Cracking the Code: How to Actually Win a Software Piracy Lawsuit in China Without Losing Your Mind or Your Source Code

Imagine finding out that your company main software—its key intellectual property—is being openly pirated, cracked, and sold on Chinese online marketplaces at a fraction of its true worth. For many international tech firms, this isn’t just a hypothetical situation; it’s an everyday challenge. The immediate reaction is often frustration, followed by a rush to send a stern cease-and-desist letter or file a lawsuit. However, effectively enforcing software copyright in China legal system demands careful planning, thorough preparation, and a solid grasp of how local courts actually assess these cases.

The Beijing Intellectual Property Court—one of China leading forums for technology-related disputes—published a detailed guide on how to present evidence in civil cases concerning computer software copyright.

Although official court guidelines might seem like dry legal material, this particular guide serves as a practical blueprint for winning software piracy cases in China. It clearly outlines what courts require you to prove, the methods they expect for proving it, and the common pitfalls that can undermine a strong case. For foreign companies and their legal teams aiming to safeguard their software in China, grasping the real-world impact of this guide is an essential first step toward effective enforcement.

Establishing Proof of Ownership for Your Claims

The primary challenge in any copyright enforcement case is demonstrating ownership. Although copyright often exists from the moment a work is created in many legal systems, proving ownership to the satisfaction of a Chinese court requires a very specific approach. According to the Beijing Court guidelines, merely asserting authorship is not enough. You need to provide solid, verifiable evidence that clearly traces the ownership rights.

The court favors evidence such as digital signatures embedded in the software, comments within the source code, and website URLs integrated into the program that identify your company as the creator. Additionally, an official copyright registration certificate from the Chinese National Copyright Administration (NCAC) is regarded as highly convincing proof. While registering a copyright is not strictly required to file a lawsuit in China, in practice, it is almost essential. It acts as strong presumptive evidence of ownership and can greatly simplify early legal procedures.

Foreign companies should also be ready to face counterclaims from defendants. The guidelines note that defendants often dispute ownership by presenting conflicting signatures, alternative registration documents, or by arguing that the software characteristics, industry norms, or public opinion suggest a different rightful owner. Therefore, it is strategically crucial to secure your ownership evidence—ideally through Chinese copyright registration—before any infringement happens. You must also be prepared to vigorously defend your ownership against challengers who might have even tried to register your software themselves in China.

The Key Difference: What Kind of Software Infringement Did You Experience?

Software piracy takes many forms, and the Beijing Court requires plaintiffs to clearly specify the exact type of infringement they are claiming. This is a critical strategic choice that shapes the entire direction of the case. The court guidelines outline several distinct infringement categories, such as unauthorized distribution, end-user infringement (using unlicensed copies within a company), direct copying of code, bypassing technical protection measures (like cracking DRM), and unauthorized leasing.

Why does this distinction matter so much in practice? Because the evidence needed to prove each type differs greatly. For example, if you claim a competitor directly copied your source code, your proof must focus on comparing the code itself. But if your software is a SaaS product and you allege a company is internally using cracked versions, you need to demonstrate their unauthorized use, which often requires on-site evidence collection or administrative inspections. If your software uses DRM and the infringer is selling cracked versions that bypass subscription controls, your claim must specifically address the circumvention of these technical protections. Misclassifying the infringement at the start can cause the court to request inappropriate evidence, weakening your case and wasting time and resources.

The Challenge of Comparing Software Code

One of the toughest parts of software copyright litigation is technically comparing the code. How can you prove someone copied your software when they control their version and can refuse to share it? The Beijing Court guidelines offer a practical approach, but plaintiffs must handle it carefully.

Chinese courts rely on a substantial similarity test combined with proof that the defendant had access to your software. As the plaintiff, you first need to show the defendant had the chance to access your software, which is usually easy if your software is publicly downloadable. The harder part is proving substantial similarity. The court prefers to compare the source code of both parties’ software. However, defendants rarely voluntarily provide their source code, as it would reveal their trade secrets.

This is where legal strategy is crucial. The guidelines recognize this issue and allow plaintiffs to ask the court to compare the target programs — the compiled, executable software — if the defendant refuses to provide source code or if the code given is unreliable. This fallback is essential for plaintiffs. To make the most of it, we usually recommend clients have their technical experts involved in the court-organized comparison or request the court appoint an accredited forensic institution to perform the analysis.

Additionally, submitting source code in court is sensitive. You don’t want to expose your entire codebase to the opposing party without protections. The guidelines describe how to submit code in encrypted form on sealed drives and stress the importance of confidentiality agreements and court-issued confidentiality orders. These measures ensure that when the opposing party reviews your code during cross-examination, they are legally prohibited from misusing or disclosing your trade secrets. Establishing these confidentiality safeguards properly from the beginning is vital to protecting your broader business interests while pursuing an infringement claim.

Overcoming the Independent Recreation Defense

Even when you successfully demonstrate substantial similarity, defendants in Chinese software cases often use a particular legal defense known as software transplantation or independent recreation. They claim that although their software delivers the same functional outcomes as yours, it was independently developed using completely different programming languages or architectural designs, relying only on the same unprotectable technical concepts or ideas.

According to the Beijing Court guidelines, if a defendant invokes this defense, the burden of proof shifts back to them. They must provide strong evidence proving that the programming languages and software used differ significantly from yours, and that the code expression—despite similar functionality—has meaningful underlying differences. For foreign companies, anticipating this defense is essential. This means your initial evidence gathering must go beyond showing that the infringing software resembles yours in appearance and behavior. You need to be ready to prove that the similarities extend deeply into the code structural and architectural expression, making independent creation highly unlikely.

Grasping the evidentiary requirements of the Beijing Intellectual Property Court is more than theoretical knowledge; it forms the basis of a practical enforcement strategy in China. When foreign companies face software piracy, resolving the issue is rarely as simple as sending a warning letter. Without properly preserved evidence before notifying the infringer, legal action is likely to fail. Defendants warned too early often quickly remove infringing content, erase servers, and destroy the evidence needed to win in court.

Successful enforcement in China demands a careful, step-by-step approach. It starts with securing your core evidence—most importantly, obtaining a Chinese software copyright registration. It involves conducting a forensic analysis of the infringement to accurately classify the violation. It requires discreet evidence preservation, such as notarized web captures of pirated listings or notarized test purchases of cracked software, all done before the infringer is aware they are under scrutiny. Additionally, it calls for a sophisticated understanding of how to compel code comparisons while safeguarding your trade secrets during litigation.

Facing these challenges alone can be overwhelming for foreign companies. The regulations in Chinese intellectual property courts are intricate, and the consequences are substantial. If your software is being infringed in China, you require a legal team that is not only knowledgeable about the law but also familiar with how courts evaluate evidence. We specialize in guiding international technology companies through the complicated process of protecting intellectual property in China. Whether you are confronting software infringement or seeking to proactively safeguard your IP in China, we encourage you to reach out to us. Let us assess your case and develop a tailored, proactive plan to keep your software secure.

Leave a Reply