Intellectual Property Protection: Capturing Online Infringement Evidence
Published April 3, 2026
A competitor launches a website using your registered trademark in their domain name. A manufacturer on an overseas marketplace copies your product photos and packaging. A social media account reposts your copyrighted illustrations without attribution. An app store listing uses your patented feature descriptions nearly word for word.
In every one of these cases, the online content is the evidence. And in every one of these cases, the infringer can take it down, modify it, or move it to a different URL at any moment. For IP attorneys and brand protection teams, the central challenge is not finding infringement - it is preserving it in a form that courts, arbitration panels, and platform enforcement teams will accept.
Types of Online IP Infringement
Intellectual property infringement online takes several distinct forms, each with its own evidentiary requirements:
- Trademark misuse - unauthorized use of your registered marks in domain names, product listings, advertising copy, social media profiles, or metatags. This includes both direct copying and confusingly similar variations designed to divert your customers.
- Copyright violations - reproduction of your original works without permission. This covers everything from product photography and marketing copy to software code, blog content, videos, and design assets. Online copyright infringement is especially common on social media platforms and content aggregation sites.
- Patent-related claims - while patent infringement itself requires analysis of the physical product or software, online evidence is critical for establishing distribution, marketing claims, feature descriptions, and the timeline of when an infringing product entered the market.
- Trade dress infringement- imitation of your product's visual appearance, packaging, website layout, or overall commercial image. Trade dress cases rely heavily on visual evidence showing the similarity between the original and the infringing presentation.
Each type of infringement generates different kinds of online evidence, but they all share one thing in common: the evidence is ephemeral. Web pages change, listings get pulled, and social media posts disappear. If you do not capture the evidence when it exists, you may never get another chance.
Why Timing Matters in IP Evidence Collection
In IP disputes, when infringement occurred is often as important as whether it occurred. Courts need to establish priority - who used the mark first, when the infringing content appeared, how long the infringement persisted, and whether the infringer continued after receiving notice.
A cease and desist letter is only effective if you can prove what the infringer's website or listing looked like before and after receiving it. A DMCA takedown requires proof that the infringing content existed at a specific URL at a specific time. A UDRP domain dispute requires evidence that a domain was being used in bad faith at the time the complaint was filed.
Plain screenshots do not solve this problem. A screenshot file has a creation date set by your local computer clock, which is trivial to change. Courts and panels increasingly require independently verifiable timestamps - proof from a trusted third party that the evidence existed at the claimed time. Without this, opposing counsel can challenge the entire timeline of your case.
What Courts Require for IP Infringement Evidence
Whether you are filing in federal court, submitting to a UDRP panel, or reporting to a platform's IP enforcement team, the evidentiary bar follows a consistent pattern. You need to prove three things about your captured evidence:
- Authenticity - the evidence accurately represents what appeared online. Under FRE 901(b)(9), digital evidence must be authenticated through a process or system that produces an accurate result. A full-page screenshot paired with the underlying HTML source code, the complete URL, and network request logs is far stronger than a cropped image with no metadata.
- Integrity - the evidence has not been altered since capture. A SHA-256 cryptographic hash computed at capture time creates a tamper-evident seal. Any modification to the captured files - even a single changed pixel - produces a completely different hash value.
- Reliable timestamp - the capture time is independently verifiable. An RFC 3161 trusted timestamp from a recognized timestamp authority provides cryptographic proof of when the capture occurred, independent of your local system clock.
Chain of custody also matters. If your evidence passes through multiple hands or systems before reaching the court, each transfer point is a potential challenge. A self-contained evidence bundle - screenshot, source code, hash, and timestamp packaged together from the moment of capture - minimizes custody gaps and simplifies authentication testimony.
Collecting Evidence Across Platforms
IP infringement rarely stays on a single platform. A counterfeiter might list products on Amazon, advertise on Facebook, operate an independent website, and distribute through a mobile app - all simultaneously. Brand protection teams need to capture evidence across every channel where infringement appears.
Each platform presents different challenges:
- Websites- the most straightforward to capture. Server-side capture tools can visit any public URL and produce a complete evidence package. The key is capturing not just the infringing page but also related pages - the about page, contact information, terms of service, and any pages that establish the infringer's identity and business operations.
- Social media - posts, ads, profiles, and stories often require browser extension capture because much of the content is behind login walls. Capture the infringing post, the poster's profile, and any comments or interactions that show distribution reach.
- Marketplaces - Amazon, eBay, AliExpress, Etsy, and similar platforms host millions of counterfeit and infringing listings. Capture the full product listing including images, descriptions, seller information, pricing, and customer reviews. Seller storefronts often reveal the scope of the operation.
- App stores - mobile apps that infringe trademarks or copyrights are listed on the Apple App Store and Google Play Store. Capture the app listing page, screenshots, description, developer information, and version history before filing a takedown.
When infringement spans multiple platforms, your evidence should show the connections between them - the same product images appearing on different sites, consistent seller identifiers, shared contact information. This cross-platform documentation strengthens your case by demonstrating a coordinated pattern of infringement rather than isolated incidents.
Best Practices for IP Evidence Capture
Capture early and capture often
Do not wait until you are ready to file a complaint. The moment you identify potential infringement, capture it. Infringers who receive cease and desist letters frequently scrub their websites before responding. If your only evidence is a letter claiming infringement existed, you have a weak case. If you have timestamped captures from before and after the letter, you have a documented pattern.
Preserve full context, not just the infringing element
It is tempting to zoom in on the specific logo, image, or text that infringes your rights. But courts want context. Capture the entire page. If the infringement is a product listing, capture the product page, the seller profile, the search results page that shows the listing, and the category page. If the infringement is a website using your trademark, capture every page of the site, not just the homepage. Context establishes the commercial nature of the use, the likelihood of consumer confusion, and the infringer's intent.
Establish a monitoring cadence
IP infringement is rarely a one-time event. Infringers who are taken down on one platform often reappear on another. Set up regular capture schedules for known infringers and for searches of your key trademarks and product names. An automated capture API can run these checks on a recurring basis, building a continuous evidence record without manual effort.
Document the infringer's identity
Capture WHOIS records, DNS records, and registration information for infringing domains. For marketplace sellers, capture seller profiles, store pages, and any publicly available business registration or contact details. This information helps identify repeat infringers who operate under multiple names and establishes the factual basis for personal jurisdiction in litigation.
How Snapoena Supports IP Evidence Collection
Snapoena is built for exactly this workflow. Every capture produces a complete evidence package - full-page screenshot, HTML source code, HAR network log, SHA-256 hash, and RFC 3161 trusted timestamp - packaged as a single downloadable evidence bundle.
For brand protection teams monitoring multiple infringers, the Snapoena API enables bulk capture at scale. Submit a list of URLs and receive a complete evidence package for each one. Schedule recurring captures to document ongoing infringement or to verify that takedowns have been honored. Every capture is independently timestamped and hashed, creating an audit trail that maps the lifecycle of each infringement.
For content behind login walls - social media posts, marketplace seller dashboards, private listings - the Snapoena Chrome extension captures from your authenticated browser session with the same cryptographic verification applied to every capture. Your credentials never leave your browser.
International Considerations
Online IP infringement frequently crosses borders. A company in one country may infringe a trademark registered in a dozen others. A website accessible worldwide may violate copyright laws in some jurisdictions but not others. When building an evidence record for international enforcement, several additional factors matter.
Different jurisdictions have different rules for digital evidence admissibility. While RFC 3161 timestamps are recognized under the European Union's eIDAS regulation and are broadly accepted in common law jurisdictions, some countries have specific notarization or certification requirements. Capturing evidence through a standardized, cryptographically verifiable process provides the strongest foundation regardless of jurisdiction, because it produces artifacts - hashes, timestamps, source code - that any technical expert can independently verify.
Geographic capture is also important. An infringing website may serve different content to visitors in different countries, either intentionally or through localization. If you are asserting infringement in a specific market, your evidence should show what users in that market actually see. Document the capture location and note any geo-specific content variations in your evidence record.
The Bottom Line
Online IP infringement is a when, not an if. Every brand, creator, and patent holder will encounter it. The difference between a successful enforcement action and a failed one often comes down to evidence quality - not whether infringement occurred, but whether you can prove it occurred, when it occurred, and that your proof has not been tampered with.
Capture early, capture completely, and capture with cryptographic verification. When the infringing listing gets pulled, the website gets taken down, or the social media post gets deleted, your timestamped evidence bundle will still tell the full story.
Protect your intellectual property with court-ready evidence
Snapoena captures full-page screenshots, HTML source, network logs, SHA-256 hashes, and RFC 3161 timestamps in a single evidence bundle. Monitor multiple infringers at scale with the API, or capture logged-in pages with the Chrome extension.
Get Started Free