Why this guide exists
Online brand infringement has become a structural problem of internet commerce. According to the OECD and EUIPO, the global trade in counterfeit and pirated goods now exceeds 460 billion US dollars annually, with a substantial portion moving through online marketplaces and social commerce platforms. For brand owners, the practical question is not whether infringement will happen, but how quickly it can be detected, documented, and removed.
The challenge is that effective enforcement requires evidence, and evidence requires capture at the right moment. A counterfeit listing on Amazon may go live in the morning, accumulate hundreds of orders by lunchtime, and be replaced by a slightly different listing by the next day. A copycat website may be online for weeks before being noticed by the brand team, then disappear within hours of receiving a cease and desist letter. A trademark-infringing social media account may have its content edited or its handle changed before screenshots are even reviewed.
The lesson is consistent across categories: by the time enforcement action is contemplated, the original infringement may already be gone. Without evidence captured at the moment of infringement, the brand owner is left with secondhand accounts, partial archives, and gaps that opposing parties can exploit. With proper evidence, the brand owner can move from reactive complaint to documented proof in any forum that matters — platform takedown systems, customs seizures, civil litigation, criminal complaints.
This guide explains how to build a brand protection evidence workflow that produces this kind of proof reliably and at scale. It covers the legal frameworks that drive the enforcement landscape in 2026 — DSA Article 16 in the EU, Amazon VeRO globally, UDRP for domains, and the WIPO and EUIPO mechanisms for international coordination. It covers the practical mechanics of batch capture and API integration. And it covers the recurring mistakes that erode brand teams' enforcement leverage.
The audience for this guide is trademark attorneys, in-house IP counsel, brand managers, anti-counterfeiting teams, and the e-commerce compliance officers who increasingly handle this work alongside marketing, customer service, and platform relations. If brand protection is part of your job, this guide gives you the evidentiary foundation that makes everything else easier.
The unique evidentiary challenges of online brand infringement
Brand infringement evidence has properties that make it harder to handle than most other forms of digital evidence. Understanding these properties is the first step toward building workflows that account for them.
First, infringing content is volatile by design. Sellers of counterfeit goods know that their listings will be challenged. They engineer their operations to be transient — listings appear and disappear, account names rotate, product images are subtly modified between iterations, and entire marketplace presences are abandoned and rebuilt under new accounts within days. The brand team that captures evidence next week instead of today is often capturing nothing at all.
Second, infringing content is often distributed across many platforms simultaneously. A single counterfeit operation might list on Amazon, eBay, AliExpress, Wish, TikTok Shop, Instagram, and a network of standalone Shopify stores, all selling variations of the same fake product. Effective enforcement requires capturing evidence across all of these surfaces, not just the one that happened to be noticed first.
Third, the relevant evidence is rarely just the infringing image or text. It is the full context — the seller's account history, the price, the volume of reviews, the shipping origin, the related listings, the comments and questions, the date stamps shown on the page, the URL structure. Each of these pieces becomes important in different forums. A platform takedown might require only the listing URL. A civil lawsuit might require the seller's full history. A customs seizure might require shipping origin data. A criminal complaint might require evidence of scale.
Fourth, the evidentiary standards differ across the forums where the evidence will be used. A platform takedown system may accept a screenshot. A national court may require a notarized capture or a forensic expert report. An international UDRP panel may require WHOIS records and historical archives. The evidence that satisfies one forum may be inadequate for another, but capturing the same content twice with different methods is usually impossible because the content has changed in the interim.
The practical implication is that brand protection evidence should be captured to the highest standard available, even when the immediate use case has lower requirements. A capture that satisfies the requirements of a national court will also satisfy the requirements of a platform takedown system. A capture that only meets platform requirements may need to be redone — at higher cost, with weaker results — when the same matter escalates to litigation.
DSA Article 16: the new EU takedown framework
The Digital Services Act, formally Regulation (EU) 2022/2065, has reshaped the legal foundation for online content takedowns in the European Union. For brand owners, the most important provision is Article 16, which establishes a harmonized notice and action mechanism that applies to all hosting service providers operating in the EU.
Article 16 requires hosting providers to put in place mechanisms allowing any individual or entity to notify them of specific items of information considered to be illegal content. The notice must include a sufficiently substantiated explanation of the reasons why the individual or entity considers the information to be illegal, a clear indication of the exact electronic location of that information, the name and contact details of the notifying party, and a statement of good faith belief that the information is accurate and complete.
The most important practical provision in Article 16 is paragraph 3, which states that notices that include those elements shall give rise to actual knowledge or awareness for the purposes of the limited liability exemption. In plain language: a properly formatted notice flips the platform's liability status. Before the notice, the platform is not legally responsible for the infringing content. After receiving a properly formatted notice, the platform is on notice — and if it does not act expeditiously to remove or disable access to the content, it loses its liability protection and can itself be held responsible for the infringement.
This shift in liability is the lever that makes Article 16 effective. Platforms now have a strong incentive to remove infringing content quickly when they receive properly formatted notices, because the alternative is taking on direct liability for the infringement themselves. For brand owners, the practical implication is that the quality and completeness of the takedown notice matters enormously. A notice that meets all the Article 16 requirements is significantly more likely to result in fast removal than a notice that omits any of the required elements.
Each of the Article 16 requirements has implications for evidence capture. The substantiated explanation of why the content is illegal requires evidence of the trademark or copyright being infringed, plus evidence of how the specific content infringes. The clear indication of electronic location requires the exact URL, captured at the time of the notice so it cannot be later disputed. The statement of good faith belief requires that the brand team has actually examined the content and confirmed the infringement — not just received an automated alert.
DSA also introduces obligations on platforms regarding trusted flaggers. Article 22 establishes that organizations awarded trusted flagger status by national Digital Services Coordinators have their notices treated with priority. For high-volume brand owners, achieving trusted flagger status — typically through industry associations or specialized brand protection organizations — can dramatically improve takedown speed. The application process for trusted flagger status itself requires evidence of the organization's expertise and capacity, which a strong evidence workflow supports.
Beyond Article 16, the DSA introduces transparency obligations that affect brand protection evidence indirectly. Platforms must publish transparency reports detailing the number of notices received, the actions taken, and the average response times. Brand owners can use this data to track which platforms are responsive to which kinds of notices, and to escalate where response times indicate systemic non-compliance with DSA obligations.
Amazon VeRO and platform-specific takedown systems
Amazon's Brand Registry and the older Verified Rights Owner (VeRO) program represent the largest single channel for trademark and counterfeit takedowns globally. Amazon processes millions of brand protection notices annually, and the workflow it imposes shapes how much of the brand protection industry operates.
Brand Registry, the modern incarnation, requires brand owners to enroll their registered trademarks with Amazon and provide proof of ownership. Once enrolled, brand owners can submit takedown notices through the Report a Violation tool, which routes the notice to Amazon's brand protection team for review. Notices that include adequate evidence are processed within hours; notices with insufficient evidence may be rejected or stalled in queue.
What constitutes adequate evidence varies by violation type. For counterfeit goods, Amazon typically requires evidence that the listed product is not genuine, which can include test purchase results, comparison images showing differences from authentic products, statements from authorized resellers, or product authentication reports. For trademark infringement on listings that don't involve counterfeits — such as unauthorized use of a trademark in product titles or descriptions — Amazon requires evidence of trademark registration plus the specific text or imagery being infringed.
The evidence capture implications are significant. A counterfeit listing might be live for only days or hours before being replaced. Capturing the full listing — title, images, seller name, price, review section, Q&A section, shipping information, and the URL itself — at the moment of identification is essential. A capture made after the listing has changed is often useless, because Amazon's review process will check the current state of the listing, not the historical state.
Beyond Amazon, similar workflows exist on every major platform: eBay's Verified Rights Owner Program, Alibaba's IP Protection Platform, AliExpress's Intellectual Property Protection portal, Etsy's IP infringement reporting, Walmart's Brand Portal, Mercari's IP report system, and dozens of regional marketplaces. Each has its own form, its own evidence requirements, and its own processing timelines. A brand team handling enforcement at scale typically maintains specific evidence packages tailored to each platform's requirements.
Social commerce platforms — TikTok Shop, Instagram Shop, Facebook Marketplace, Pinterest — have added their own takedown systems, often with tighter integration to the underlying social platform's content moderation. Evidence requirements on social commerce are typically less developed than on traditional e-commerce platforms, but evolving rapidly. The capture workflow that satisfies Amazon will generally satisfy social commerce platforms as well, but additional context about the social account and its activity history may be relevant.
A practical pattern that emerges from working across these systems is the value of evidence packages over individual screenshots. A package that includes the URL, the rendered page, the underlying HTML source, a cryptographic hash of the captured data, and a qualified or trusted timestamp can be submitted to any platform's takedown system without modification. The same package supports DSA Article 16 notices, civil litigation, and customs filings. Building the workflow around this kind of unified evidence package eliminates the need to repeatedly recapture the same content for different forums.
UDRP and domain-name disputes
Counterfeit and trademark-infringing operations frequently rely on domain names that mirror the brand they are infringing. Common patterns include typosquatting domains, brand names with extra suffixes, brand names in different top-level domains, and combinations of brand names with terms like outlet, official, or store. Disputing these domains requires a different procedural framework than platform takedowns.
The Uniform Domain-Name Dispute-Resolution Policy, or UDRP, is the principal mechanism for resolving disputes about generic top-level domains such as .com, .net, .org, and most newer gTLDs. UDRP is administered by ICANN-approved providers including the World Intellectual Property Organization, the Forum, the Asian Domain Name Dispute Resolution Centre, the Czech Arbitration Court, and the Arab Center for Dispute Resolution. The choice of provider affects procedural details but not the substantive standards.
A UDRP complaint must establish three elements. First, that the disputed domain name is identical or confusingly similar to a trademark or service mark in which the complainant has rights. Second, that the registrant of the disputed domain has no rights or legitimate interests in respect of the domain name. Third, that the disputed domain name has been registered and is being used in bad faith. The complainant bears the burden of proof on all three elements.
Each element has specific evidence implications. The trademark rights element requires evidence of trademark registration or common-law trademark rights, plus evidence that those rights predate the disputed registration. The legitimate interests element typically involves negative evidence — showing that the registrant has not made bona fide use of the domain — which often relies on captures of the website hosted at the disputed domain to demonstrate that no genuine business is being conducted there. The bad faith element involves evidence of the registrant's intent, which can include captures showing offers to sell the domain, captures showing pay-per-click parking pages monetizing the trademark, captures showing competing products, or captures showing that the registrant is part of a pattern of similar registrations.
Country-code top-level domains (ccTLDs) have their own dispute resolution policies, which vary significantly. The .eu domain uses the ADR.eu procedure administered by the Czech Arbitration Court. The .uk domain uses Nominet's Dispute Resolution Service. The .de domain uses German court litigation rather than an administrative procedure. Brand owners pursuing ccTLD disputes need to research the specific applicable rules and adjust evidence preparation accordingly.
Across all of these procedures, the most common evidence problem is delay. By the time a UDRP complaint is filed, the disputed domain may have been parked, redirected, or have its content changed. The version of the website that supports the bad faith argument may no longer be live. Strong UDRP practice involves capturing evidence as soon as the disputed domain is identified, not when the complaint is being prepared. The capture should include not only the home page but also any deeper pages relevant to the bad faith analysis, plus WHOIS data, plus historical archive captures from services like the Wayback Machine.
WHOIS records require special attention because of GDPR-driven changes since 2018. Many ccTLD registries and several gTLD registrars now redact registrant contact information from public WHOIS, requiring the use of registrar request systems or court orders to obtain the underlying data. Capturing the redacted public WHOIS at the time of identification is still valuable, both as evidence of the redaction itself and as a baseline for any subsequent disclosure request.
Common types of online brand infringement
Brand protection workflows must accommodate a range of infringement types, each with its own evidence requirements. Understanding the typology helps brand teams design captures that satisfy the needs of each category without duplication.
Counterfeit goods are the most prominent category. These are products that bear the brand's trademarks but are not produced or authorized by the brand. Evidence capture should include the listing or store page where the product is offered, the product images, any text claiming authenticity or affiliation with the brand, the seller information, and price and shipping data that may indicate the product's true origin. Where possible, evidence should be supplemented by test purchase results documenting the product as received.
Copycat and lookalike products represent a softer form of infringement, where products imitate the brand's distinctive design or trade dress without using the trademarks directly. Evidence here focuses on visual comparisons, packaging similarities, and the overall commercial impression created by the offering. These cases often involve more nuanced analysis than direct counterfeits, and evidence packages should preserve high-resolution images of all visual elements for later expert evaluation.
Trademark infringement in listings refers to unauthorized use of brand names, logos, or trademarks in product titles, descriptions, or metadata, often for products that have nothing to do with the brand. A common example is a generic phone case listed as compatible with an iPhone, where the use of the iPhone trademark in the title may exceed fair use limits. Evidence requirements focus on the specific text and imagery used, with attention to context that establishes whether the use crosses from descriptive into infringing.
Domain-based infringement includes typosquatting, brand combination domains, and parking pages monetizing brand names. Evidence captures should include the domain itself, the content hosted at that domain, any redirect chains, WHOIS data, and the broader pattern of similar registrations by the same registrant where identifiable.
Social media impersonation involves accounts that pose as the brand, often using the brand's logos, slogans, and visual identity to defraud consumers or damage brand reputation. Evidence captures must preserve the account profile, recent posts, follower counts, comments and engagement, and any direct messaging that demonstrates fraudulent intent. Social media evidence is particularly volatile and benefits from prompt capture.
Phishing and scam sites that imitate the brand's official site to steal credentials or payment data represent a hybrid of brand infringement and consumer fraud. Evidence captures should preserve the full visual replication of the brand's design, the form fields used to collect data, and any backend information that can be discovered through inspection of the page source. These cases often warrant cooperation with law enforcement in addition to platform-level enforcement.
SEO hijacking occurs when third parties bid on the brand's terms in search advertising, or optimize affiliate or unauthorized reseller pages to outrank the brand in organic search results. Evidence requires captures of the search results pages themselves, with the geographic context noted, since search results vary by region. Captures should be made from clean browsers without personalization to ensure reproducibility.
What evidence courts and platforms actually require
Different forums apply different evidentiary standards to brand protection cases. A capture that satisfies one forum may be inadequate for another. Understanding the standards helps brand teams calibrate their workflows to produce evidence that meets the highest applicable threshold.
Platform takedown systems generally apply the most permissive standards. Amazon, eBay, and similar platforms typically accept screenshots and URLs as evidence, supplemented by trademark registration documents. The platform's interest is in moving quickly, and the evidentiary standards reflect that. However, platforms reserve the right to reject notices they consider insufficient or in bad faith, and they may demand stronger evidence in disputes between brand owners and sellers.
Civil litigation in EU member states generally applies the standards of national civil procedure, modified by EU regulations including the Trademark Directive, the Trade Secrets Directive, and the IP Enforcement Directive. Most jurisdictions apply some form of free evaluation of evidence, where the judge weighs the evidence presented and determines its credibility. Captures that are demonstrably authentic and unmodified, supported by trusted timestamps and chain of custody documentation, are typically given significant weight. Captures that lack these features face higher scrutiny and may require corroboration through expert testimony or additional evidence.
Civil litigation in the United States applies the Federal Rules of Evidence, with Rule 901 establishing the requirement that evidence be authenticated as what it purports to be. Federal Rule of Evidence 902(13) and 902(14), added by 2017 amendments, address the authentication of records generated by electronic processes and the authentication of digital records based on hash values. Captures supported by cryptographic hashes and trusted timestamps fit naturally within the 902(13) and 902(14) frameworks and can be authenticated without testimony, simplifying their introduction at trial.
UDRP and similar arbitration procedures apply their own procedural rules, which generally focus on documentary evidence rather than testimony. Captures of the disputed domain's content, supplemented by WHOIS data and historical archive evidence, are the typical evidence package. Quality matters because UDRP panels reach decisions on the documentary record without the opportunity to question witnesses.
Customs procedures across major jurisdictions — US Customs and Border Protection, EU customs authorities operating under the Anti-Counterfeiting Regulation, and similar regional bodies — apply specific evidence requirements for goods being detained at the border. These typically require evidence of trademark registration, evidence of the relationship between the brand owner and any authorized importers, and evidence supporting the conclusion that the detained goods are counterfeit. Captures of online listings that show the goods being offered for sale can be supporting evidence in these proceedings.
Criminal proceedings in major jurisdictions apply the highest evidentiary standards, often requiring chain of custody documentation, expert witness testimony, and original evidence rather than copies. Brand teams pursuing criminal enforcement should engage with prosecutors early, as the evidence capture process for criminal matters often differs from administrative or civil matters and may require law enforcement involvement at the capture stage to satisfy chain of custody standards.
Building a brand protection evidence workflow
An effective brand protection evidence workflow integrates monitoring, capture, packaging, and submission into a continuous operation. The exact structure depends on brand size, but the core components are similar across organizations.
Monitoring is the input layer. It identifies content for capture. Sources include automated brand monitoring tools that scan marketplaces and search results for trademark mentions, social listening tools that track brand mentions across social media, dedicated counterfeit detection services, manual searches by brand team members, and tip lines from authorized resellers and consumers. Monitoring quality determines workflow effectiveness — capture and enforcement cannot remediate infringements that are never detected.
Triage is the filtering layer. Not every brand mention is infringement, and not every infringement merits enforcement. Triage prioritizes detected items for capture based on factors including the type and severity of infringement, the platform involved, the geographic scope, the apparent volume or revenue of the infringing operation, and the brand's enforcement priorities. Documented triage criteria support consistent decision-making and create a defensible record of why certain matters were prioritized over others.
Capture is the evidentiary core. For each item that survives triage, the workflow generates an evidence package including the URL, the rendered page, the underlying source, related metadata, and a trusted or qualified timestamp. The capture method should be consistent across the brand's portfolio so that evidence is interchangeable across forums and submitters. Server-side capture tools that operate independently of the brand team's local browsers provide stronger chain of custody than browser-based capture, particularly for matters that may eventually reach court.
Packaging is the assembly layer. The captured evidence is combined with supporting documentation — trademark certificates, prior enforcement records, comparison evidence — into the format required by the target forum. The same underlying capture can be packaged differently for Amazon Brand Registry, for a DSA Article 16 notice, for a UDRP complaint, or for civil litigation. Maintaining the underlying capture in a stable, verifiable format simplifies repackaging across forums.
Submission and tracking is the action layer. The packaged evidence is submitted to the relevant forum, and the response is tracked. Successful takedowns are recorded as enforcement victories. Unsuccessful submissions are analyzed to determine whether the evidence was insufficient, the content was protected by a legitimate use defense, or the platform's enforcement was inconsistent. Tracking data feeds back into the workflow to improve future submissions.
Documentation closes the loop. The full enforcement history of each matter — when it was detected, when evidence was captured, when it was submitted, how it was resolved — is preserved as part of the brand's enforcement record. This documentation supports trusted flagger applications, customs registrations, and the bad faith arguments that often arise in subsequent disputes with the same infringer or related parties.
Batch capture: scaling brand monitoring
Brand monitoring at scale typically generates more capture targets than can be handled with manual single-item workflows. A medium-sized brand might detect hundreds of potential infringements weekly. A large global brand might detect thousands. Effective workflows therefore depend on batch capture — the ability to process many capture targets in parallel with consistent evidence quality.
The simplest batch capture pattern is queue-based. Detected items are added to a capture queue. A capture engine processes the queue, generating an evidence package for each item. The packages are stored in a structured archive indexed by URL, capture timestamp, and metadata. This pattern works well for tens to hundreds of items per day. Beyond that scale, additional considerations apply.
Rate limiting becomes critical at scale. Many websites detect and block automated traffic, and aggressive batch capture can trigger CAPTCHAs, IP blocks, or content variations served only to suspected bots. Effective batch capture systems use realistic browser fingerprints, distributed IP pools, and reasonable request timing to capture content as a normal user would see it. Without these measures, captured evidence may not represent what real users experience, potentially weakening enforcement arguments.
Geographic distribution is another scale consideration. Many brand infringements vary by geography — a counterfeit listing visible to US consumers may not be visible to EU consumers, and a search result ranking infringing pages in one country may rank legitimate pages in another. Batch capture from multiple geographic vantage points produces a more complete picture of the infringement landscape and supports geo-specific enforcement actions.
Deduplication becomes important as batches grow. The same infringing listing may be detected multiple times across monitoring sources, and capturing it multiple times wastes effort and complicates submission tracking. Effective batch systems use URL canonicalization and content hashing to identify duplicates and route them to a single capture and enforcement workflow.
Quality control is a frequently overlooked scale issue. Batch captures sometimes fail silently — a page may not load fully, an image may be missing, a page may have changed during capture. Without quality control, defective captures are submitted to platforms or filed in litigation packages, weakening enforcement leverage. Effective batch systems include automated quality checks that verify each capture for completeness before adding it to the evidence archive.
Cost economics shift at scale. A manual capture might require five to ten minutes of brand team time. Multiplied by hundreds of items per week, manual capture quickly becomes a full-time job for several team members. Batch capture systems amortize the engineering cost across many captures, often reducing per-capture cost by an order of magnitude. The cost savings can be reinvested in monitoring expansion or in stronger enforcement on higher-value matters.
API integration for automated brand monitoring
The most mature brand protection programs integrate evidence capture directly into their broader brand monitoring infrastructure through APIs. This level of integration eliminates manual handoffs between detection and capture, reduces time from infringement to evidence by hours or days, and supports continuous capture of high-priority targets.
A typical API integration pattern looks like this. Brand monitoring tools — whether commercial services such as Red Points, MarkMonitor, or BrandShield, or custom in-house systems — generate alerts when potentially infringing content is detected. These alerts trigger API calls to a capture service, which generates evidence packages for the alerted URLs. The packages are stored in a structured archive accessible via API, and notifications flow to the brand team's case management system. Submission to platform takedown systems can then be automated for clear-cut violations or queued for human review where judgment is required.
API design choices matter for integration reliability. Capture APIs should accept clear inputs — URL, optional context metadata, capture parameters — and return structured outputs including a capture identifier, the storage location of the evidence package, and metadata about the capture. Asynchronous capture patterns work better than synchronous for long-running captures of complex pages. Webhook callbacks notify integrating systems when captures complete. Idempotency keys prevent duplicate captures from concurrent calls.
Authentication and access control deserve particular attention because brand protection workflows often involve sensitive enforcement information. Captures of suspect counterfeit operations, evidence packages destined for litigation, and trusted flagger submissions all warrant access controls that prevent leakage to the entities being investigated. API key rotation, audit logging of access to evidence packages, and encryption at rest are standard requirements.
Error handling and resilience matter at scale. Network failures, target site outages, and rate limiting all generate transient errors that workflows must handle gracefully. APIs should return clear error codes that distinguish between permanent failures (the URL does not exist, the target site explicitly blocked capture) and transient failures (network timeout, rate limit, temporary server error). Workflows should retry transient failures with appropriate backoff while escalating permanent failures for human review.
Schema stability is critical for long-term integration value. Evidence packages captured today may be submitted as evidence years from now, and downstream systems that parse the packages depend on stable schemas. APIs should version their output formats and maintain backward compatibility where possible, with clear migration paths for breaking changes.
Integration with verification tools closes the loop. The same evidence package that flows from monitoring to capture to submission also needs to be verifiable by recipients — platforms, courts, opposing parties. APIs that produce evidence packages compatible with standard verification tools, such as RFC 3161 timestamp verification and OpenSSL-based hash verification, allow recipients to verify the evidence using freely available open-source software without depending on the brand owner's infrastructure.
Working with platforms: Amazon, Meta, Google, and others
Each major platform has its own personality when it comes to brand enforcement. Knowing the personalities helps brand teams calibrate their approach to maximize takedown success rates and minimize wasted effort on submissions that will be ignored or rejected.
Amazon emphasizes scale and automation. The Brand Registry team processes millions of notices and depends heavily on automated triage. Notices that fit Amazon's expected formats are processed quickly. Notices that deviate from those formats may sit in queue or be rejected without explanation. Engaging effectively with Amazon means matching their expected formats precisely, providing complete evidence, and using the Report a Violation tool rather than email channels where possible. For high-volume brands, the Brand Registry program offers escalation channels and dedicated brand specialists, but access is gated by enrollment level and historical relationship.
Meta — covering Facebook, Instagram, and WhatsApp — emphasizes platform-specific user experience considerations alongside legal compliance. Meta's IP report system works well for clear-cut trademark and copyright violations, but moves more slowly on content where free speech, satire, or commentary defenses might apply. Brand teams working with Meta benefit from clear, narrow takedown notices that focus on specific infringing elements rather than broader claims about the account or post in general.
Google operates several distinct surfaces, each with its own takedown infrastructure. Google Search has a removals page that addresses specific content types including copyright, defamation, and personal information. Google Ads has its own counterfeit and trademark policies. YouTube has the Content ID system for copyright matters and the trademark complaint form for trademark matters. Google Shopping has its own seller enforcement system. Brand teams working across Google surfaces typically maintain separate workflows for each, with separate templates and submission processes.
TikTok and ByteDance properties have evolved their brand protection systems rapidly as commerce features have grown. The TikTok IPR Protection portal handles copyright, trademark, and counterfeit reports. Response times have generally improved over time but vary significantly by region and content type. Evidence requirements are similar to other major platforms but the rapid product evolution on TikTok means that infringement often disappears within hours, requiring fast capture-to-submission workflows.
Alibaba Group platforms — including AliExpress, Taobao, Tmall, and Lazada — operate the IP Protection Platform, which is one of the most mature non-Western brand protection systems globally. The system supports detailed evidence submission and offers a structured dispute resolution process when sellers contest takedowns. Brand teams working in Asia-Pacific markets often find Alibaba's IP system more responsive than smaller regional platforms, but evidence requirements are stricter than on most Western platforms.
Smaller platforms vary widely. Some have well-developed brand protection systems modeled on the major platforms. Others have minimal or no formal takedown processes, requiring direct contact with platform legal teams or fallback to broader legal mechanisms such as DMCA notices for US-based platforms or DSA Article 16 notices for EU-based platforms. For unfamiliar platforms, the first step is typically to identify whether a formal brand protection program exists, and if not, to fall back to legal frameworks that apply to all platforms in the relevant jurisdiction.
International coordination: WIPO, EUIPO, and customs
Brand protection at international scale requires coordination across registration systems, enforcement bodies, and customs authorities. The brand owner whose enforcement strategy is integrated across these channels has structural advantages over an enforcement strategy that operates in isolation within each.
The World Intellectual Property Organization, WIPO, administers the Madrid System for international trademark registration, providing a single mechanism for filing trademark applications across more than 130 member countries. From a brand protection perspective, the Madrid registration is foundational — it establishes trademark rights that can be asserted in each member country without separate national registrations. WIPO also administers UDRP and several country-code dispute resolution policies, making it a central node in domain-related enforcement.
The European Union Intellectual Property Office, EUIPO, administers the EU Trademark and Community Design systems. EU trademark registrations cover all 27 member states with a single registration. For brand owners with EU presence, the EU trademark is typically the most efficient registration approach, and registration with EUIPO supports enforcement across the entire EU customs territory.
Customs registration is a critical and often underutilized brand protection tool. The EU's Application for Action procedure under the Anti-Counterfeiting Regulation allows brand owners to register their trademarks with EU customs authorities. Once registered, customs can detain shipments suspected of containing counterfeit goods at any point of entry into the EU. The brand owner is notified and has a fixed period to confirm that the goods are counterfeit, after which the customs authority can destroy the goods or pursue further enforcement. The same model exists in most major jurisdictions, including US Customs and Border Protection's recordation system, China Customs' protection program, and the UK's customs IP enforcement system.
Coordination across registration and enforcement is what produces leverage. A brand with EU trademark registration, customs registration in major importing countries, and active platform enforcement creates multiple chokepoints for counterfeit operations. Goods can be intercepted at the border, listings can be removed from platforms, domains can be transferred or suspended through UDRP, and supporting evidence flows naturally between these channels because the underlying trademark rights and evidence packages are shared.
International coordination also matters for the timing and sequencing of enforcement actions. A counterfeit operation often involves a foreign manufacturer, a logistics network, a series of platforms, and a network of resellers. Effective enforcement may require coordinated action against multiple components, sometimes with timing dependencies — moving against the platforms first might cause the operation to disperse before customs can intercept goods. Brand teams that coordinate across channels can sequence actions for maximum disruption.
Industry coalitions provide additional coordination capacity. Organizations such as the International Anticounterfeiting Coalition, the Anti-Counterfeiting Group, the Coalition Against Counterfeit and Piracy, and several regional and sector-specific groups facilitate intelligence sharing among brand owners facing common threats. Membership creates access to shared monitoring data, group enforcement actions, and trusted flagger applications that benefit all participants. Evidence workflows that produce shareable evidence packages — properly anonymized where required — increase a brand's value to such coalitions.
Common mistakes brand teams make
Several recurring mistakes appear across brand protection programs of all sizes. Recognizing them helps avoid problems that can erode enforcement leverage over time.
The first mistake is treating evidence capture as an afterthought. Many brand teams focus their resources on detection — the systems that find infringement — and treat capture as a manual step performed only when enforcement is initiated. This leads to evidence gaps when content disappears between detection and capture, weak evidence quality when captures are made hastily, and inconsistent evidence formats across the team. Capture should be treated as a core function with its own workflow, quality standards, and tools, not an ad-hoc activity performed by whichever team member is available.
The second mistake is using browser screenshots as the primary capture method. Browser screenshots are quick and intuitive but produce evidence that is weak compared to alternatives. Screenshots can be edited without leaving traces. Browser-based capture extensions can be exposed to manipulation through developer tools before capture. The captured image typically does not include the underlying HTML, the page metadata, or a trusted timestamp. When enforcement escalates to litigation, browser-screenshot-only evidence often requires reinforcement through expert testimony or supplementary evidence, at significant cost.
The third mistake is failing to capture context. A counterfeit listing is rarely meaningful in isolation. The evidence value comes from context — the seller's other listings, the price relative to authentic products, the geographic shipping origin, the review patterns, the related listings. Captures that focus narrowly on a single page miss the contextual evidence that often makes the difference between a successful takedown and a contested dispute. Effective workflows capture not just the target page but its surrounding context.
The fourth mistake is inconsistent evidence handling across cases. Different team members capturing evidence in different ways produces an enforcement record where some evidence is strong and other evidence is weak, often unpredictably. Opposing parties and platforms learn to challenge the weak evidence, eroding the brand's enforcement leverage even on the strong cases. Standardized capture procedures, applied consistently across the team, produce evidence with predictable quality that platforms and adjudicators learn to trust.
The fifth mistake is failing to preserve evidence beyond the immediate enforcement use. Successful takedowns are sometimes treated as the end of the matter, with the underlying evidence discarded once the offending content is removed. But the same infringer often returns under different identities, and a documented enforcement history makes subsequent matters easier — bad faith is established more easily, trusted flagger applications are stronger, customs and law enforcement engagement is more credible. Long-term evidence retention is a strategic asset, not just a compliance burden.
The sixth mistake is delegating brand protection entirely to external services without retaining underlying evidence access. Many brand owners use third-party brand protection services that handle detection, capture, and submission. These services are valuable but create lock-in and visibility gaps if the brand owner does not retain access to the underlying evidence packages. When relationships with vendors change, when matters escalate to litigation, or when international coordination requires evidence sharing, brand owners need direct access to the evidence — not just summaries provided by the vendor.
The seventh and most expensive mistake is delay. Online infringement is volatile. Detection systems generate alerts that sit in queues for days or weeks before being acted on. Capture happens after the offending content has been modified or removed. Submissions land in platform queues already too late to matter. Each step of delay erodes the brand's leverage and lets infringers operate longer before consequences arrive. The strongest brand protection programs treat speed as a primary operational metric and engineer their workflows for short detection-to-capture and capture-to-submission cycles.
Frequently asked questions
What is the difference between DSA Article 16 and DMCA?
Do I need a registered trademark to use Amazon Brand Registry?
How long does a UDRP proceeding take?
Can I capture evidence of a competitor's website without their permission?
What is a trusted flagger under DSA?
Should I capture evidence of every infringement I detect?
Can I use evidence captured by an automated tool in court?
What happens if a platform refuses to act on my takedown notice?
How long should I retain brand protection evidence?
Conclusion
Brand protection in 2026 has moved past the era when individual takedowns were the primary unit of work. The brands that enforce effectively have built workflows — continuous monitoring, structured capture, packaged evidence, coordinated submission, and tracked outcomes — that scale across thousands of matters annually while maintaining the evidentiary quality required for the highest-stakes proceedings.
The legal framework is increasingly favorable to organized enforcement. DSA Article 16 has harmonized notice-and-action across the EU and given properly formatted notices direct legal effect. Platform brand protection programs have matured into reliable channels for high-volume enforcement. UDRP and customs registration provide tools that work consistently across jurisdictions. The infrastructure exists. The remaining work is building workflows that take advantage of it.
Evidence is the foundation that makes the workflow possible. A brand team without reliable evidence capture is reactive, slow, and easily challenged. A brand team with strong evidence capture moves quickly, reliably, and credibly across all the forums where enforcement matters. Investment in evidence workflows pays back across every dimension of brand protection — faster takedowns, stronger litigation, more effective international coordination, better trusted flagger and customs registration applications.
The technical foundations for strong brand protection evidence are mature in 2026. Server-side capture eliminates manipulation vectors that browser-based tools are vulnerable to. Cryptographic hashes and trusted timestamps satisfy authentication requirements across major jurisdictions. APIs allow integration with broader monitoring and case management systems. Qualified timestamps under eIDAS provide additional legal weight for EU enforcement. None of this is novel technology, but the integration into accessible, scalable workflows is recent enough that many brand teams have not yet adopted it.
If your brand protection program still relies on browser screenshots, manual capture, and ad-hoc evidence handling, the upgrade path is clear and the return on investment is strong. The infringer who operates against an unevidenced brand has structural advantages — fast operations, cheap re-incarnation, low risk of consequence. The infringer who operates against a brand with strong evidence workflows faces a different calculus: faster takedowns, stronger downstream enforcement, and a documented record that makes each subsequent infringement more costly than the last. Building the workflow is a one-time investment. The leverage it produces compounds with every enforcement action that follows.
Ready to upgrade your brand protection evidence workflow?
GetProofAnchor produces server-side captures with qualified timestamps, OpenTimestamps Bitcoin anchors, and EU Trusted List snapshots — exactly the kind of evidence package that satisfies DSA Article 16, Amazon Brand Registry, UDRP, and civil litigation simultaneously. The same package works across every forum, with API integration for high-volume monitoring.
This article is informational and not legal advice. Brand protection strategy depends on jurisdiction-specific factors, the brand's portfolio and priorities, and the specific facts of each matter. Consult qualified counsel before relying on any specific enforcement strategy.