A | B | C | D | E | F | G | H | I | |
---|---|---|---|---|---|---|---|---|---|
1 | Go to File → Make a Copy to save this template to your Google Drive If you are being stalked, it is important to keep a log or record of your stalker’s unwanted behavior and any other relevant incidents. This includes descriptive text and screenshots, photos, and any visual evidence. Even if you haven’t been keeping a log, it’s not too late to start now. Here is our guide to help you remember what to record in your log and how you can use it to help keep yourself and your community safer. Save this log in a place that is secure but where you can access it quickly. Take notes as soon as you can to write down as much detail as you remember. The safest way to store anything digitally, including this log, is by using a secure, unique password for each site (with help from a free password manager like LastPass) and setting up two-factor authentication for your email, social media, and other potentially sensitive accounts. If you keep a hard copy, we recommend keeping it tucked away in a folder in a safe spot that's out of your way but that you'll remember. Tell someone close to you who you trust or an advocate where it is, and consider making copies or scanning it in from time to time in case it gets misplaced or damaged. Always log unwanted behavior, no matter how big or small seems. Small gestures repeated over time create a pattern that you’ll want to have documented. Examples of behavior that should be included on the log are texting or calling repeatedly; showing up where you live or work; sending letters, flowers, or gifts; suspected tracking your location; suspected hacking into any of your accounts; threatening you or someone you know; and anything else that makes you feel uneasy, unsafe, or afraid for your well-being. Friends, family, or a trained advocate can help you keep and organize the log and unwanted communication or contact. Documenting every incident can take time and significant emotional energy; ask for help so you do not have to do it alone. Make sure someone you trust knows where your log is kept. Exclude sensitive information you do not want your stalker to ever see. If you ever use the log as evidence in court or the stalker somehow gains access to it, you don’t want to inadvertently share additional private information. Recording incidents of unwanted contact can help keep you safe. These logs can be useful for protection order applications, divorce settlements, custody hearings, legal action, and other cases where you may want to report repeated unwanted contact. They will also help improve stalking statistics which can lead to policy change. | ||||||||
2 | |||||||||
3 | |||||||||
4 | |||||||||
5 | |||||||||
6 | |||||||||
7 | |||||||||
8 | |||||||||
9 | |||||||||
10 | |||||||||
11 | |||||||||
12 | |||||||||
13 | |||||||||
14 | |||||||||
15 | |||||||||
16 | |||||||||
17 | |||||||||
18 | |||||||||
19 | |||||||||
20 | |||||||||
21 | |||||||||
22 | |||||||||
23 | |||||||||
24 | |||||||||
25 | |||||||||
26 | |||||||||
27 | |||||||||
28 | |||||||||
29 | |||||||||
30 | |||||||||
31 |