Key points
- A record of emotional abuse matters for legal proceedings, protection order applications, and your own clarity about what has happened.
- Emotionally abusive messages include gaslighting, threats, demeaning language, isolation tactics, and coercive demands.
- Record messages in full — exact words, timestamps, platform — and make contemporaneous notes about context.
- Store records securely off any shared device or account; keep copies off-site with a trusted person or your lawyer.
- An automatic archive built into your communication channel is the most reliable long-term approach.
One of the most challenging aspects of emotional abuse — particularly when it occurs through digital communication — is that it can be easy to doubt your own experience of it. Gaslighting, in particular, is designed to make you question your perception of events. Keeping a record is not just useful for legal purposes; it also serves as a clear-eyed anchor to what actually happened.
This guide explains what counts as emotional abuse in written communications, how to document it properly, how to keep that documentation safe, and how to use it in legal and protective proceedings.
Why documentation matters
A documented record of emotional abuse serves several purposes:
- Legal proceedings. In family court, property matters, and protection order applications, evidence of a pattern of abusive behaviour can be decisive. Courts look at the overall picture rather than single incidents.
- Protection orders. Applications for AVOs, Intervention Orders, and similar orders are substantially strengthened by documentary evidence showing the course of conduct.
- Your own clarity. When you are in the middle of an abusive situation — particularly one that involves gaslighting — a written record of what was actually said is an anchor to reality. It makes it harder for the behaviour to be denied or minimised.
- Decision-making. Having a record allows you, your lawyer, or a support service to assess the situation objectively and advise you accurately on your options.
What counts as emotional abuse in messages
Emotional abuse through written communication can take many forms. Courts and legal professionals generally look for patterns rather than isolated incidents. Common forms include:
Gaslighting
Messages that deny events you know occurred, contradict a clear shared record, question your memory or sanity, or reframe your reasonable reactions as evidence of your instability. Example: "You're imagining things again" or "That never happened — you need help."
Threats
Threats to harm you, to take children, to damage your reputation or financial situation, to leave at a critical time, or to expose personal information. These may be direct or implied.
Demeaning and humiliating language
Insults, put-downs, name-calling, mockery of your appearance, abilities, or character. This includes language designed to undermine your confidence and make you feel worthless.
Isolation tactics
Messages that instruct you to cut off family or friends, that monitor or demand to know the details of your social life, or that threaten consequences if you spend time with certain people.
Coercive control
Messages that control your movements, your finances, your social life, or your parenting decisions. This includes financial threats, monitoring your location via messages, and demands for constant contact or reporting.
The pattern over time matters as much as the content of any single message. A single insulting message, while unpleasant, is not necessarily evidence of emotional abuse. A year of systematic demeaning, threatening, and isolating communication is.
How to record it properly
Documentation is only valuable if it's done properly. There are two components: preserving the original messages, and making contemporaneous notes about context.
Preserving original messages
- Keep messages on the device that received them. Do not delete anything, even messages that are embarrassing or that show you responding emotionally.
- Back up your device regularly using a secure backup service that is not accessible to the other person.
- For messaging apps, use the app's export or backup function to create a complete export of the conversation thread.
- Take screenshots as a secondary backup, but don't rely on them as the primary record. Screenshots can be challenged; original data is stronger.
- Note the platform, the date, and the time for each significant message.
Contemporaneous notes
For incidents that don't occur in writing — phone calls, in-person conversations, behaviour at changeovers — make a note as soon as possible after the event. Include:
- Date and time
- What was said or done, as accurately as you can recall
- Who was present
- How you responded
- How you felt and any physical impact (difficulty sleeping, anxiety attacks)
Secure storage
Where you store your documentation matters. If the other person has access to your devices or accounts, records stored there are not safe.
- Use an account they don't know about. A personal email address with a strong, unique password that has not been shared. Forward records there.
- Store on a device they don't have access to. If you share a household, consider keeping records on a device that stays with you or with a trusted person.
- Keep a copy off-site. With a trusted friend, family member, or your lawyer. A printed copy of key communications is a useful backup.
- Change passwords. On all accounts you use to store or communicate about this documentation, use unique passwords. Enable two-factor authentication where available.
What not to do
- Do not edit or curate the record. Provide your lawyer with the complete, unaltered history — not a selection of the worst incidents. Context matters, and the overall pattern is what courts are interested in.
- Do not share records publicly. Social media posts about ongoing legal matters can damage your case and create separate legal liability.
- Do not attempt to access the other person's accounts or devices. Any evidence obtained this way may be inadmissible and could expose you to criminal liability.
- Do not respond emotionally to messages you're documenting. Your responses are part of the record too. Calm, factual, or no response preserves your credibility.
Using records in proceedings and applications
When you've built a thorough record, speak with your lawyer about how to use it. They will advise on what to include in an affidavit, how to tender messages as evidence, and what additional evidence (witness statements, medical records, police reports) would strengthen your position.
For protection order applications, a documented pattern of behaviour over time is central to most successful applications. Courts look for a course of conduct — not a single incident — when assessing whether coercive control or emotional abuse meets the legal threshold.
In family court parenting matters, evidence of behaviour that affects the children's wellbeing (including witnessing abusive communication directed at the other parent) is directly relevant to parenting order decisions.
Resources and support
| 🇦🇺 Australia | 🇺🇸 United States | 🇬🇧 United Kingdom |
|---|---|---|
|
1800RESPECTNational counselling for people experiencing emotional and psychological abuse (1800 737 732)
eSafety CommissionerGuidance on documenting technology-facilitated emotional abuse and coercive control
National Legal AidFind free or subsidised legal help for family, civil and criminal matters anywhere in Australia
Beyond BlueMental health support for people experiencing the effects of emotional abuse
|
National Domestic Violence HotlineSupport for emotional abuse and guidance on documenting patterns of behaviour (1-800-799-7233)
RAINNResources for people experiencing abuse including emotional and psychological harm
loveisrespect.orgGuidance on identifying and documenting abusive relationship patterns
National Center for Victims of CrimeResources on coercive control and emotional abuse documentation
|
RefugeSupport for emotional abuse including coercive control (0808 2000 247)
Women's AidGuidance on coercive control, emotional abuse and documenting patterns
MindMental health support for people experiencing psychological abuse
Citizens AdviceInformation on coercive control law and your legal options
|
Frequently asked questions
How do I document emotional abuse for court?
Keep original messages with full metadata, make contemporaneous notes about incidents (date, time, what was said, context, your response), store everything securely off any shared device or account, and avoid deleting anything even if it's distressing. Provide a complete and unedited record to your lawyer, not a curated selection.
What counts as emotional abuse in a text message?
Emotionally abusive messages typically include gaslighting (denying events you know occurred, questioning your memory or sanity), threats (to harm you, leave, take children, damage your reputation), demeaning language (insults, put-downs, humiliation), isolation tactics (threats or instructions to cut off family or friends), and coercive demands. The pattern over time matters more than any single message.
Is text message evidence of emotional abuse enough for a protection order?
Text message evidence can be sufficient to support a protection order application, particularly when combined with a documented pattern over time. Courts look at the overall course of conduct rather than isolated incidents. A comprehensive archive showing repeated patterns of controlling, threatening, or demeaning messages is more persuasive than a few selected examples.
Can I record phone calls as evidence of emotional abuse?
In Australia, the legality of recording calls varies by state. In some states, you can record a call you are a party to without informing the other person; in others, consent is required. Speak with a lawyer before recording calls for use as evidence, as illegally obtained recordings may be inadmissible and could expose you to legal liability.
How do I keep my documentation safe?
Store records off any device or account that the other person has access to or may have accessed in the past. Use a personal email account with a strong password that has not been shared. A cloud backup on a secure account is useful. Also consider keeping a printed copy in a location outside the home — with a trusted friend, family member, or lawyer.