Domestic assault cases often begin with phone calls or text messages. In Canada, the rise of digital communications means police, prosecutors and defence lawyers frequently review screenshots, message threads and other electronic records. Survivors wonder whether texts will prove abusive behaviour; accused individuals worry that a hurried reply will be taken out of context.
This guide answers the question: can text messages be used as evidence in Canadian domestic assault cases? It explains the legal framework governing electronic documents, shows how courts authenticate texts and screenshots, and offers practical tips on preserving digital proof while respecting no‑contact orders and bail conditions.
Understanding the Legal Framework for Digital Evidence in Canada

Canada Evidence Act: What Counts as an Electronic Document
Canadian courts rely on the Canada Evidence Act (CEA) to determine whether a digital record can be admitted. Section 31.8 defines an “electronic document” broadly as data recorded or stored on any medium that can be read by a person or computer; the definition expressly includes display or print‑outs of that data. This means text messages, emails, social‑media posts, voicemails, photographs and screenshots fall within the legal definition of an electronic document.
Under section 31.1 of the CEA, anyone seeking to admit an electronic document must prove its authenticity by evidence capable of supporting a finding that the record is what it purports to be. This requirement is modest; courts describe the threshold for authenticity as “low” or “modest”. A witness can authenticate a screenshot or text conversation simply by testifying that they sent or received the messages.
Section 31.2 sets out the best‑evidence rule for digital records. The rule is satisfied if the party proves the integrity of the system that recorded or stored the document or if an evidentiary presumption applies. Even print‑outs of electronic documents are acceptable: subsection 31.2(2) states that a print‑out satisfies the best‑evidence rule if it has been consistently used as a record of the information.
In practice, courts will admit text messages and screenshots once a witness explains what they are and how they were obtained; challenges about accuracy or alterations go to the weight of the evidence rather than admissibility.
Authentication, Integrity, and Reliability
Canadian courts treat digital evidence much like other documents. In R v S.M. (2025 ONCA 18), the Ontario Court of Appeal held that to authenticate an electronic document under section 31.1, it is sufficient to have evidence capable of supporting a finding that the document is what it claims to be. The court emphasised that authentication does not require independent witnesses; in that case, the complainant’s testimony was enough to authenticate a Snapchat screenshot. Similarly, in R v S.P. (2025 ONCA 601) the court held that the complainant’s evidence that a screenshot accurately depicted text messages with the appellant satisfied the low threshold.
However, authenticating a digital record does not prove its authorship or truth. Courts evaluate the reliability of text messages by considering context, metadata and corroborating evidence. The Criminal Law Notebook explains that authentication is a threshold issue; it simply allows the document to be considered. Reliability is assessed later, taking into account whether the messages could have been altered or who actually sent them. In R v Aslami (2021 ONCA 249), the Ontario Court of Appeal cautioned that courts should be careful when messages appear to come from a phone number that is not registered to the accused; judges must consider the risk of fabrication and ensure that the messages are accurately attributed.
The Role of Provincial Evidence Acts and Case Law
While criminal proceedings fall under the federal CEA, provinces sometimes have their own evidence acts for civil and family matters. The Ontario Evidence Act mirrors the federal approach, requiring authentication and integrity but applying it to civil cases. Courts across Canada have recognised that cell‑phone text messages, emails, Facebook messages, 911 recordings and even photographs of chats are electronic documents. Case law demonstrates that digital communication is admissible when the basic statutory requirements are met.
Types of Digital Evidence in Domestic Assault Cases

Domestic assault investigations involve much more than physical injuries. Police and prosecutors often review multiple forms of digital evidence to reconstruct events and assess witness credibility. Common types include:
- Text messages and instant messages: courts consider the full conversation, timestamps, tone and emojis. Messages may show threats, apologies, admissions or patterns of control.
- Emails and social‑media posts: digital trails on platforms like Facebook, Instagram, Snapchat or WhatsApp can illustrate harassment, stalking or attempts to influence the complainant.
- Call logs and voicemails: telephone records show the timing and frequency of contact and may corroborate a complainant’s account.
- GPS or cell‑site data: location information can establish proximity contrary to a no‑contact order or show patterns of stalking.
- Photos and videos: images depicting injuries or property damage can reinforce testimony.
- Smart‑device data: logs from doorbell cameras, wearable fitness trackers or home sensors may record incidents of violence or show patterns of forced entry.
How Text Messages Can Lead to Domestic Assault Charges

Text Messages as Evidence of Communication Patterns
In practice, text messages are most useful when they illustrate the timeline and tone of communication. Texts form part of the disclosure package and can influence bail discussions. They note that messages show timing, reactions and the pace of a conversation. In some cases, a single threatening message may trigger a police investigation or support a charge, but courts require context.
Digital messages can become part of an investigation when:
- The complainant reports the messages: victims may show police threatening or harassing texts to explain their fears.
- Police seize devices under a search warrant: law enforcement may review phone contents and extract messages relevant to the alleged offence.
- Screenshots are shared during disclosure: both Crown and defence counsel receive digital evidence to prepare their cases.
- Other devices capture messages: messages may be visible in backups or synced to tablets, computers or cloud services.
Although text messages can prompt an investigation, messages alone rarely decide a case. The Public Prosecution Service of Canada emphasises that prosecutors must believe there is a reasonable likelihood of conviction before proceeding. Messages contribute to that assessment but are weighed alongside physical evidence, witness testimony, and other digital records.
Importance of Context and Complete Threads
Courts evaluate not just the words but the context of a conversation. Lawyers note that the Crown looks at timing, the full conversation, tone, and details that support or contradict other evidence. Short excerpts may misrepresent meaning; emojis, abbreviations or sarcasm can alter interpretation. The Criminal Law Notebook warns that the probative value of text messages is reduced when exchanges appear truncated or taken out of context. Therefore, parties should preserve full conversation threads, including messages sent before and after the alleged incident, to avoid accusations of selective editing.
How Courts Authenticate and Evaluate Text Messages and Screenshots
Establishing Authenticity
The primary hurdle is proving that the messages are what they appear to be. Courts accept direct or circumstantial evidence: a witness can testify that they sent or received the messages, or the messages can be corroborated by phone records, metadata or other witnesses. In R v S.P., the Ontario Court of Appeal ruled that the complainant’s testimony about a screenshot of a text conversation was enough to meet the low threshold for authentication.
Parties can strengthen authenticity by:
- Providing original devices or downloads: having the actual phone or an unedited export helps demonstrate that the messages were not altered.
- Obtaining metadata: metadata includes timestamps, sender/recipient information, and device identifiers. It helps prove that the messages were created at a specific time and originate from a particular device
- Documenting chain of custody: keep notes of who accessed the device and when.
- Avoiding deletion or alteration: even minor edits can cast doubt on authenticity. Courts may question why certain messages were missing or changed.
Satisfying the Best‑Evidence Rule
Under section 31.2 of the CEA, parties must show the integrity of the system that stored the messages or rely on an evidentiary presumption. Courts presume integrity when the system functioned properly, the document was produced during the usual course of business, or the data was stored by someone not involved in the litigation.
In many cases, presenting a print‑out or screenshot is sufficient: the law states that a print‑out satisfies the best‑evidence rule if it has been consistently relied upon as a record.
Evaluating Reliability and Credibility
Once admitted, the court assesses the weight of the messages. Judges consider whether:
- The sender and recipient are clearly identified: misattributed messages can undermine reliability (as in R v Aslami, where the phone number was registered to someone else).
- The conversation is complete and unedited: missing segments may weaken the probative value.
- The messages align with other evidence: texts that contradict physical evidence or witness testimony may be less persuasive.
- There are gaps or anomalies in timestamps: inconsistent timestamps can suggest that messages were edited or fabricated.
Ultimately, judges instruct juries on how to evaluate the weight of digital evidence; the jury decides whether the messages are convincing.
How to Preserve and Collect Text Message Evidence
Survivors and accused individuals alike should take steps to preserve digital evidence. The BC Society of Transition Houses (BCSTH) provides guidance on collecting digital evidence and notes that digital records should be preserved in multiple formats and stored securely. Key tips include:
- Preserve the original device: if possible, keep the phone intact. Avoid factory resets or software updates that could alter data.
- Export or print messages: take clear screenshots of entire conversations or use messaging apps’ export functions. Print copies for court; printed screenshots are still considered digital evidence.
- Record metadata: where available, note the date, time and phone number associated with each message. Some apps allow users to include metadata in exports.
- Create a digital evidence log: write down when you collected each screenshot and any relevant circumstances.
- Keep multiple backups: store copies on a USB drive, cloud storage and a secure email account to guard against loss.
- Seek legal or technical assistance: consider consulting a lawyer or tech expert to extract data properly. They can help document the chain of custody and prevent unintentional tampering.
Avoid Altering or Destroying Evidence
Destroying or altering digital evidence can harm your case and may lead to additional charges. Defence lawyers warn that panicking and deleting messages may look like an attempt to conceal guilt. Even if a message appears damaging, your lawyer can address it in context; deleting it could be considered obstruction.
Privacy and Legal Considerations
Canadian law prohibits illegally intercepting private communications. If someone installs spyware or secretly records messages without consent, they may be committing an offence. However, courts may still admit illegally obtained digital evidence in certain circumstances if it is relevant and its admission does not bring the administration of justice into disrepute. If you suspect you are being tracked or monitored, consult a lawyer and consider safety‑planning resources.
No‑Contact Orders, Bail Conditions and Texting
What Is a No‑Contact Order?
A no‑contact order is a legal directive prohibiting an individual from communicating with or approaching another person. It can be imposed by police, a judge or as a bail condition. Criminal defence firms notes that these orders ban direct contact (face‑to‑face, texts, calls, emails) and indirect contact (messages sent through friends or social media). No‑contact orders are common in domestic violence cases and aim to protect the complainant and prevent further conflict.
Breaching a no‑contact order is itself a criminal offence. Law firms explains that even a single text or call can lead to immediate arrest and new charges. The order applies regardless of whether the protected person initiates contact.
Bail Conditions and Communicating During a No‑Contact Order
When an accused is released on bail, the court often includes conditions such as “do not communicate directly or indirectly with the complainant.” The non‑profit organisation Steps to Justice advises that, if the complainant calls or texts, the accused must not respond; ignoring all communication is essential to avoid breaching bail conditions. Even if the complainant appears to invite contact, it is the accused’s responsibility to follow the order.
Violating bail conditions by texting a protected person can make it harder to get bail in the future and may result in detention. Accused individuals should immediately inform their lawyer if they receive messages from the complainant and should keep records of such contact without responding.
How Text Messages Influence Bail and Release Decisions
Text messages may be used during bail hearings to argue for or against release. Lawyers review messages to identify patterns of harassment or compliance. If messages show repeated attempts to contact the complainant after being charged, the Crown may argue that the accused poses a risk and should be detained or face stricter conditions. Conversely, a lack of contact or respectful communication may support a less restrictive release.
Practical Pro Tips for Handling Text Message Evidence
The following pro tips summarise best practices for anyone dealing with text messages in a domestic assault context:
- Act quickly: preserve messages before devices are lost or changed.
- Do not edit or filter: avoid cropping, deleting or rearranging messages; present the full conversation to maintain credibility.
- Include timestamps: screenshots should show dates and times to establish a timeline; without timestamps, messages may be less persuasive.
- Capture emojis and tone: emojis can convey sarcasm or emotion; include them to avoid misinterpretation.
- Document chain of custody: note when and how messages were captured and who handled the device.
- Consult a lawyer early: early legal advice helps ensure evidence is preserved correctly and bail conditions are followed.
Need Help?
Facing a domestic assault allegation or wondering how to protect yourself in an abusive relationship? Digital evidence matters, but navigating the law requires experience. Our legal team understands how courts treat text messages, screenshots and other digital records. We can help you preserve evidence, avoid breaches of no‑contact orders and build a strong case. Contact us today for confidential legal guidance.
FAQs
Are text messages enough evidence to convict?
Text messages alone rarely secure a conviction. They contribute to the overall evidence by showing communication patterns, threats or admissions. Prosecutors must still prove guilt beyond a reasonable doubt based on all evidence, including physical injuries, witness testimony and other digital records. The low threshold for admitting messages does not mean they are automatically persuasive; judges and juries assess their weight and reliability.
Can text messages be used in domestic violence cases?
Yes. The Canada Evidence Act explicitly recognises text messages as electronic documents. Courts admit them when the party shows the messages are authentic and relevant. Both Crown and defence counsel often rely on text messages to support their version of events.
Can screenshots of text messages be used as evidence?
Yes. Print‑outs and screenshots are acceptable forms of digital evidence. Section 31.2(2) of the CEA states that a print‑out satisfies the best‑evidence rule if it has been consistently acted on as a record. Witness testimony about the screenshot’s accuracy is usually enough to authenticate it.
Do judges look at text messages?
Judges and juries examine text messages once they are admitted. Judges determine whether messages meet the authenticity and best‑evidence requirements. Jurors then weigh the messages’ significance alongside other evidence.
What information do text messages provide in court?
Messages can reveal timelines, threats, admissions, contradictions, and context. They may highlight controlling behaviour (“coercive control”) or show that the complainant was not fearful. Lawyers review timing, full conversation threads, tone and any gaps or inconsistencies.
How do you authenticate text messages in Canada?
You can authenticate messages by testifying that you sent or received them or by producing the original device and associated metadata. The court only requires evidence capable of supporting a finding that the messages are what they appear to be.
Can deleted texts or social‑media posts be used?
Deleted messages may still be recoverable through forensic analysis or backups. However, retrieving deleted data often requires a warrant and may be complex. If messages were intentionally deleted to obstruct justice, the court may view that behaviour negatively.
What happens if you text during a no‑contact order?
Texting someone you are prohibited from contacting breaches the order. Even if the complainant initiates contact, the accused must not respond. A single text can result in arrest and new charges.
Can text messages be used in family court in Canada?
Yes. In family law cases, text messages may be used to establish patterns of behaviour, coordinate parenting arrangements or show harassment. Provincial evidence acts apply, but the principles of authentication and best‑evidence remain similar.
Disclaimer: The information provided in this blog is for general informational purposes only. It is not legal advice and should not be relied on as such.



