Evidence Collection

Court-Quality Evidence Collection: Screenshots, Test Purchases, and Chain of Custody

March 6, 2026
15 min read
CopyCatch Intelligence

Why Evidence Quality Makes or Breaks IP Cases

You found the counterfeiters. You have the screenshots. Your attorney files the complaint. And then the judge dismisses it — not because the infringement wasn't real, but because your evidence was inadmissible. This scenario plays out in federal courts more often than most brand owners realize, and it is entirely preventable.

In intellectual property litigation — particularly Schedule A lawsuits targeting counterfeit sellers — the quality of your evidence determines everything: whether the court grants your Temporary Restraining Order, how much you recover in damages, and whether defendants can challenge your case on procedural grounds. A blurry screenshot without a timestamp is not evidence. A test purchase without documentation is just a purchase. And digital files without chain of custody records are vulnerable to claims of tampering.

"Courts don't dismiss IP cases because the infringement didn't happen. They dismiss them because the evidence doesn't meet the evidentiary standard. The difference between winning and losing is documentation."

Federal Rule of Evidence 901(a) requires that evidence be authenticated — meaning you must demonstrate that the evidence is what you claim it is. For digital evidence, this means proving that a screenshot actually depicts what appeared on screen at a specific date and time, that it hasn't been altered, and that the chain of custody from capture to courtroom is unbroken. The bar is high, and courts are increasingly skeptical of digital evidence that lacks proper metadata and verification.

43%
Of digital evidence challenged in court
901(a)
Federal Rule for authentication
2560x3200
Court-exhibit resolution standard
SHA-256
Hash standard for file integrity

The Three Pillars: Screenshots, Test Purchases, and Chain of Custody

Court-quality evidence collection in IP cases rests on three interlocking pillars. Each one is necessary; none alone is sufficient. Together, they create an evidence package that withstands judicial scrutiny, survives defense motions to suppress, and maximizes your damages recovery.

Missing any one of these pillars creates gaps that opposing counsel will exploit. A screenshot without chain of custody can be challenged as fabricated. A test purchase without screenshots lacks proof of what the listing actually claimed. And evidence with broken chain of custody — even if perfectly genuine — may be excluded entirely.

Screenshot Best Practices for Court Exhibits

Screenshots are the foundation of every IP infringement case. They capture the infringing listing as it appeared to consumers — the product images, title, description, pricing, and seller information. But not all screenshots are created equal. A partial screenshot cropped to show only the product image, with no URL bar, no timestamp, and no browser metadata, is practically worthless in court.

Resolution and Format

Court exhibits are printed, projected, and scrutinized. Low-resolution screenshots become pixelated and unreadable when enlarged for a judge or jury. The standard for court-quality captures is 2560x3200 resolution — large enough to clearly show product details, text, and seller information when printed on standard legal paper or displayed on a courtroom monitor. Save screenshots in PNG format (lossless compression) rather than JPEG, which introduces compression artifacts that can obscure fine details.

What Must Be Visible

Pro Tip: Multiple Screenshot Types

For each infringing listing, capture at minimum three distinct screenshots: the product page (full listing with images, title, price), the seller page (storefront profile with seller name, ratings, other products), and the cart page (showing the item added to cart with final pricing). This trio establishes that the product was actively being offered for sale by an identifiable seller at a specific price.

Test Purchase Protocol

Screenshots prove what a listing claimed. Test purchases prove what was actually delivered. A test purchase creates physical evidence — the counterfeit product itself — along with a documented transaction trail that connects the infringing listing to a tangible item received by the buyer. Courts give substantial weight to test purchases because they eliminate arguments that the listing was merely misleading but the actual product was legitimate.

Setting Up a Clean Account

Never use your personal account or your brand's business account for test purchases. Create a dedicated purchasing account that has no connection to your brand, your attorney, or your company. This prevents sellers from identifying you as the brand owner and potentially sending an authentic product instead of the counterfeit they normally ship. The account should use a neutral name, a separate email address, and a dedicated payment method.

Documenting the Purchase Flow

Every step of the purchase must be screenshotted and timestamped:

1

Listing Discovery

Screenshot the search results showing how you found the infringing listing. Capture the search query used, the listing's position in results, and the marketplace URL.

2

Product Page

Full-page screenshot of the infringing listing at 2560x3200. Capture product images, title, description, price, seller name, ASIN or listing ID, and the "Add to Cart" or "Buy Now" button.

3

Cart and Checkout

Screenshot the cart with the item, the checkout page showing shipping address and payment method (obscure sensitive details), and the order confirmation screen with the order number.

4

Shipping and Tracking

Screenshot shipping confirmation emails, tracking information, and carrier details. These documents connect the order to the physical delivery.

5

Receiving and Unboxing

Photograph the sealed package showing shipping labels, return address, and carrier markings. Photograph the unboxing process. Place the received counterfeit product alongside your authentic product and photograph both for side-by-side comparison.

Preserve all physical materials — packaging, shipping labels, packing slips, inserts, and the product itself. Store them in a sealed, labeled container with the date received and the corresponding order number. These materials may need to be presented as physical exhibits in court.

Chain of Custody Requirements

Chain of custody is the principle that evidence must be tracked from the moment of collection through every subsequent handling, transfer, and storage event until it is presented in court. Any gap in the chain — any moment where the evidence was unaccounted for or could have been altered — creates an opening for the defense to argue that it should be excluded.

The Four Questions

For every piece of evidence, you must be able to answer four questions:

  1. Who collected it? — The full name and role of the person or system that captured the evidence. For automated captures, document the software, version, and configuration used.
  2. When was it collected? — Exact date and time, with timezone, documented in both the file metadata and a separate evidence log.
  3. How was it stored? — Where the file was saved immediately after capture, what storage system holds it, who has access, and what security controls protect it.
  4. Has it been modified? — Hash verification (SHA-256) computed at the time of capture and verified at every subsequent access point.
"Chain of custody isn't bureaucracy — it's the difference between evidence that wins your case and evidence the judge throws out. Every gap is a gift to the defense."

Digital Evidence Logs

Maintain a structured evidence log — a spreadsheet or database entry for each piece of evidence — containing: the file name, SHA-256 hash, capture timestamp, the URL or physical location captured, the name of the collector, the storage location, and every subsequent access or transfer event. This log becomes a sworn exhibit that authenticates your entire evidence package.

Metadata Preservation and File Integrity

Metadata is the invisible backbone of digital evidence authentication. Without it, a screenshot is just an image file with no provable connection to when, where, or how it was captured. Courts increasingly expect — and some require — that digital evidence include verifiable metadata.

EXIF Data

For photographs of physical products and packaging, EXIF metadata records the camera model, GPS coordinates, date and time of capture, and camera settings. Never strip EXIF data from evidence photographs. If you process images (resize, crop), work on copies and preserve the originals with intact metadata.

File Hashes (SHA-256)

A SHA-256 hash is a unique 64-character fingerprint computed from a file's contents. If even a single pixel changes, the hash changes completely. Compute and record the SHA-256 hash of every evidence file immediately upon capture. Before submitting evidence to your attorney or the court, recompute the hash and verify it matches the original. This proves the file has not been altered since capture.

Timestamp Verification

File system timestamps (created, modified, accessed) can be manipulated. For critical evidence, use a trusted timestamping service that submits a hash of your file to a third-party timestamp authority. The authority returns a signed timestamp token proving the file existed in its current form at that exact moment. Services compliant with RFC 3161 are widely accepted in federal courts.

Digital Notarization

For high-value cases, consider digital notarization services that combine hash verification, trusted timestamps, and blockchain anchoring. These create a tamper-proof, independently verifiable record of your evidence that is virtually impossible to challenge. The cost is minimal — typically a few dollars per file — and the evidentiary value is substantial.

Common Evidence Mistakes That Sink IP Cases

Even experienced brand owners make evidence collection errors that undermine otherwise strong cases. These are the most frequent mistakes — and each one has caused real cases to fail or settle for significantly less than they should have.

Warning: The Annotation Trap

It is tempting to draw red circles around infringing elements or add text labels to screenshots before sending them to your attorney. Never annotate original evidence files. Annotations modify the file, change the hash, and break the chain of custody. Instead, keep the original untouched and create a separate annotated copy clearly labeled as a demonstrative exhibit — not an evidence exhibit.

Platform-Specific Evidence Requirements

Each marketplace has unique data points that strengthen your evidence package. Capturing platform-specific identifiers makes it easier to subpoena seller information, freeze assets, and prove that listings were active at the time of capture.

Amazon

Amazon listings carry several critical identifiers. The ASIN (Amazon Standard Identification Number) is a 10-character alphanumeric code unique to each product listing. The Seller ID identifies the specific third-party seller (visible in the URL of their storefront page). The Buy Box status shows which seller is currently winning the featured offer. Capture the product page URL (which contains the ASIN), the seller profile page (which contains the Seller ID), and the offer listing page showing all sellers for that ASIN. Amazon's internal transaction records — accessible via subpoena — link Seller IDs to real names, addresses, and bank accounts.

eBay

eBay uses a listing ID (item number) that appears in the URL and on the listing page. Each seller has a unique seller profile with a username, feedback score, and member-since date. Capture the item page, seller profile, and the "All Items" view of the seller's active listings (often revealing multiple infringing products). eBay's VeRO (Verified Rights Owner) program can provide seller information under appropriate legal process.

TikTok Shop

TikTok Shop is the fastest-growing vector for counterfeit sales, and its evidence requirements are unique. Listings are tied to short-form video content, making it essential to capture not just the product listing but the promotional videos, the creator's profile, and the live stream recordings where products are shown. Screenshot the product listing page, the seller's TikTok profile, and use screen recording (not just screenshots) to preserve video evidence of infringing promotional content.

How CopyCatch Automates Evidence Collection

Manual evidence collection is tedious, error-prone, and doesn't scale. When you're tracking dozens or hundreds of counterfeit sellers across multiple marketplaces, manually capturing court-quality screenshots for each one is impractical. This is exactly the problem CopyCatch was built to solve.

Browser Use: Court-Quality Captures at Scale

CopyCatch's Browser Use system automates evidence capture using real browser instances running at 2560x3200 resolution — the exact specification required for court exhibits. Each automated browser session captures full-page screenshots with the URL visible, timestamps embedded in metadata, and all page content rendered at court-exhibit quality. The system automatically captures the three critical page types for every infringing listing: product_page, seller_page, and cart_page.

Evidence Tagging and Organization

Every screenshot captured by CopyCatch is automatically tagged with its evidence type — product_page, seller_page, or cart_page — and linked to the specific ASIN, seller ID, and marketplace. Tags are synced to Firestore in real time, creating an organized, searchable evidence database. When it comes time to build your evidence package, every file is already categorized and cross-referenced.

Automated Metadata and Hash Verification

CopyCatch automatically computes SHA-256 hashes for every captured file and stores them alongside the evidence. Timestamps are recorded at the moment of capture with timezone data. The entire evidence chain — from the moment a scan identifies an infringing listing to the final screenshot stored in cloud storage — is logged with full chain of custody metadata. No manual logging required.

EVIDENCE COLLECTION WORKFLOW 1 Identify Infringement Visual scan across marketplaces Match ASIN / listing IDs Record seller profiles Flag suspected counterfeits 2 Screenshot Capture 2560x3200 full-page captures Product, seller, cart pages URL + timestamp visible PNG lossless format 3 Test Purchase Clean account, neutral identity Screenshot checkout flow Save order confirmation + tracking Dedicated payment method 4 Receive & Document Photograph sealed package Document unboxing with photos Side-by-side vs. authentic product Preserve packaging + labels 5 Chain of Custody SHA-256 hash every file Structured evidence log Trusted timestamp tokens Secure, access-controlled storage 6 Package for Attorney Organize by defendant Create exhibit list + index Include hash verification log Ready for TRO motion filing OUTPUT Court-Quality Screenshots 2560x3200 PNG with metadata Physical Evidence Products, packaging, labels Evidence Package Indexed, hashed, ready for court COPYCATCH AUTOMATES STEPS 1-2 & 5-6
Figure 1 — Evidence collection workflow from identification to attorney-ready package

Building the Evidence Package for Attorney Review

Once evidence is collected, it must be organized into a structured package that your attorney can review efficiently and submit to the court without additional preparation. A well-organized evidence package accelerates the TRO motion, reduces attorney hours (and your legal bill), and demonstrates the professionalism and thoroughness of your evidence collection process.

Organizing by Defendant

Create a separate evidence folder for each defendant (seller). Within each folder, include:

Creating the Exhibit List

An exhibit list is a numbered index of every piece of evidence, referenced by exhibit number in the complaint and TRO motion. For each exhibit, include: the exhibit number, a brief description, the file name, the capture date, the SHA-256 hash, and the evidence type (screenshot, photograph, document). This list becomes a sworn exhibit attached to your attorney's declaration.

Quality Assurance Checklist

Before sending the evidence package to your attorney, verify:

  1. Every screenshot is 2560x3200 or higher resolution in PNG format
  2. Every file has a computed and recorded SHA-256 hash
  3. Every file has a capture timestamp with timezone
  4. URLs are visible in all browser screenshots
  5. The evidence log is complete with no gaps in chain of custody
  6. Originals are preserved unaltered; any annotated versions are clearly marked as demonstratives
  7. Test purchase documentation includes every step from search to delivery
  8. Physical evidence is stored in labeled, sealed containers

Thorough evidence collection is the single highest-leverage activity in IP enforcement. Every dollar invested in proper documentation multiplies the value of your legal action — increasing TRO approval rates, settlement amounts, and default judgment awards. The brands that win in court are not the ones with the strongest trademarks. They are the ones with the strongest evidence.

Automate Court-Quality Evidence Collection

CopyCatch captures 2560x3200 screenshots, tags evidence by type, and builds attorney-ready packages automatically.

Get Started