Your safety first
If someone monitors your devices or accounts, take a few minutes to read this before you begin. These steps take less than 10 minutes and make a real difference.
Need to leave this page quickly?
Every page on Evidence Companion has a Quick Exit button in the top right corner. One tap navigates you away immediately. You can also close the browser tab at any time — nothing is stored on your device.
Evidence Companion uses magic links — it sends a sign-in link to your email each time you log in. If someone has access to your email, they can access your account. Create a new private email before you register.
We recommend Proton Mail
Free, end-to-end encrypted, no phone number required, and based in Switzerland. You can create an account in under two minutes at proton.me.
Use a username that does not include your real name. Skip the phone number — it is optional.
Once you have a private email, use that address — and only that address — to sign into Evidence Companion.
Private or incognito mode prevents your browser from saving your history, search queries, or autofill data for this session. When you close the window, the session disappears entirely from your device.
Chrome
Ctrl + Shift + N
(Mac: ⌘ + Shift + N)
Firefox
Ctrl + Shift + P
(Mac: ⌘ + Shift + P)
Safari
File → New Private Window
(⌘ + Shift + N)
On mobile: tap the tab icon in your browser, then look for "Private" or the incognito icon.
Even with private browsing, the device itself matters. Use the safest option you have access to.
Public library computer
No installed monitoring software, automatically clears sessions. Use private mode. Log out of everything before you leave.
A trusted friend's device
Use a phone or laptop from someone the other person cannot access. Use private mode and log out when done.
A work device
A work computer or phone the other person cannot access is often a good option. Be aware that employer IT policies may log activity — use your judgment.
Spyware or stalkerware can monitor everything you do on a device — keystrokes, screenshots, messages, and browsing. Signs your device may be compromised:
If any of this applies: Do not try to remove the software from your device — this may alert the person monitoring you. Instead, switch to a different device entirely for anything related to this situation.
Your records are stored securely on our servers — not on your device. Closing the browser tab or navigating away leaves no trace on the device you are using, as long as you use private/incognito mode.
What is stored on our servers
What is NOT stored on your device
Your records are private — only you can access them unless you choose to share a link. See below for how link sharing works.
You can share read-only access to your case with an attorney, prosecutor, or advocate. Here is exactly what that means:
Read-only. The person you share with can view your case — they cannot edit, delete, or add anything.
Revocable at any time. You can revoke a link instantly from your case page. Once revoked, the link stops working immediately.
Expires on a date you set. You choose how many days the link is valid. It expires automatically after that.
You can see who accessed it. Your case page shows how many times a link was opened and when it was last accessed.
If you have followed the steps above — private email, private browser, safe device — you are ready.
Begin your record →Need crisis support right now? Emergency & crisis resources →