Enforcement Tips: Telnet Forensic Method Accepted by Court in Pirated Software Cases

In pirated software copyright infringement cases, the key for the software copyright owner to win the lawsuit is to prove that the infringer has installed and used the pirated software in the business operation. However, since the software involved in the case is often installed on servers or computers controlled by the infringer and placed in business premises that are not open or accessible to the public, it is very challenging for the right owner to enter the business premises of the infringer and complete the forensics. 

Judicial pratice in China indicates that more courts accept the adoption of telnet forensic method to collect evidence in pirated software cases.

Evidence Collection Method in Pirated Software Cases


In judicial practice, the main method used in software copyright infringement case is filing application to the court, requesting the judge to go to the infringer’s premises to preserve the evidence of the equipment and obtain key evidence of infringement.

In the Guidelines for Hearing Infringement of Copyright Cases of the Beijing High People’s Court, which came into effect on April 20, 2018, it is mentioned that “the method of remote forensics can also be adopted in end-user cases” and that “the evidence obtained through remote forensic methods shall comply with the provisions of the Civil Procedure Law “. The 2021 promulgated Guidelines on Rules of Evidence for Civil Litigation on Intellectual Property of the Beijing High People’s Court (effective on April 22, 2021) also reiterates that “in the investigation of evidence collection …… according to the specific situation, remote forensics can also be adopted”. This indicates that the court approves the way of remote evidence collection in software infringement cases.

How is remote forensics used in pirated software cases 


Through a search of public reported cases, we note that for specific types of software, it is possible to form infringement evidence admissible by the People’s Court through conducting remote forensics in the presence of a notary office. This specific type of software is mainly software designed to achieve remote access, such as “server-side mail server software” and FTP software (this software allows users to connect their own computers to other servers running the FTP protocol, so that users can easily access the programs and information on the server). Based on the specificity of the above-mentioned software functions, one can remotely detect a web server’s installation of such software through a very common computer command – the Telnet command. Specifically, if a computer connected to the Internet enters a command and a URL, the web server may automatically return a message with the name of the software if it is indeed installed. If the website owner cannot prove that its commercial use of the software is authorized by the rights owner, it may be deemed to have installed pirated software.

Technical limitations in Telnet forensic method


However, this Telnet forensic method still has technical limitations, as the feedback information only reflects the name and version number of the software, and cannot show the program code of the software, nor can it be directly used to determine whether the suspected software is the same as or substantially similar to the software requested for protection. At the same time, at the technical level, the owner and controller of the server may also modify the relevant settings of the software through technical means, thus making the feedback information inconsistent with the software actually installed on the server.

Due to the above reasons, different courts’ attitudes towards the admissibility of evidence of Telnet command remote forensics are inconsistent. 

Changing Viewpoints of GD High Peoples Court in Pirated Software Cases


For example, the Guangdong High People’s Court, in dispute case between Shenzhen Lanke Technology Co., Ltd. and LeiRuo Software Company on copyright infringement of computer software, found that the Telnet command remote forensics for FTP software did not have certainty and uniqueness. At the same time, the feedback alone could not confirm whether the defendant installed or used the plaintiff’s FTP software. Even if the defendant was found to have installed and used the plaintiff’s software, it is hardly possible to confirm whether the defendant’s software was a pirated version of the plaintiff’s copyrighted software, because of the incapability to compare the software with Plaintiff’s copyrighted software. Accordingly, the court did not support the plaintiff’s claim. 

However, a few years later, the Guangdong High People’s Court amended the previous viewpoint in the case of retrial of the dispute of copyright infringement of computer software between Otonm Technology Co., LTD and Shenzhen Guanzhi Industrial Co., LTD. It is pointed out that although there is no certainty and uniqueness between the feedback information after Telnet order detection and the facts to be proved, if there is a high possibility between the feedback information and the facts to be proved, the plaintiff who has the burden of proof should be considered to have completed the burden of proof. Because the defendant could not prove that he had lawfully used the genuine software, the court supported the plaintiff’s request that the defendant had infringed on the software copyright.

Remote forensics by Telnet in Pirated Software Cases


We noticed that information on pirated software obtained by rights owners may also be obtained through the device information feedback function installed by the software itself. The software in question will automatically send back the information of the device installed the software to the right holder to help the right holder track the location of the pirated software. 

This feature essentially creates a “back door” on the software that allows the rights owner to gain access to the user’s system. On the surface, the software “back door” appears to assist the right owner easily obtaining information about the users of the pirated software. However, since users are not aware of the existence of software “back door,” the legality of such forensic methods remains to be discussed. With the continuous development of technology progress and practice, there may be more models for remote forensics of pirated software. 
Senior attorney with 16 years of proven experience in complex IP disputes and anti-counterfeiting plans; profound experience in company global IP porfolio, IP compliance, strategic planning and IP risk mitigation.

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *