How to Document Trademark Infringement on Websites
Published April 2, 2026
Your brand is showing up where it should not be. A website is selling counterfeit versions of your product using your logo. A competitor registered a domain name that is confusingly similar to yours. Someone is using your registered trademark in their meta tags, page titles, or ad copy to divert your customers.
Online trademark infringement is common, and it is growing. But catching it is only the first step. To actually stop it - through a cease and desist letter, a platform takedown report, or litigation - you need documented evidence that proves what was happening, where, and when.
What Counts as Online Trademark Infringement
Trademark infringement on the web takes several forms. The most common include:
- Counterfeit products - websites selling knockoff goods that use your brand name, logo, or packaging to mislead buyers into thinking they are purchasing genuine products.
- Unauthorized use of logos and brand assets - third parties displaying your registered trademarks on their sites to imply endorsement, partnership, or affiliation that does not exist.
- Confusingly similar domains - domain names that incorporate your trademark or a close misspelling of it, designed to capture traffic intended for your site. This overlaps with cybersquatting and may also be actionable under UDRP.
- Keyword and meta tag misuse - competitors embedding your trademark in their HTML meta tags, title tags, or pay-per-click ad keywords to appear in search results for your brand name.
In each case, the infringer is using your mark to create confusion among consumers about the source of goods or services. That confusion is the legal basis for your claim - and your evidence needs to prove it clearly.
Why Proper Documentation Matters
Whether you are sending a cease and desist letter, filing a report with a marketplace like Amazon or a registrar like GoDaddy, or preparing for litigation, the strength of your case depends on the quality of your evidence.
A cease and desist letter backed by verifiable evidence is far more likely to produce results than one with vague claims. Platform abuse teams process reports faster when the trademark violation is clearly documented with URLs, timestamps, and visual proof. And if the dispute goes to court, your attorney needs evidence that is admissible - not screenshots that opposing counsel can challenge as unreliable or manipulated.
The biggest risk is timing. Infringers change their pages. They remove logos, swap out domain content, or take down product listings the moment they receive notice. If you have not already captured the evidence before alerting them, the proof of what they were doing may simply disappear.
The Problem with Regular Screenshots
Most people's first instinct is to take a screenshot on their computer or phone. But regular screenshots carry no proof of when they were taken or what URL was displayed. A screenshot is just an image file - there is nothing stopping someone from editing the page content in their browser's developer tools before capturing it.
Defense attorneys know this. Platform reviewers know this. Judges know this. A bare screenshot with no verifiable timestamp and no chain of custody is easy to challenge and hard to rely on. You need evidence that an independent third party captured, not evidence you generated on your own machine.
Step-by-Step: Building a Trademark Infringement Evidence Package
Follow these four steps to document online trademark infringement in a way that holds up under scrutiny.
Step 1: Capture the infringing website with URL and timestamp proof
Use a server-side capture tool that independently visits the infringing URL and takes a full-page screenshot. The capture must record the complete URL and the exact UTC timestamp directly in the evidence - not in editable file metadata, but embedded in the image itself. A server-side capture eliminates any argument that you modified the page before screenshotting it, because the capture happens on a remote server that you do not control.
Step 2: Capture the HTML source to prove code-level brand misuse
A screenshot shows the visual appearance, but trademark misuse often lives in the code. Your trademark might appear in meta tags, alt text, hidden elements, or JavaScript variables that are invisible to a casual visitor but clearly demonstrate intentional use of your brand. A full DOM capture preserves every element of the page source as a searchable, verifiable record. This is especially valuable when the infringer is using your mark in metadata for SEO purposes - something a screenshot alone would never reveal.
Step 3: Get an RFC 3161 cryptographic timestamp for legal defensibility
A SHA-256 hash of your evidence files - computed at the moment of capture - creates a digital fingerprint. If anyone changes even a single byte of the evidence after capture, the hash will no longer match. Submitting that hash to an independent RFC 3161 Time Stamp Authority produces a cryptographic certificate proving the exact time the evidence existed. This is not your computer's clock - it is a third-party authority whose timestamp is independently verifiable. Courts and arbitration panels treat RFC 3161 timestamps as reliable proof of when digital evidence was created.
Step 4: Download the evidence bundle for your attorney or filing
Once the capture is complete, you need everything packaged into a single, self-contained bundle. The screenshot, the HTML source, the cryptographic hash, the RFC 3161 timestamp certificate, and verification instructions should all be in one downloadable ZIP file. This is what you attach to your cease and desist letter, your platform abuse report, or your court filing. A complete evidence bundle saves your attorney time and gives your claim immediate credibility.
How Snapoena Automates This Workflow
Doing all four steps manually means juggling separate tools for screenshots, DOM capture, hashing, and timestamping - then organizing the results yourself. It is slow, and it is easy to miss a step.
Snapoena handles the entire workflow in one click. Paste the URL of the infringing site, click capture, and Snapoena's server independently visits the page, takes a full-page screenshot with embedded URL and timestamp, captures the complete DOM source, computes a SHA-256 hash, obtains an RFC 3161 timestamp from an independent authority, and packages everything into a downloadable evidence bundle. The whole process takes seconds.
For trademark cases that involve multiple infringing pages - several product listings, a counterfeit storefront with multiple pages, or infringement across different domains - you can capture each URL separately and build a comprehensive evidence file. Every capture is independently verifiable.
Protect Your Brand with Evidence That Holds Up
Trademark infringement online moves fast. Infringing content can change or disappear at any time. The evidence you collect today may be the only proof that the infringement ever existed. Do not rely on regular screenshots that can be challenged in seconds. Capture server-side, timestamp cryptographically, and document everything before the infringer has a chance to cover their tracks.
Ready to document trademark infringement?
Paste the infringing URL and get a server-side screenshot with HTML source, SHA-256 hash, and RFC 3161 timestamp. Free to use at snapoena.com.
Capture Evidence Now