legal, it's worth considering whether it's appropriate. Documentation serves a specific purpose: preserving an accurate record of communications you were part of, in case that record is needed later. When the purpose shifts from preserving your own records to tracking someone else's behavior, the nature of the activity changes, regardless of its legal status.

Questions worth asking yourself: Am I preserving records of communications I participated in, or am I seeking out communications I wasn't part of? Is this record-keeping proportionate to the situation? Would I be comfortable if the other person knew I was keeping these records? Am I documenting for clarity and potential future need, or am I monitoring out of anxiety, suspicion, or a desire for control?

The last question is worth sitting with. Documentation that is driven by a genuine need for a clear record feels different from monitoring driven by a need to know what someone is doing at all times. Both can look similar in practice - saving messages, checking histories, organizing records - but the motivation and scope are different.

Keeping your documentation within bounds

A few practical principles can help keep documentation within appropriate boundaries.

Document communications you participated in. If you were a party to the conversation, you have a reasonable basis for preserving the record.

Use standard export and backup features. Exporting a conversation from your own messaging app is different from installing monitoring software on someone else's device.

Don't access accounts or devices that aren't yours without permission. Even if you know the password. Even if you previously had permission. Even if you're concerned about what you might find.

Keep records for a defined purpose. If you're maintaining records in case of a legal proceeding, a workplace dispute, or a custody matter, you have a clear reason. If you're compulsively checking and saving someone's messages without a specific need, that's worth examining.

If you're unsure about a specific situation, ask an attorney. The question "Is this documentation or surveillance?" is exactly the kind of question that benefits from professional guidance before you act, not after.

Get early access

Be among the first to use Receipts. We are rolling out access gradually to ensure quality and safety for every user.

No spam. Unsubscribe anytime. Your email is never shared.