Why Evidence Quality Makes or Breaks IP Cases
You found the counterfeiters. You have the screenshots. Your attorney files the complaint. And then the judge dismisses it — not because the infringement wasn't real, but because your evidence was inadmissible. This scenario plays out in federal courts more often than most brand owners realize, and it is entirely preventable.
In intellectual property litigation — particularly Schedule A lawsuits targeting counterfeit sellers — the quality of your evidence determines everything: whether the court grants your Temporary Restraining Order, how much you recover in damages, and whether defendants can challenge your case on procedural grounds. A blurry screenshot without a timestamp is not evidence. A test purchase without documentation is just a purchase. And digital files without chain of custody records are vulnerable to claims of tampering.
Federal Rule of Evidence 901(a) requires that evidence be authenticated — meaning you must demonstrate that the evidence is what you claim it is. For digital evidence, this means proving that a screenshot actually depicts what appeared on screen at a specific date and time, that it hasn't been altered, and that the chain of custody from capture to courtroom is unbroken. The bar is high, and courts are increasingly skeptical of digital evidence that lacks proper metadata and verification.
The Three Pillars: Screenshots, Test Purchases, and Chain of Custody
Court-quality evidence collection in IP cases rests on three interlocking pillars. Each one is necessary; none alone is sufficient. Together, they create an evidence package that withstands judicial scrutiny, survives defense motions to suppress, and maximizes your damages recovery.
- Screenshots — Visual proof of what appeared on marketplace listings at a specific point in time, captured at high resolution with full metadata.
- Test Purchases — Physical proof that the counterfeit product is being sold and shipped, with documentation of the entire transaction from click to delivery.
- Chain of Custody — The unbroken record proving who collected each piece of evidence, when, how it was stored, and that it hasn't been modified.
Missing any one of these pillars creates gaps that opposing counsel will exploit. A screenshot without chain of custody can be challenged as fabricated. A test purchase without screenshots lacks proof of what the listing actually claimed. And evidence with broken chain of custody — even if perfectly genuine — may be excluded entirely.
Screenshot Best Practices for Court Exhibits
Screenshots are the foundation of every IP infringement case. They capture the infringing listing as it appeared to consumers — the product images, title, description, pricing, and seller information. But not all screenshots are created equal. A partial screenshot cropped to show only the product image, with no URL bar, no timestamp, and no browser metadata, is practically worthless in court.
Resolution and Format
Court exhibits are printed, projected, and scrutinized. Low-resolution screenshots become pixelated and unreadable when enlarged for a judge or jury. The standard for court-quality captures is 2560x3200 resolution — large enough to clearly show product details, text, and seller information when printed on standard legal paper or displayed on a courtroom monitor. Save screenshots in PNG format (lossless compression) rather than JPEG, which introduces compression artifacts that can obscure fine details.
What Must Be Visible
- Full URL — The complete URL including the domain, path, and any query parameters (ASIN, seller ID, etc.) must be visible in the browser address bar.
- Full page content — Capture the entire listing, not just a cropped section. Full-page screenshots eliminate claims that you selectively captured only damaging content.
- Timestamp — The exact date and time of capture must be embedded in the file metadata and ideally visible in the screenshot itself (system clock overlay).
- Browser metadata — Browser name, version, and operating system provide additional authentication context.
- Seller information — The seller name, seller ID, and storefront link should be clearly captured.
For each infringing listing, capture at minimum three distinct screenshots: the product page (full listing with images, title, price), the seller page (storefront profile with seller name, ratings, other products), and the cart page (showing the item added to cart with final pricing). This trio establishes that the product was actively being offered for sale by an identifiable seller at a specific price.
Test Purchase Protocol
Screenshots prove what a listing claimed. Test purchases prove what was actually delivered. A test purchase creates physical evidence — the counterfeit product itself — along with a documented transaction trail that connects the infringing listing to a tangible item received by the buyer. Courts give substantial weight to test purchases because they eliminate arguments that the listing was merely misleading but the actual product was legitimate.
Setting Up a Clean Account
Never use your personal account or your brand's business account for test purchases. Create a dedicated purchasing account that has no connection to your brand, your attorney, or your company. This prevents sellers from identifying you as the brand owner and potentially sending an authentic product instead of the counterfeit they normally ship. The account should use a neutral name, a separate email address, and a dedicated payment method.
Documenting the Purchase Flow
Every step of the purchase must be screenshotted and timestamped:
Listing Discovery
Screenshot the search results showing how you found the infringing listing. Capture the search query used, the listing's position in results, and the marketplace URL.
Product Page
Full-page screenshot of the infringing listing at 2560x3200. Capture product images, title, description, price, seller name, ASIN or listing ID, and the "Add to Cart" or "Buy Now" button.
Cart and Checkout
Screenshot the cart with the item, the checkout page showing shipping address and payment method (obscure sensitive details), and the order confirmation screen with the order number.
Shipping and Tracking
Screenshot shipping confirmation emails, tracking information, and carrier details. These documents connect the order to the physical delivery.
Receiving and Unboxing
Photograph the sealed package showing shipping labels, return address, and carrier markings. Photograph the unboxing process. Place the received counterfeit product alongside your authentic product and photograph both for side-by-side comparison.
Preserve all physical materials — packaging, shipping labels, packing slips, inserts, and the product itself. Store them in a sealed, labeled container with the date received and the corresponding order number. These materials may need to be presented as physical exhibits in court.
Chain of Custody Requirements
Chain of custody is the principle that evidence must be tracked from the moment of collection through every subsequent handling, transfer, and storage event until it is presented in court. Any gap in the chain — any moment where the evidence was unaccounted for or could have been altered — creates an opening for the defense to argue that it should be excluded.
The Four Questions
For every piece of evidence, you must be able to answer four questions:
- Who collected it? — The full name and role of the person or system that captured the evidence. For automated captures, document the software, version, and configuration used.
- When was it collected? — Exact date and time, with timezone, documented in both the file metadata and a separate evidence log.
- How was it stored? — Where the file was saved immediately after capture, what storage system holds it, who has access, and what security controls protect it.
- Has it been modified? — Hash verification (SHA-256) computed at the time of capture and verified at every subsequent access point.
Digital Evidence Logs
Maintain a structured evidence log — a spreadsheet or database entry for each piece of evidence — containing: the file name, SHA-256 hash, capture timestamp, the URL or physical location captured, the name of the collector, the storage location, and every subsequent access or transfer event. This log becomes a sworn exhibit that authenticates your entire evidence package.
Metadata Preservation and File Integrity
Metadata is the invisible backbone of digital evidence authentication. Without it, a screenshot is just an image file with no provable connection to when, where, or how it was captured. Courts increasingly expect — and some require — that digital evidence include verifiable metadata.
EXIF Data
For photographs of physical products and packaging, EXIF metadata records the camera model, GPS coordinates, date and time of capture, and camera settings. Never strip EXIF data from evidence photographs. If you process images (resize, crop), work on copies and preserve the originals with intact metadata.
File Hashes (SHA-256)
A SHA-256 hash is a unique 64-character fingerprint computed from a file's contents. If even a single pixel changes, the hash changes completely. Compute and record the SHA-256 hash of every evidence file immediately upon capture. Before submitting evidence to your attorney or the court, recompute the hash and verify it matches the original. This proves the file has not been altered since capture.
Timestamp Verification
File system timestamps (created, modified, accessed) can be manipulated. For critical evidence, use a trusted timestamping service that submits a hash of your file to a third-party timestamp authority. The authority returns a signed timestamp token proving the file existed in its current form at that exact moment. Services compliant with RFC 3161 are widely accepted in federal courts.
Digital Notarization
For high-value cases, consider digital notarization services that combine hash verification, trusted timestamps, and blockchain anchoring. These create a tamper-proof, independently verifiable record of your evidence that is virtually impossible to challenge. The cost is minimal — typically a few dollars per file — and the evidentiary value is substantial.
Common Evidence Mistakes That Sink IP Cases
Even experienced brand owners make evidence collection errors that undermine otherwise strong cases. These are the most frequent mistakes — and each one has caused real cases to fail or settle for significantly less than they should have.
- Cropped screenshots — Cropping out the URL bar, timestamp, or seller information makes the screenshot unauthenticable. Always capture full-page screenshots with the browser chrome visible.
- Missing timestamps — Screenshots without date and time metadata cannot prove when the infringement was occurring. A listing screenshot without a timestamp could have been captured years ago.
- Broken chain of custody — Emailing evidence files through personal accounts, saving to uncontrolled cloud storage, or having gaps in the evidence log all break the chain. Once broken, it cannot be repaired.
- Altered files — Resizing, compressing, annotating, or converting evidence files changes their hash and can be argued as tampering. Always preserve unaltered originals and make annotations on copies.
- JPEG compression — Saving screenshots as JPEG instead of PNG introduces lossy compression artifacts. These artifacts can obscure text and product details, and the compression itself constitutes a file modification.
- Single-point capture — Capturing only one screenshot per listing provides no corroboration. Multiple captures across different pages (product, seller, cart) create a corroborating evidence web.
- Using personal accounts for test purchases — If the seller identifies the buyer as the brand owner, they may send an authentic product, making the test purchase useless.
It is tempting to draw red circles around infringing elements or add text labels to screenshots before sending them to your attorney. Never annotate original evidence files. Annotations modify the file, change the hash, and break the chain of custody. Instead, keep the original untouched and create a separate annotated copy clearly labeled as a demonstrative exhibit — not an evidence exhibit.
Platform-Specific Evidence Requirements
Each marketplace has unique data points that strengthen your evidence package. Capturing platform-specific identifiers makes it easier to subpoena seller information, freeze assets, and prove that listings were active at the time of capture.
Amazon
Amazon listings carry several critical identifiers. The ASIN (Amazon Standard Identification Number) is a 10-character alphanumeric code unique to each product listing. The Seller ID identifies the specific third-party seller (visible in the URL of their storefront page). The Buy Box status shows which seller is currently winning the featured offer. Capture the product page URL (which contains the ASIN), the seller profile page (which contains the Seller ID), and the offer listing page showing all sellers for that ASIN. Amazon's internal transaction records — accessible via subpoena — link Seller IDs to real names, addresses, and bank accounts.
eBay
eBay uses a listing ID (item number) that appears in the URL and on the listing page. Each seller has a unique seller profile with a username, feedback score, and member-since date. Capture the item page, seller profile, and the "All Items" view of the seller's active listings (often revealing multiple infringing products). eBay's VeRO (Verified Rights Owner) program can provide seller information under appropriate legal process.
TikTok Shop
TikTok Shop is the fastest-growing vector for counterfeit sales, and its evidence requirements are unique. Listings are tied to short-form video content, making it essential to capture not just the product listing but the promotional videos, the creator's profile, and the live stream recordings where products are shown. Screenshot the product listing page, the seller's TikTok profile, and use screen recording (not just screenshots) to preserve video evidence of infringing promotional content.
How CopyCatch Automates Evidence Collection
Manual evidence collection is tedious, error-prone, and doesn't scale. When you're tracking dozens or hundreds of counterfeit sellers across multiple marketplaces, manually capturing court-quality screenshots for each one is impractical. This is exactly the problem CopyCatch was built to solve.
Browser Use: Court-Quality Captures at Scale
CopyCatch's Browser Use system automates evidence capture using real browser instances running at 2560x3200 resolution — the exact specification required for court exhibits. Each automated browser session captures full-page screenshots with the URL visible, timestamps embedded in metadata, and all page content rendered at court-exhibit quality. The system automatically captures the three critical page types for every infringing listing: product_page, seller_page, and cart_page.
Evidence Tagging and Organization
Every screenshot captured by CopyCatch is automatically tagged with its evidence type — product_page, seller_page, or cart_page — and linked to the specific ASIN, seller ID, and marketplace. Tags are synced to Firestore in real time, creating an organized, searchable evidence database. When it comes time to build your evidence package, every file is already categorized and cross-referenced.
Automated Metadata and Hash Verification
CopyCatch automatically computes SHA-256 hashes for every captured file and stores them alongside the evidence. Timestamps are recorded at the moment of capture with timezone data. The entire evidence chain — from the moment a scan identifies an infringing listing to the final screenshot stored in cloud storage — is logged with full chain of custody metadata. No manual logging required.
Building the Evidence Package for Attorney Review
Once evidence is collected, it must be organized into a structured package that your attorney can review efficiently and submit to the court without additional preparation. A well-organized evidence package accelerates the TRO motion, reduces attorney hours (and your legal bill), and demonstrates the professionalism and thoroughness of your evidence collection process.
Organizing by Defendant
Create a separate evidence folder for each defendant (seller). Within each folder, include:
- Product page screenshots — Full-page captures of every infringing listing
- Seller page screenshots — The seller's storefront profile
- Cart page screenshots — Items added to cart showing pricing
- Test purchase documentation — Order confirmation, shipping records, delivery photos (if applicable)
- Hash verification file — A text file listing every evidence file with its SHA-256 hash and capture timestamp
Creating the Exhibit List
An exhibit list is a numbered index of every piece of evidence, referenced by exhibit number in the complaint and TRO motion. For each exhibit, include: the exhibit number, a brief description, the file name, the capture date, the SHA-256 hash, and the evidence type (screenshot, photograph, document). This list becomes a sworn exhibit attached to your attorney's declaration.
Quality Assurance Checklist
Before sending the evidence package to your attorney, verify:
- Every screenshot is 2560x3200 or higher resolution in PNG format
- Every file has a computed and recorded SHA-256 hash
- Every file has a capture timestamp with timezone
- URLs are visible in all browser screenshots
- The evidence log is complete with no gaps in chain of custody
- Originals are preserved unaltered; any annotated versions are clearly marked as demonstratives
- Test purchase documentation includes every step from search to delivery
- Physical evidence is stored in labeled, sealed containers
Thorough evidence collection is the single highest-leverage activity in IP enforcement. Every dollar invested in proper documentation multiplies the value of your legal action — increasing TRO approval rates, settlement amounts, and default judgment awards. The brands that win in court are not the ones with the strongest trademarks. They are the ones with the strongest evidence.
