北京知识产权法院 侵犯商业秘密民事案件诉讼举证参考 为有效破解侵犯商业秘密民事案件举证难问题,引导当事人更好地完成举证责任,维护科技创新企业的核心竞争力,依法平等保护中外当事人的合法权益,优化法治化营商环境,根据《中华人民共和国反不正当竞争法》《最高人民法院关于审理不正当竞争民事案件应用法律若干问题的解释》《最高人民法院关于审理侵犯商业秘密民事案件适用法律若干问题的规定》《最高人民法院关于知识产权民事诉讼证据的若干规定》《最高人民法院关于审理侵害知识产权民事案件适用惩罚性赔偿的解释》,以及《北京市高级人民法院知识产权民事诉讼证据规则指引》等相关规定,结合侵犯商业秘密民事案件审理中的主要问题,特制定本举证参考。 第一部分 关于权利基础的举证参考 商业秘密通常是指不为公众所知悉、具有商业价值并经权利人采取相应保密措施的技术信息、经营信息等商业信息。 技术信息主要包括与技术有关的结构、原料、组分、配方、材料、样品、样式、植物新品种繁殖材料、工艺、方法或其步骤、算法、数据、计算机程序及其有关文档等信息。 经营信息主要包括与经营活动有关的创意、管理、销售、财务、计划、样本、招投标材料、客户信息、数据等信息。客户信息,包括客户的名称、地址、联系方式以及交易习惯、意向、内容等信息。 一、可以依法起诉的主体 1.原告能够举证证明其为商业秘密的权利人或者利害关系人,可以依法提起侵犯商业秘密诉讼。 2.商业秘密独占使用许可合同的被许可人可以单独提起侵犯商业秘密诉讼; 商业秘密排他使用许可合同的被许可人可以和权利人共同提起侵犯商业秘密诉讼,或者在权利人不起诉的情况下自行提起诉讼; 商业秘密普通使用许可合同的被许可人可以和权利人共同提起侵犯商业秘密诉讼,或者经权利人书面授权单独提起诉讼。 二、商业秘密的法定条件 3.原告能够举证证明商业秘密在被诉侵权行为发生时不为所属领域的相关人员普遍知悉和容易获得的,可以主张该商业秘密不为公众所知悉。 4.原告能够举证证明将为公众所知悉的信息进行整理、改进、加工后形成的新信息在被诉侵权行为发生时不为所属领域的相关人员普遍知悉和容易获得的,可以主张该新信息构成商业秘密。为证明该新信息非公众所知悉,原告可以将整理、改进、加工的过程和记录等作为证据提交。 5.原告主张对商业秘密采取了相应保密措施,可以根据商业秘密及其载体的性质、商业秘密的商业价值、保密措施的可识别程度、保密措施与商业秘密的对应程度以及原告保密意愿等因素,举证证明其为防止商业秘密泄露,在被诉侵权行为发生以前采取了与商业秘密相适应的合理保密措施。 6.原告主张采取了相应保密措施,可以举证证明存在以下事实: 7.原告主张商业秘密具有商业价值的,可以根据商业秘密的研究开发成本、实施该项商业秘密的收益、可得利益、可保持竞争优势的时间等因素,举证证明商业秘密因不为公众所知悉而具有现实的或者潜在的商业价值。生产经营活动中形成的阶段性成果符合上述规定的,原告可以主张该阶段性成果具有商业价值。 三、法定条件的抗辩事由 8.被告主张原告商业秘密不符合商业秘密法定条件的,可以举证证明存在以下事实: (1)商业秘密在被诉侵权行为发生时已为公众所知悉; (2)原告未采取相应保密措施; (3)商业秘密不具有商业价值; (4)商业秘密不符合法定条件的其他情形。 9.被告主张原告商业秘密已为公众所知悉的,可以举证证明存在以下事实: (1)原告商业秘密在所属领域属于一般常识或者行业惯例的; (2)原告商业秘密仅涉及产品的尺寸、结构、材料、部件的简单组合等内容,所属领域的相关人员通过观察上市产品即可直接获得的; (3)原告商业秘密已经在公开出版物或者其他媒体上公开披露的,包括文献资料、宣传材料、网页等; (4)原告商业秘密已通过公开的报告会、展览等方式公开的; (5)所属领域的相关人员从其他公开渠道可以获得原告商业秘密的。 10.被告主张原告商业秘密未采取相应保密措施的,可以通过保密措施的可识别程度、保密措施与商业秘密价值相对应程度、所涉信息载体的特性、他人通过正当方式获得的难易程度等方面进行举证。 第二部分 关于侵权行为的举证参考 四、侵权行为的表现形式 11.原告主张被告实施了侵犯商业秘密的行为,可以举证证明存在以下事实: (1)以盗窃、贿赂、欺诈、胁迫、电子侵入或者其他不正当手段获取原告的商业秘密; 12.原告主张被告的行为属于以其他不正当手段获取权利人的商业秘密的,可举证证明被告获取商业秘密的方式违反法律规定或者商业道德。 13.原告主张被告实施了侵犯商业秘密的具体行为,可以提供以下证据: (1)被告生产的含有原告商业秘密的产品、产品手册、宣传材料、计算机软件、文档; (2)被告与第三方订立的含有原告商业秘密的合同; (3)被告所用被诉侵权信息与原告商业秘密相同或实质上相同的鉴定报告、评估意见、勘验结论; (4)被告与披露、使用或允许他人使用商业秘密的主体存在合同关系或其他关系的材料; (5)针对原告商业秘密的密钥、限制访问系统或物理保密装置等被破解、规避的记录; (6)能反映原告商业秘密被窃取、披露、使用的证人证言; (7)包含原告商业秘密的产品说明书、宣传介绍资料; (8)被告明知或应知他人侵犯商业秘密仍提供帮助的相关材料; (9)被告教唆、引诱、帮助他人侵犯商业秘密的录音录像、聊天记录、邮件; (10)可以证明被告实施侵犯商业秘密行为的其他证据。 14.原告主张被告违反保密义务的,可以举证证明根据法律规定或者合同约定等被告应承担保密义务。若未在合同中约定保密义务,可以举证证明根据诚信原则以及合同的性质、目的、缔约过程、交易习惯等,被告知道或者应当知道其获取的信息属于原告的商业秘密。 15.原告主张被告为员工、前员工的,可以举证证明被告为其经营、管理人员以及具有劳动关系的其他人员。原告主张员工、前员工有渠道或者机会获取原告商业秘密的,可以举证证明存在以下事实: (1)职务、职责及权限与涉案商业秘密相关; (2)承担的本职工作或者单位分配的任务与涉案商业秘密相关; (3)参与和商业秘密相关的生产经营活动; (4)曾保管、使用、存储、复制、控制或者以其他方式接触、获取商业秘密及其载体; (5)有渠道或者机会获取商业秘密的其他事实。 16.原告主张被诉侵权信息与其商业秘密构成实质上相同,可以围绕被诉侵权信息与商业秘密的异同程度、所属领域的相关人员在被诉侵权行为发生时是否容易想到被诉侵权信息与商业秘密的区别、被诉侵权信息与商业秘密的用途、使用方式、目的、效果等是否具有实质性差异、公有领域中与商业秘密相关信息的情况等因素进行举证,具体可以提供以下证据: (1)有资质的鉴定机关、评估机构出具的鉴定意见、评估意见,相关专家辅助人意见; (2)能体现与原告商业秘密实质上相同的信息的产品、合同、意向书; (3)前述证据来自于与被告有关的第三方; (4)可以证明被诉侵权信息与原告商业秘密构成实质上相同的其他证据。 17.原告主张被告使用商业秘密的,可举证证明存在以下事实: (1)被告在生产经营活动中直接使用商业秘密; (2)被告对商业秘密进行修改、改进后使用; (3)被告根据商业秘密调整、优化、改进有关生产经营活动。 18.原告提供初步证据合理表明商业秘密被侵犯,且提供以下证据之一的,被告应当证明其不存在侵犯商业秘密的行为: 19.原告能够举证证明经营者以外的其他自然人、法人和非法人组织侵犯其商业秘密的,可以依据相关规定提起诉讼并主张侵权人承担的民事责任。 五、侵权行为的抗辩事由 20.被告否认侵犯商业秘密的,可以提供以下证据: (1)有资质的鉴定机关、评估机构出具的被诉侵权信息与原告商业秘密不同的鉴定意见、评估报告、勘验结论; (2)被告获取、披露、使用或者允许他人使用的商业秘密经过合法授权的授权书、合同; (3)被告自行开发研制或者反向工程等的开发文件、研发记录、音视频文件; (4)客户基于对离职员工个人的信赖而自愿与该个人或者其新单位进行市场交易的说明、证人证言; (5)其他证据。 21.被告主张被诉侵权信息系通过反向工程获取的,可以提供以下证据: (1)通过公开渠道取得产品的购买合同、接受赠予的凭证、票据; (2)通过拆卸、测绘、分析等相关技术手段从公开渠道取得的产品中获得有关技术信息的工作记录、视频、文档数据; (3)委托他人通过拆卸、测绘、分析等技术手段从公开渠道取得的产品中获得有关技术信息的合同、往来邮件; (4)能够证明被诉侵权信息系通过反向工程获取的其他证据。 22.被告主张被诉侵权信息系基于个人信赖获取的,可以提供以下证据: (1)所涉行业领域强调个人技能的行业特点说明; (2)客户明确其系基于对员工个人的信赖自愿选择交易的声明、说明或者聊天记录、往来邮件; (3)与相关客户的交易未利用原告所提供的物质条件、交易平台的文件、沟通记录; (4)能够证明被诉侵权信息系基于个人信赖获取的其他证据。 第三部分 关于请求承担民事责任的举证参考 六、停止侵权 23.对于侵犯商业秘密行为判决停止侵害的民事责任,停止侵害的时间一般持续到该商业秘密已为公众所知悉时为止。原告能够举证证明依照上述规定判决停止侵害的时间明显不合理的,可以请求法院在依法保护原告的商业秘密竞争优势的情况下,判决被告在一定期限或者范围内停止使用该商业秘密。 24.原告可以请求法院判决被告返还或者销毁商业秘密载体,清除其控制的被诉侵权信息。 七、赔偿损失 25.原告能够举证证明其因被侵权所受到的实际损失的,可以请求法院按照其实际损失确定赔偿数额;实际损失难以确定的,原告能够举证证明被告因侵权所获得的利益的,可以请求法院按照被告因侵权所获得的利益确定赔偿数额;原告的损失或者被告获得的利益难以确定的,原告可以请求法院参照商业秘密许可使用费的倍数合理确定。对故意侵犯商业秘密,情节严重的,原告可以请求法院在按照上述方法确定数额的一倍以上五倍以下确定赔偿数额。赔偿数额包括原告为制止侵权行为所支付的合理开支。 26.原告请求参照商业秘密许可使用费确定因被侵权所受到的实际损失的,可以举证证明许可的性质、内容、实际履行情况以及侵权行为的性质、情节、后果等事实。 27.原告因被侵权所受到的实际损失、被告因侵权所获得的利益、商业秘密许可使用费难以确定的,原告可以请求法院根据侵权行为的情节判决给予五百万元以下的赔偿。 28.原告请求法院根据侵权行为的情节判决给予五百万元以下的赔偿的,可以举证证明商业秘密的性质、商业价值、研究开发成本、创新程度、能带来的竞争优势以及被告的主观过错、侵权行为的性质、情节、后果等事实。 30.原告举证证明因侵权行为导致商业秘密为公众所知悉的,可以请求法院在依法确定赔偿数额时,考虑商业秘密的商业价值。 31.原告主张被告恶意侵犯其商业秘密且情节严重,请求惩罚性赔偿的,应当在起诉时明确赔偿数额、计算方式以及所依据的事实和理由。 32.原告主张被告具有侵犯商业秘密的恶意,可以围绕以下事实提供证据: (1)被告经原告或者利害关系人通知、警告后,仍继续实施侵权行为的; (2)被告或其法定代表人、管理人是原告或者利害关系人的法定代表人、管理人、实际控制人的; (3)被告与原告或者利害关系人之间存在劳动、劳务、合作、许可、经销、代理、代表等关系,且接触过被侵犯的商业秘密的; (4)被告与原告或者利害关系人之间有业务往来或者为达成合同等进行过磋商,且接触过被侵犯的商业秘密的; (5)其他可以认定为故意的情形。 33.原告主张被告侵犯商业秘密行为情节严重的,可以围绕以下事实提供证据: (3)侵权行为持续时间长; (7)侵权行为可能危害国家安全、公共利益或者人身健康; 34.原告主张惩罚性赔偿的,以原告因被侵权所受到的实际损失或者按照侵权人因侵权所获得的利益作为计算基数。该基数不包括原告为制止侵权所支付的合理开支。 第四部分 关于程序事项的举证参考 八、保全 35.在证据可能灭失或者以后难以取得的情况下,申请人可以在诉讼过程中依法向法院申请保全证据。 36.因情况紧急,在证据可能灭失或者以后难以取得的情况下,申请人可以在提起诉讼前依法向法院申请保全证据。 37.被申请人试图或者已经以不正当手段获取、披露、使用或者允许他人使用申请人的商业秘密,可能会使判决难以执行或者造成申请人其他损害,或者将会使申请人的合法权益受到难以弥补的损害的,申请人可以在诉讼过程中依法向法院申请行为保全。 38.因情况紧急,不立即申请保全会使判决难以执行或者造成申请人其他损害,或者将会使申请人的合法权益受到难以弥补的损害的,申请人可以在提起诉讼前依法向法院申请行为保全。 39.申请人申请行为保全并主张“情况紧急”的,可以围绕以下事实提供证据: (1)申请人的商业秘密即将被非法披露; (3)申请人的商业秘密在展销会等时效性较强的场合正在或者即将受到侵害; 40.申请人申请行为保全并主张被申请人的行为会给其造成“难以弥补的损害”的,可以围绕以下事实提供证据: (4)对申请人造成其他难以弥补的损害。 41.申请人申请行为保全的,应当依法提供担保。申请人提供的担保数额,应当相当于被申请人可能因执行行为保全措施所遭受的损失,包括责令停止侵权行为所涉产品的销售收益、保管费用等合理损失。 42.行为保全措施一般不因被申请人提供担保而解除,但申请人同意的除外。 43.为制止侵犯商业秘密行为,申请人能够在提出保全申请后、保全裁定作出前明确商业秘密的具体内容,同时提供载有商业秘密的合同、文档、计算机软件、产品、招投标文件、数据库文件等证据的,可以申请诉前或诉中证据保全或行为保全。 44.因被申请人的行为或者其他原因,可能使判决难以执行或者造成申请人其他损害的,申请人可以在诉讼过程中依法向法院申请财产保全并提供相应担保。 45.因情况紧急,不立即申请保全会使申请人的合法权益受到难以弥补的损害的,申请人可以在提起诉讼前依法向法院申请财产保全。申请人应当提供相当于请求保全数额的担保。 46.被申请人可以提供充分有效担保,请求解除财产保全。 九、调查令 47.当事人申请调查收集证据,请求法院颁发调查令,由当事人的诉讼代理人代为调查收集证据的,应满足准予调查收集证据申请应具备的条件,且需同时符合以下条件: (1)申请人的诉讼代理人为执业律师,且持令代为调查收集证据的人仅限于调查令上列明的执业律师; (2)调查令足以克服当事人及其诉讼代理人不能自行收集证据的客观原因; (3)被调查收集的证据不涉及国家秘密、商业秘密、个人隐私等且不存在其他不宜由诉讼代理人持调查令收集的情形。 48.持有调查令的律师于调查令有效期内,按照调查令载明的证据名称或范围向被调查人调查收集证据。持有调查令的律师向被调查人调查收集证据时,同时出示其律师执业证书原件供被调查人核对。 49.被调查人对调查令和相关律师身份核对无异后,按照调查令载明的名称或范围提供证据。 50.被调查人提供的证据在持有调查令的律师和被调查人的共同见证下封存,由持有调查令的律师及时、完整的提交法院或由被调查人在合理期间内采用邮寄等方式提交法院。 51.被调查人因故未能提供证据或者拒不协助调查的,持有调查令的律师于调查令有效期届满后三日内向法院书面说明相关情况。 十、诉讼中的保密措施 52.涉及商业秘密的案件,双方当事人可以申请不公开审理。当事人可以申请法院在互联网公布裁判文书时删除涉及商业秘密的信息。 53.双方当事人所提交证据涉及商业秘密或者其他需要保密的商业信息的,当事人可以申请法院在证据保全、证据交换、举证质证、委托鉴定、询问、开庭等诉讼活动中采取必要的保密措施,保密措施包括但不限于以下情形: (1)针对不同诉讼环节,申请对接触涉密证据的人员范围作出限制; (2)要求接触涉密证据的当事人签订保密承诺书; (3)申请对涉密证据不予交换,仅通过当庭出示的方式由对方当事人发表质证意见; (4)对于证据中需要保密的部分进行不影响案件审理的遮挡; (5)申请采取其他必要的保密措施。 54.接触前款涉密证据的当事人,不得出于本案诉讼之外的任何目的披露、使用、允许他人使用在诉讼程序中接触到的秘密信息。 55.当事人违反前款所称的保密措施的要求,擅自披露商业秘密或者在诉讼活动之外使用或者允许他人使用在诉讼中接触、获取的商业秘密的,应当依法承担民事责任。构成民事诉讼法第一百一十一条规定情形的,依法采取强制措施。构成犯罪的,依法追究刑事责任。 十一、刑民交叉 57.当事人可以主张依据生效刑事裁判认定的实际损失或者违法所得确定针对同一侵犯商业秘密行为提起的民事诉讼的赔偿数额。 58.涉及同一侵犯商业秘密行为的刑事案件尚未审结的,当事人可以请求法院中止审理侵犯商业秘密民事案件。是否中止审理,由民事案件的审理法院根据案件具体情况确定。 Beijing Intellectual Property Court Reference for Proof in Civil Cases of Infringements of Trade Secrets This Reference for Proof is aimed at effectively solving the difficulty of proof in civil cases of infringements of trade secrets, guiding the parties concerned to better fulfill the burden of proof, maintaining the core competitiveness of technological innovation enterprises, equally protecting the legitimate rights and interests of Chinese and foreign parties in accordance with the law, and optimizing the legalized business environment. This Reference for Proof is hereby formulated in combination with main issues in the trial of civil cases of infringements of trade secrets and in accordance with the Anti-unfair Competition Law of the People’s Republic of China, the Interpretation of the Supreme People’s Court on Several Issues Concerning the Application of Laws in the Trial of Civil Cases of Unfair Competition, the Provisions of the Supreme People’s Court on Several Issues Concerning the Application of Laws in the Trial of Civil Cases of Infringements of Trade Secrets, the Several Provisions of the Supreme People’s Court on Evidence in Civil Procedures Involving Intellectual Property Rights, the Interpretation of the Supreme People's Court on the Application of Punitive Damages in the Trial of Intellectual Property Infringement Civil Cases, the Guidelines on the Evidence Rules for Intellectual Property Civil Litigation of Beijing High People’s Court and relevant provisions. Part I Reference for Proof of Rights Trade secrets usually refer to commercial information including technical information and business information etc. that are not known to the public, have commercial value, and have been processed through corresponding non-disclosure measures by the right holders. Technical information mainly includes technology-related information, such as structures, raw materials, components, formulas, materials, samples, patterns, propagation materials of new plant varieties, processes, methods or their steps, algorithms, data, computer programs, and related documents. Business information mainly includes information related to business activities, such as ideas, management, sales, finance, plans, samples, bidding materials, customer information and data. Customer information includes the customer’s name, address, contact information, transaction habits, intentions, content, and other information. I. The Party that may File a Lawsuit in accordance with the Law 1. The plaintiff may file a trade secret infringement lawsuit in accordance with the law if the said plaintiff can provide evidence to prove that the said plaintiff is the right holder or interested parties of the trade secret. 2. The licensee of a trade secret exclusive license contract can file a trade secret infringement lawsuit independently. The licensee of a trade secret sole license contract can file a trade secret infringement lawsuit jointly with the right holder, or do so independently if the right holder does not file such a lawsuit. The licensee of a trade secret non-exclusive license contract may file a trade secret infringement lawsuit jointly with the right holder, or file such a lawsuit independently with written authorization of the right holder. II. Legal Requirements of Trade Secrets 3. The plaintiff may claim that the trade secret is not known to the public, if the said plaintiff provides evidence to prove that the trade secret shall not be generally known to or easily acquired by relevant personnel in the field when the alleged infringement occurs. 4. If the plaintiff provides evidence to prove that the new information that is sorted, improved, or processed from the information known to the public is not be generally known to or easily acquired by relevant personnel in the field when the alleged infringement occurs, the said plaintiff may claim that the said new information constitutes the trade secret. To prove that the new information is not known to the public, the plaintiff may submit the process, records, etc. of such sorting, improvement, and processing as evidence. 5. If the plaintiff claims to have taken corresponding non-disclosure measures for the trade secret, the said plaintiff may based on factors such as the nature of the trade secret and its carriers, the commercial value of the trade secret, the identifiable degree of the non-disclosure measures, the degree of correspondence between the non-disclosure measures and the trade secret, and the plaintiff’s willingness to keep confidential the trade secret, provide evidence to prove that reasonable non-disclosure measures commensurate with the trade secret have been taken thereby before the alleged infringement occurred in order to prevent the disclosure of the trade secret. 6. If the plaintiff claims to have taken corresponding non-disclosure measures for the trade secret, the said plaintiff can provide evidence to prove the existence of any of the following facts: (1) A confidentiality agreement has been signed or non-disclosure obligations have been provided for in the agreement; (2) Confidentiality requirements have been stated by means of articles of association, training, rules and regulations, written notifications, etc. to the employees, former employees, suppliers, customers, visitors, etc. of the plaintiff who can access and acquire the trade secret; (3) Visitors have been restricted from entering secret-related factories, workshops and other production and business premises or the said production and business premises have been subjected to differentiated management; (4) The trade secret and its carriers have been distinguished and managed by such means as marking, classifying, isolating, encrypting, sealing, and restricting the scope and authority of persons who can access or acquire the trade secret; (5) Measures such as prohibiting or restricting the use, access, storage and copying have been taken to computer equipment, electronic equipment, network equipment, storage equipment, software, etc. that can access and acquire the trade secret; (6) The plaintiff’s former employees have been required to register, return, delete or destroy the trade secret and its carriers that they have accessed or acquired, and to continue to assume their non-disclosure obligations; or (7) Other reasonable non-disclosure measures that have been taken. 7. If the plaintiff claims that the trade secret has commercial value, the said plaintiff may based on factors such as the cost of research and development of the trade secret, the profits from implementing the trade secret, the profits available from the trade secret, and the time period during which the competitive advantages can be maintained due to the trade secret, provide evidence to prove that the trade secret unknown to the public has real or potential commercial value. If the phased results formed in the production and business activities conform to the above provisions, the plaintiff can claim that the phased results have commercial value. III. Defense Against Legal Requirements 8. If the defendant claims that the plaintiff’s trade secret does not meet legal requirements of trade secrets, the said defendant can provide evidence to prove the existence of any of the following facts: (1) The trade secret had been known to the public when the alleged infringement occurred; (2) The plaintiff has not taken corresponding non-disclosure measures; (3) The trade secret does not have any commercial value; or (4) The trade secret is under other circumstances where it does not meet legal requirements. 9. If the defendant claims that the plaintiff’s trade secret has been known to the public, the said defendant can provide evidence to prove the existence of any of the following facts: (1) The plaintiff’s trade secret belongs to commercial rules or industry practice in the field; (2) The plaintiff’s trade secret only involves the simple combination of product size, structure, material and component, etc., so that it can be acquired directly by relevant personnel in the field by observing products in the market; (3) The plaintiff’s trade secret has been publicly disclosed in public publications or other media, including literature, promotional materials, web pages, etc.; (4) The plaintiff’s trade secret has been disclosed through public reports, exhibitions, etc.; or (5) The plaintiff’s trade secret can be acquired by relevant personnel in the field from other public channels. 10. If the defendant claims that the plaintiff has not taken corresponding non-disclosure measures for the trade secret thereof, the said defendant can provide evidence from such aspects as the identifiable degree of non-disclosure measures, the degree of correspondence between the non-disclosure measures and the value of the trade secret, the characteristics of the information carriers involved, and the degree of difficulty in acquiring the trade secret through proper means. Part II Reference for Proof of Infringement IV. Forms of Infringement 11. If the plaintiff claims that the defendant has committed an infringement of the trade secret thereof, the said plaintiff can provide evidence to prove the existence of any of the following facts: (1) The defendant acquires the plaintiff’s trade secret by theft, bribery, fraud, coercion, electronic intrusion, or other improper means; (2) The defendant discloses, uses or allows another person to use the plaintiff’s trade secret acquired by the foregoing means; (3) The defendant discloses, uses, or allows another person to use the trade secret in violation of the non-disclosure obligations of the said defendant or the plaintiff’s requirements for keeping such trade secret confidential; or (4) The defendant abets a person, tempts or aids a person into or in acquiring, disclosing, using or allowing another person to use the plaintiff’s trade secret in violation of the non-disclosure obligations thereof or the plaintiff’s requirements for keeping such trade secret confidential. 12. If the plaintiff claims that the defendant acquires the trade secret from the right holder by any other improper means, the said plaintiff can provide evidence to prove that the means by which the defendant acquires the trade secret violates the law or business ethics. 13. If the plaintiff claims that the defendant has committed a specific act of infringing on the trade secret thereof, the said plaintiff can provide any of the following evidence: (1) Products, product manuals, promotional materials, computer software or documents produced or made by the defendant that contain the plaintiff’s trade secret; (2) A contract between the defendant and a third party that contains the plaintiff’s trade secret; (3) The appraisal report, evaluation opinion, or investigation conclusion that presents that the alleged information used by the defendant is the same or substantially the same as the plaintiff’s trade secret; (4) Materials that present that the defendant has a contractual relationship or other relationship with the entity that discloses, uses, or allows another person to use the trade secret; (5) Records that the plaintiff’s trade secret keys, restricted access systems, or physical security devices have been cracked or circumvented; (6) Witness testimony that can show the theft, disclosure, or use of the plaintiff’s trade secret; (7) Product manuals and promotional materials containing the plaintiff’s trade secret; (8) Relevant materials that show the defendant still provide another person with help though the said defendant knows or should have known that such another person has infringed on the plaintiff’ trade secret; (9) Audio and video recordings, chat records, or emails about the defendant’s abetting a person, tempting or aiding a person into or in infringing upon the plaintiff’s trade secret; or (10) Other evidence that can prove that the defendant has committed an infringement of the trade secret. 14. If the plaintiff claims that the defendant violates the non-disclosure obligation thereof, the said plaintiff may provide evidence to prove that the defendant shall bear such non-disclosure obligation in accordance with the law or contract. If such non-disclosure obligation is not stipulated in the contract, the said plaintiff may provide evidence to prove that the defendant has known or should have known that the information acquired thereby is the plaintiff’s trade secret based on the principle of good faith, the nature and purpose of the contract, the process of contracting, and trading habits. 15. If the plaintiff claims that the defendant is an employee or former employee thereof, the said plaintiff may provide evidence to prove that the defendant is a member of the defendant’s operating, managerial or other personnel with labor relations. If the plaintiff claims that such employee has channels or opportunities to acquire such trade secret, the said plaintiff can provide evidence to prove the existence of any of the following facts: (1) Such employee’s duties, responsibilities and authorities are related to the involved trade secret; (2) The work undertaken by or the tasks assigned by the entity to such employee are related to the involved trade secret; (3) Such employee participates in production and business activities related to the trade secret; (4) Such employee once kept, used, stored, copied, controlled or otherwise accessed or acquired the involved trade secret and its carriers; or (5) There are other facts that prove such employee has channels or opportunities to acquire the involved trade secret. 16. If the plaintiff claims that the alleged information is substantially the same as the trade secret thereof, the said plaintiff can provide evidence based on such factors as degree of similarities and differences between the alleged information and such trade secret, whether relevant personnel in the field will easily think of the difference between the alleged information and such trade secret when the alleged infringement occurs, whether the alleged information is substantially different from such trade secret in use, use method, purpose, effect, etc., and the trade secret-related information in the public domain. Specifically, the plaintiff can provide any of the following evidence: (1) The appraisal opinions or evaluation opinions issued by a qualified appraisal agency or evaluation agency, and a relevant expert assistant’s opinions; (2) Products, contracts, or letters of intent that can reflect the alleged information is substantially the same as the plaintiff’s trade secret; (3) Source of the aforementioned evidence from a third party related to the defendant; or (4) Other evidence that can prove that the alleged information is substantially the same as the plaintiff’s trade secret. 17. If the plaintiff claims that the defendant uses the trade secret thereof, the said plaintiff may provide evidence to prove the existence of any of the following facts: (1) The defendant’s direct use of the plaintiff’s trade secret in production and operation activities; (2) The defendant’s use of such trade secret after modification or improvement thereof; or (3) The defendant’s adjustment, optimization or improvement of relevant production and business activities based on such trade secret. 18. If the plaintiff provides preliminary evidence that reasonably shows that the trade secret thereof has been infringed upon, and any piece of the following evidence, the defendant shall prove that it hasn’t committed any act of infringing upon such trade secret: (1) There is evidence that the defendant has channels or opportunities to acquire such trade secret, and the alleged information used thereby is substantially the same as such trade secret; (2) There is evidence that such trade secret has been disclosed or used by the defendant or is at risk of being disclosed or used thereby; or (3) There is other evidence that the trade secret has been infringed by the defendant. 19. If the plaintiff can provide evidence to prove that a natural person, legal person, or unincorporated organization other than a business has infringed on the business secret thereof, the said plaintiff can file a lawsuit in accordance with relevant laws and regulations and claim the civil liability of the infringer. V. Defense against Infringement 20. If the defendant denies infringement of the plaintiff’s trade secret, the said defendant can provide any of the following evidence: (1) The appraisal opinion, evaluation report or investigation conclusion issued by a qualified appraisal agency or evaluation agency that presents the alleged information is not the same as the plaintiff’s trade secret; (2) The lawful authorization letter or contract that proves the defendant discloses, uses or allows another person to use the trade secret upon lawful authorization; (3) Development documents, research and development records and audio-video files about the project independently researched and developed by the defendant or the reverse engineering; (4) The customer’s explanation or witness testimony about the plaintiff’s voluntary market transactions with the defendant who is a former employee of the plaintiff or a new entity thereof based on the trust in such employee; or (5) Other evidence. 21. If the defendant claims that the alleged information is acquired through reverse engineering, the said defendant can provide any of the following evidence: (1) The purchase contract of the product obtained through public channels or the certificate or bill of accepting the given product; (2) Work records, videos, or document data that show the relevant technical information is obtained from the product acquired through public channels by relevant technical means such as disassembly, surveying, mapping, and analysis; (3) Contracts or emails that prove relevant technical information is obtained from the product acquired through public channels by entrusting others to use such technical means as disassembly, surveying, mapping and analysis; or (4) Other evidence that can prove the alleged information is acquired through reverse engineering. 22. If the defendant claims that the alleged information is obtained on the basis of personal reliance, the said defendant can provide any of the following evidence: (1) Description of the characteristics of the industry that emphasizes personal skills; (2) Statements, explanations, chatting records or emails in which the customer clarifies the voluntary transactions with defendant on the basis of personal reliance; (3) Documents or communication records that prove neither material conditions nor the trading platform provided by the plaintiff are/is used in the transaction with the relevant customer; or (4) Other evidence that can prove that the alleged information is acquired based on personal reliance. Part III Reference for Proof on Requests for Civil Liability VI. Cease of Infringement 23. For the civil liability of cease of infringement ruled for an act of infringing upon a trade secret, the period of cease of infringement generally last until the date when the trade secret is known to the public. If the plaintiff can provide evidence to prove that the period of cease of infringement ruled in accordance with the preceding paragraph is obviously unreasonable, the said plaintiff may request the court to rule that the defendant stop using the plaintiff’s trade secret within a certain period or to a certain scope while protecting according to law the competitive advantages of such trade secret. 24. The plaintiff may request the court to rule that the defendant return or destroy carriers of the trade secret and delete the alleged information under the control thereof. VII. Damages 25. If the plaintiff can provide evidence to prove the actual losses suffered thereby due to the infringement, the said plaintiff may request the court to determine the amount of damages according to such actual losses; if it’s difficult to determine such actual losses but the plaintiff can provide evidence to prove the defendant’s profits from the infringement, the said plaintiff may request the court to determine the amount of damages according to such profits; if it’s difficult to determine neither such losses nor such profits, the plaintiff may request the court to reasonably determine the amount of damages with reference to the multiple of the trade secret license fee. If the defendant commits an act of intentionally infringing upon the plaintiff’s trade secret and the consequences are serious, the plaintiff may request the court to determine the amount of damages more than one time but not more than five times the amount determined in accordance with the above-mentioned method. The amount of damages include the reasonable expenses paid by the plaintiff to stop the infringement. 26. If the plaintiff requests to determine the actual losses incurred due to the infringement with reference to the trade secret license fee, the said plaintiff may provide evidence to prove the nature, content, actual performance of the license, and the nature, circumstances, consequences, etc. of the infringement. 27. If it is difficult to determine any of the plaintiff’s actual losses due to the infringement, the defendant’s profits from the infringement, and the trade secret license fee, the plaintiff may request the court to award compensation no less than RMB 5 million based on the consequences of the infringement. 28. If the plaintiff requests the court to award compensation no less than RMB 5 million, the said plaintiff may provide evidence to prove the nature, commercial value, research and development cost and degree of innovation of the trade secret, the competitive advantages the trade secret can bring, as well as the nature, circumstances, consequences and other facts of the infringement and the defendant’s subjective fault. 29. If the plaintiff has provided preliminary evidence of the profits the defendant has obtained from the infringement, but the account book or material related to the infringement of the trade secret is in the possession of the defendant, the plaintiff may request the court to rule that the defendant provide such account book or material. If the defendant refuses to provide it without justifiable reasons or does not provide it truthfully, the plaintiff may request the court to determine the profits obtained by the defendant from the infringement based on the claims made and evidence provided thereby. 30. If the plaintiff provides evidence to prove that the trade secret is known to the public due to the infringement, the said plaintiff may request the court to consider the commercial value of the trade secret when determining the amount of damages in accordance with the law. 31. If the plaintiff claims that the defendant intentionally infringes upon the trade secret thereof and the consequences are serious, and requests punitive damages, the amount and method of calculation of damages and the facts and reasons on which they are based shall be clarified when filing the lawsuit. 32. If the plaintiff claims that the defendant has the intention to infringe on the trade secret thereof, the said plaintiff may provide evidence based on any of the following facts: (1) The defendant continues to commit the infringement after being notified or warned by the plaintiff or interested parties; (2) The defendant or the legal representative or manager thereof is the legal representative, manager or actual controller of the plaintiff or interested parties; (3) The defendant has formed labor, labor service, cooperation, license, distribution, agency, representative or other relationship with the plaintiff or interested parties, and has accessed the alleged information; (4) The defendant has business dealings or negotiated with the plaintiff or interested parties, and has accessed the alleged information; or (5) Other circumstances under which the defendant is deemed to have such intention. 33. If the plaintiff claims that the defendant’s infringement of the trade secret thereof causes serious consequences, the said plaintiff may provide evidence of any of the following facts: (1) After being punished by an administrative penalty or a court decision for infringement of the plaintiff’s trade secret, the defendant commits a same or similar infringement; (2) The defendant operates mainly by infringing the trade secret; (3) The infringement lasts for a long time; (4) The defendant forges, destroys or conceals evidence of infringement; (5) The defendant refuses to perform an order of preservation; (6) The defendant profits a lot or the plaintiff suffers huge losses from the infringement; (7) The infringement may endanger national security, public interest or personal health; or (8) Other circumstances in which it shall be deemed that serious consequences are caused. 34. Where the plaintiff claims punitive damages, the plaintiff’s actual losses, the illegal gains or profits from the infringement of the defendant can be taken as the basis for calculation. Such basis does not include reasonable expenses paid by the plaintiff to stop the infringement. Part IV Reference for Proof of Procedural Matters VIII. Preservation 35. Where any evidence may be extinguished or may be hard to obtain at a later time, the applicant may, in the course of an action, apply to the court for evidence preservation. 36. Where any evidence may be extinguished or may be hard to obtain at a later time, if the circumstances are urgent, the applicant may, before instituting an action, apply to the court for evidence preservation. 37. If the respondent attempts to or has used improper means to acquire, disclose, use or allow another person to use the applicant’s trade secret, which may make it difficult to enforce the judgment or cause other damages to the applicant, or will cause irreparable damages to the applicant's legitimate rights and interests, the applicant may, in the course of an action, apply to the court for behavior preservation. 38. If the circumstances are urgent, not applying for preservation immediately will make it difficult to enforce the judgment or cause other damages to the applicant, or will cause irreparable damages to the applicant’s legitimate rights and interests, the applicant may, before instituting an action, apply to the court for behavior preservation. 39. If the applicant applies to the court for behavior preservation and claims “the circumstances are urgent”, the said applicant may provide evidence based on any of the following facts: (1) The applicant’s trade secret is about to be illegally disclosed; (2) The disputed trade secret is about to be illegally disposed of; (3) The applicant’s trade secret is being or about to be infringed upon in time-sensitive occasions such as trade fairs; or (4) Other circumstances that preservation measures shall be taken immediately happen. 40. Where the applicant applies for behavior preservation and claims that the respondent’s behavior will cause “irreparable damages” thereto, the said applicant may provide evidence based on any of the following facts: (1) The respondent’s act will infringe upon the applicant’s rights and interests such as goodwill and cause irreparable damages thereto; (2) The respondent’s act will cause the infringement to be difficult to control and significantly increase damages to the applicant; (3) The infringement by the respondent will result in a significant decrease in the relevant market share of the applicant; or (4) Other irreparable damages will be caused to the applicant. 41. If the applicant applies for behavior preservation, the said applicant shall provide security in accordance with the law. The amount of security provided by the applicant shall be equivalent to the losses that the respondent may suffer as a result of taking behavior preservation measures, including reasonable losses such as the sales benefits and storage costs of the products involved in the cease of infringement ruled. 42. Behavior preservation measures are generally not released because of the security that the respondent provides, except with the consent of the applicant. 43. If the applicant can clarify the specific content of the trade secret after the preservation application is filed and before the preservation ruling is made, and provide the contract, document, computer software, product, bidding document, database files, and other evidence containing such trade secret, the said applicant may apply for evidence preservation or behavior preservation before or during the lawsuit in order to stop the infringement of the trade secret thereof. 44. If the respondent’s actions or other reasons may make it difficult to enforce the judgment or cause other damages to the applicant, the applicant may apply to the court for property preservation and provide the corresponding security according to law in the course of the lawsuit. 45. If the circumstances are urgent, not applying for preservation immediately will cause irreparable damages to the applicant's legitimate rights and interests, the applicant may apply to the court for property preservation according to law before filing a lawsuit. The applicant shall provide security equivalent to the preservation amount requested. 46. The respondent may provide sufficient and effective security to request the release of the property preservation. IX. Investigation Order 47. If the applicant requests the court to issue an investigation order for the purposes of investigation and collection of evidence, and entrusts an agent to do so, the requirements under which the application for investigation and collection of evidence shall be approved and the following requirements shall be met at the same time: (1) The applicant’s agent is a practicing lawyer, and the person who holds such order to investigate and collect evidence on behalf of the applicant is the practicing lawyer specified in the investigation order; (2) The investigation order is sufficient to overcome the objective reasons why the applicant and the agent thereof cannot collect evidence on their own; and (3) The evidence investigated and collected involves not any of the state secrets, trade secrets, personal privacy, etc., and under no other circumstances is it not suitable for such agent to hold such investigation order for collecting evidence. 48. The agent holding the investigation order investigates and collects evidence from the respondent in accordance with the name or scope of the evidence specified in such investigation order within its validity period. When such agent collects evidence from the respondent, an original practice certificate thereof is presented to the respondent for verification. 49. After verifying the investigation order and the identity of the involved agent, the respondent provides evidence in accordance with the name or scope specified in the investigation order. 50. The evidence provided by the respondent is sealed under the joint witness of the agent holding the investigation order and the respondent, and then submitted to the court timely and completely by such agent or the respondent by mail within a reasonable period of time. 51. If the respondent fails to provide evidence or refuses to assist in the investigation for some reason, the agent holding the investigation order can explain the relevant situation to the court in writing within three days upon the expiration of the investigation order. X. Non-disclosure Measures in Litigation 52. In a case involving a trade secret, the parties may apply for a trial in camera. The parties may apply to the court to delete the information involving the trade secret when publishing judgments on the Internet. 53. If the evidence submitted by the parties involves a trade secret or other business information that needs to be kept confidential, the parties may apply to the court to take necessary non-disclosure measures in litigation activities such as evidence preservation, evidence exchange, proof cross-examination, entrusted appraisal, inquiries, and court sessions. Such non-disclosure measures include but are not limited to the following circumstances: (1) In different litigation processes, to apply for restrictions on the scope of persons who have access to such evidence; (2) To request the parties who have access to such evidence to sign a non-disclosure guarantee letter; (3) To apply for non-exchange of such evidence, and only presenting such evidence to the other party for the purpose of delivering the cross-examination opinions in the court; (4) To cover the part of the evidence that needs to be kept confidential without affecting the trial of the case; and (5) To apply for other necessary non-disclosure measures. 54. The parties who have access to the evidence mentioned in the preceding paragraph shall not disclose, use, or allow another person to use the confidential information that the parties have accessed during the proceedings for any purpose other than the litigation in this case. 55. If a party in violation of preceding paragraph, discloses the trade secret without authorization or uses the trade secret other than litigation activities or allows another person to use the trade secret that the party accesses to or acquires in litigation, the said party shall bear civil liability in accordance with the law. If the circumstances provided for in Article 111 of the Civil Procedure Law happen, compulsory measures shall be taken in accordance with the law; if a crime is constituted, the party shall be held criminally responsible. XI. Criminal and Civil Cross Cases 56. If the evidence related to the alleged infringement is preserved by the public security organ, the procuratorial organ or the court, and the parties of a civil case of trade secret infringement cannot collect it on their own due to objective reasons, they may apply to the court for investigation and collection of the above-mentioned evidence, unless they may affect the ongoing criminal proceedings. 57. The parties can claim that the amount of damages in civil cases of infringement of the same trade secret shall be determined based on the actual losses or illegal profits as determined by the effective criminal judgment. 58. If a criminal case involving infringement of a trade secret has not yet been concluded, the parties may request the court to suspend the trial of the civil case of such infringement of the trade secret. Whether the trial is suspended shall be determined by the trial court of the civil case based on the specific circumstances of the case. |
|