中文字幕理论片,69视频免费在线观看,亚洲成人app,国产1级毛片,刘涛最大尺度戏视频,欧美亚洲美女视频,2021韩国美女仙女屋vip视频

打開APP
userphoto
未登錄

開通VIP,暢享免費(fèi)電子書等14項(xiàng)超值服

開通VIP
北京知識產(chǎn)權(quán)法院侵犯商業(yè)秘密民事案件訴訟舉證參考

北京知識產(chǎn)權(quán)法院

侵犯商業(yè)秘密民事案件訴訟舉證參考

為有效破解侵犯商業(yè)秘密民事案件舉證難問題,引導(dǎo)當(dāng)事人更好地完成舉證責(zé)任,維護(hù)科技創(chuàng)新企業(yè)的核心競爭力,依法平等保護(hù)中外當(dāng)事人的合法權(quán)益,優(yōu)化法治化營商環(huán)境,根據(jù)《中華人民共和國反不正當(dāng)競爭法》《最高人民法院關(guān)于審理不正當(dāng)競爭民事案件應(yīng)用法律若干問題的解釋》《最高人民法院關(guān)于審理侵犯商業(yè)秘密民事案件適用法律若干問題的規(guī)定》《最高人民法院關(guān)于知識產(chǎn)權(quán)民事訴訟證據(jù)的若干規(guī)定》《最高人民法院關(guān)于審理侵害知識產(chǎn)權(quán)民事案件適用懲罰性賠償?shù)慕忉尅?,以及《北京市高級人民法院知識產(chǎn)權(quán)民事訴訟證據(jù)規(guī)則指引》等相關(guān)規(guī)定,結(jié)合侵犯商業(yè)秘密民事案件審理中的主要問題,特制定本舉證參考。

第一部分 關(guān)于權(quán)利基礎(chǔ)的舉證參考

商業(yè)秘密通常是指不為公眾所知悉、具有商業(yè)價(jià)值并經(jīng)權(quán)利人采取相應(yīng)保密措施的技術(shù)信息、經(jīng)營信息等商業(yè)信息。

技術(shù)信息主要包括與技術(shù)有關(guān)的結(jié)構(gòu)、原料、組分、配方、材料、樣品、樣式、植物新品種繁殖材料、工藝、方法或其步驟、算法、數(shù)據(jù)、計(jì)算機(jī)程序及其有關(guān)文檔等信息。

經(jīng)營信息主要包括與經(jīng)營活動(dòng)有關(guān)的創(chuàng)意、管理、銷售、財(cái)務(wù)、計(jì)劃、樣本、招投標(biāo)材料、客戶信息、數(shù)據(jù)等信息??蛻粜畔?,包括客戶的名稱、地址、聯(lián)系方式以及交易習(xí)慣、意向、內(nèi)容等信息。

一、可以依法起訴的主體

1.原告能夠舉證證明其為商業(yè)秘密的權(quán)利人或者利害關(guān)系人,可以依法提起侵犯商業(yè)秘密訴訟。

2.商業(yè)秘密獨(dú)占使用許可合同的被許可人可以單獨(dú)提起侵犯商業(yè)秘密訴訟;

商業(yè)秘密排他使用許可合同的被許可人可以和權(quán)利人共同提起侵犯商業(yè)秘密訴訟,或者在權(quán)利人不起訴的情況下自行提起訴訟;

商業(yè)秘密普通使用許可合同的被許可人可以和權(quán)利人共同提起侵犯商業(yè)秘密訴訟,或者經(jīng)權(quán)利人書面授權(quán)單獨(dú)提起訴訟。

二、商業(yè)秘密的法定條件

3.原告能夠舉證證明商業(yè)秘密在被訴侵權(quán)行為發(fā)生時(shí)不為所屬領(lǐng)域的相關(guān)人員普遍知悉和容易獲得的,可以主張?jiān)撋虡I(yè)秘密不為公眾所知悉。  

4.原告能夠舉證證明將為公眾所知悉的信息進(jìn)行整理、改進(jìn)、加工后形成的新信息在被訴侵權(quán)行為發(fā)生時(shí)不為所屬領(lǐng)域的相關(guān)人員普遍知悉和容易獲得的,可以主張?jiān)撔滦畔?gòu)成商業(yè)秘密。為證明該新信息非公眾所知悉,原告可以將整理、改進(jìn)、加工的過程和記錄等作為證據(jù)提交。

5.原告主張對商業(yè)秘密采取了相應(yīng)保密措施,可以根據(jù)商業(yè)秘密及其載體的性質(zhì)、商業(yè)秘密的商業(yè)價(jià)值、保密措施的可識別程度、保密措施與商業(yè)秘密的對應(yīng)程度以及原告保密意愿等因素,舉證證明其為防止商業(yè)秘密泄露,在被訴侵權(quán)行為發(fā)生以前采取了與商業(yè)秘密相適應(yīng)的合理保密措施。

6.原告主張采取了相應(yīng)保密措施,可以舉證證明存在以下事實(shí):
 ?。?)簽訂保密協(xié)議或者在合同中約定保密義務(wù)的;
 ?。?)通過章程、培訓(xùn)、規(guī)章制度、書面告知等方式,對能夠接觸、獲取商業(yè)秘密的員工、前員工、供應(yīng)商、客戶、來訪者等提出保密要求的;
 ?。?)對涉密的廠房、車間等生產(chǎn)經(jīng)營場所限制來訪者或者進(jìn)行區(qū)分管理的;
  (4)以標(biāo)記、分類、隔離、加密、封存、限制能夠接觸或者獲取的人員范圍和權(quán)限等方式,對商業(yè)秘密及其載體進(jìn)行區(qū)分和管理的;
 ?。?)對能夠接觸、獲取商業(yè)秘密的計(jì)算機(jī)設(shè)備、電子設(shè)備、網(wǎng)絡(luò)設(shè)備、存儲設(shè)備、軟件等,采取禁止或者限制使用、訪問、存儲、復(fù)制等措施的;
 ?。?)要求離職員工登記、返還、清除、銷毀其接觸或者獲取的商業(yè)秘密及其載體,繼續(xù)承擔(dān)保密義務(wù)的;
  (7)采取其他合理保密措施的。

7.原告主張商業(yè)秘密具有商業(yè)價(jià)值的,可以根據(jù)商業(yè)秘密的研究開發(fā)成本、實(shí)施該項(xiàng)商業(yè)秘密的收益、可得利益、可保持競爭優(yōu)勢的時(shí)間等因素,舉證證明商業(yè)秘密因不為公眾所知悉而具有現(xiàn)實(shí)的或者潛在的商業(yè)價(jià)值。生產(chǎn)經(jīng)營活動(dòng)中形成的階段性成果符合上述規(guī)定的,原告可以主張?jiān)撾A段性成果具有商業(yè)價(jià)值。

三、法定條件的抗辯事由

8.被告主張?jiān)嫔虡I(yè)秘密不符合商業(yè)秘密法定條件的,可以舉證證明存在以下事實(shí):

(1)商業(yè)秘密在被訴侵權(quán)行為發(fā)生時(shí)已為公眾所知悉;

(2)原告未采取相應(yīng)保密措施;

(3)商業(yè)秘密不具有商業(yè)價(jià)值;

(4)商業(yè)秘密不符合法定條件的其他情形。

9.被告主張?jiān)嫔虡I(yè)秘密已為公眾所知悉的,可以舉證證明存在以下事實(shí):

(1)原告商業(yè)秘密在所屬領(lǐng)域?qū)儆谝话愠WR或者行業(yè)慣例的;

(2)原告商業(yè)秘密僅涉及產(chǎn)品的尺寸、結(jié)構(gòu)、材料、部件的簡單組合等內(nèi)容,所屬領(lǐng)域的相關(guān)人員通過觀察上市產(chǎn)品即可直接獲得的;

(3)原告商業(yè)秘密已經(jīng)在公開出版物或者其他媒體上公開披露的,包括文獻(xiàn)資料、宣傳材料、網(wǎng)頁等;

(4)原告商業(yè)秘密已通過公開的報(bào)告會、展覽等方式公開的;

(5)所屬領(lǐng)域的相關(guān)人員從其他公開渠道可以獲得原告商業(yè)秘密的。

10.被告主張?jiān)嫔虡I(yè)秘密未采取相應(yīng)保密措施的,可以通過保密措施的可識別程度、保密措施與商業(yè)秘密價(jià)值相對應(yīng)程度、所涉信息載體的特性、他人通過正當(dāng)方式獲得的難易程度等方面進(jìn)行舉證。

第二部分 關(guān)于侵權(quán)行為的舉證參考

四、侵權(quán)行為的表現(xiàn)形式

11.原告主張被告實(shí)施了侵犯商業(yè)秘密的行為,可以舉證證明存在以下事實(shí):

(1)以盜竊、賄賂、欺詐、脅迫、電子侵入或者其他不正當(dāng)手段獲取原告的商業(yè)秘密;
 ?。?)披露、使用或者允許他人使用以前項(xiàng)手段獲取的原告的商業(yè)秘密;
 ?。?)違反保密義務(wù)或者違反原告有關(guān)保守商業(yè)秘密的要求,披露、使用或者允許他人使用其所掌握的商業(yè)秘密;
 ?。?)教唆、引誘、幫助他人違反保密義務(wù)或者違反原告有關(guān)保守商業(yè)秘密的要求,獲取、披露、使用或者允許他人使用原告的商業(yè)秘密。

12.原告主張被告的行為屬于以其他不正當(dāng)手段獲取權(quán)利人的商業(yè)秘密的,可舉證證明被告獲取商業(yè)秘密的方式違反法律規(guī)定或者商業(yè)道德。

13.原告主張被告實(shí)施了侵犯商業(yè)秘密的具體行為,可以提供以下證據(jù):

(1)被告生產(chǎn)的含有原告商業(yè)秘密的產(chǎn)品、產(chǎn)品手冊、宣傳材料、計(jì)算機(jī)軟件、文檔;

(2)被告與第三方訂立的含有原告商業(yè)秘密的合同;

(3)被告所用被訴侵權(quán)信息與原告商業(yè)秘密相同或?qū)嵸|(zhì)上相同的鑒定報(bào)告、評估意見、勘驗(yàn)結(jié)論;

(4)被告與披露、使用或允許他人使用商業(yè)秘密的主體存在合同關(guān)系或其他關(guān)系的材料;

(5)針對原告商業(yè)秘密的密鑰、限制訪問系統(tǒng)或物理保密裝置等被破解、規(guī)避的記錄;

(6)能反映原告商業(yè)秘密被竊取、披露、使用的證人證言;

(7)包含原告商業(yè)秘密的產(chǎn)品說明書、宣傳介紹資料;

(8)被告明知或應(yīng)知他人侵犯商業(yè)秘密仍提供幫助的相關(guān)材料;

(9)被告教唆、引誘、幫助他人侵犯商業(yè)秘密的錄音錄像、聊天記錄、郵件;

(10)可以證明被告實(shí)施侵犯商業(yè)秘密行為的其他證據(jù)。

14.原告主張被告違反保密義務(wù)的,可以舉證證明根據(jù)法律規(guī)定或者合同約定等被告應(yīng)承擔(dān)保密義務(wù)。若未在合同中約定保密義務(wù),可以舉證證明根據(jù)誠信原則以及合同的性質(zhì)、目的、締約過程、交易習(xí)慣等,被告知道或者應(yīng)當(dāng)知道其獲取的信息屬于原告的商業(yè)秘密。

15.原告主張被告為員工、前員工的,可以舉證證明被告為其經(jīng)營、管理人員以及具有勞動(dòng)關(guān)系的其他人員。原告主張員工、前員工有渠道或者機(jī)會獲取原告商業(yè)秘密的,可以舉證證明存在以下事實(shí):

(1)職務(wù)、職責(zé)及權(quán)限與涉案商業(yè)秘密相關(guān);

(2)承擔(dān)的本職工作或者單位分配的任務(wù)與涉案商業(yè)秘密相關(guān);

(3)參與和商業(yè)秘密相關(guān)的生產(chǎn)經(jīng)營活動(dòng);

(4)曾保管、使用、存儲、復(fù)制、控制或者以其他方式接觸、獲取商業(yè)秘密及其載體;

(5)有渠道或者機(jī)會獲取商業(yè)秘密的其他事實(shí)。

16.原告主張被訴侵權(quán)信息與其商業(yè)秘密構(gòu)成實(shí)質(zhì)上相同,可以圍繞被訴侵權(quán)信息與商業(yè)秘密的異同程度、所屬領(lǐng)域的相關(guān)人員在被訴侵權(quán)行為發(fā)生時(shí)是否容易想到被訴侵權(quán)信息與商業(yè)秘密的區(qū)別、被訴侵權(quán)信息與商業(yè)秘密的用途、使用方式、目的、效果等是否具有實(shí)質(zhì)性差異、公有領(lǐng)域中與商業(yè)秘密相關(guān)信息的情況等因素進(jìn)行舉證,具體可以提供以下證據(jù):

(1)有資質(zhì)的鑒定機(jī)關(guān)、評估機(jī)構(gòu)出具的鑒定意見、評估意見,相關(guān)專家輔助人意見;

(2)能體現(xiàn)與原告商業(yè)秘密實(shí)質(zhì)上相同的信息的產(chǎn)品、合同、意向書;

(3)前述證據(jù)來自于與被告有關(guān)的第三方;

(4)可以證明被訴侵權(quán)信息與原告商業(yè)秘密構(gòu)成實(shí)質(zhì)上相同的其他證據(jù)。

17.原告主張被告使用商業(yè)秘密的,可舉證證明存在以下事實(shí):

(1)被告在生產(chǎn)經(jīng)營活動(dòng)中直接使用商業(yè)秘密;

(2)被告對商業(yè)秘密進(jìn)行修改、改進(jìn)后使用;

(3)被告根據(jù)商業(yè)秘密調(diào)整、優(yōu)化、改進(jìn)有關(guān)生產(chǎn)經(jīng)營活動(dòng)。

18.原告提供初步證據(jù)合理表明商業(yè)秘密被侵犯,且提供以下證據(jù)之一的,被告應(yīng)當(dāng)證明其不存在侵犯商業(yè)秘密的行為:
 ?。?)有證據(jù)表明被告有渠道或者機(jī)會獲取商業(yè)秘密,且其使用的被訴侵權(quán)信息與該商業(yè)秘密實(shí)質(zhì)上相同;
 ?。?)有證據(jù)表明商業(yè)秘密已經(jīng)被被告披露、使用或者有被披露、使用的風(fēng)險(xiǎn);
 ?。?)有其他證據(jù)表明商業(yè)秘密被被告侵犯。

19.原告能夠舉證證明經(jīng)營者以外的其他自然人、法人和非法人組織侵犯其商業(yè)秘密的,可以依據(jù)相關(guān)規(guī)定提起訴訟并主張侵權(quán)人承擔(dān)的民事責(zé)任。

五、侵權(quán)行為的抗辯事由

20.被告否認(rèn)侵犯商業(yè)秘密的,可以提供以下證據(jù):

(1)有資質(zhì)的鑒定機(jī)關(guān)、評估機(jī)構(gòu)出具的被訴侵權(quán)信息與原告商業(yè)秘密不同的鑒定意見、評估報(bào)告、勘驗(yàn)結(jié)論;

(2)被告獲取、披露、使用或者允許他人使用的商業(yè)秘密經(jīng)過合法授權(quán)的授權(quán)書、合同;

(3)被告自行開發(fā)研制或者反向工程等的開發(fā)文件、研發(fā)記錄、音視頻文件;

(4)客戶基于對離職員工個(gè)人的信賴而自愿與該個(gè)人或者其新單位進(jìn)行市場交易的說明、證人證言;

(5)其他證據(jù)。

21.被告主張被訴侵權(quán)信息系通過反向工程獲取的,可以提供以下證據(jù):

(1)通過公開渠道取得產(chǎn)品的購買合同、接受贈(zèng)予的憑證、票據(jù);

(2)通過拆卸、測繪、分析等相關(guān)技術(shù)手段從公開渠道取得的產(chǎn)品中獲得有關(guān)技術(shù)信息的工作記錄、視頻、文檔數(shù)據(jù);

(3)委托他人通過拆卸、測繪、分析等技術(shù)手段從公開渠道取得的產(chǎn)品中獲得有關(guān)技術(shù)信息的合同、往來郵件;

(4)能夠證明被訴侵權(quán)信息系通過反向工程獲取的其他證據(jù)。

22.被告主張被訴侵權(quán)信息系基于個(gè)人信賴獲取的,可以提供以下證據(jù):

(1)所涉行業(yè)領(lǐng)域強(qiáng)調(diào)個(gè)人技能的行業(yè)特點(diǎn)說明;

(2)客戶明確其系基于對員工個(gè)人的信賴自愿選擇交易的聲明、說明或者聊天記錄、往來郵件;

(3)與相關(guān)客戶的交易未利用原告所提供的物質(zhì)條件、交易平臺的文件、溝通記錄;

(4)能夠證明被訴侵權(quán)信息系基于個(gè)人信賴獲取的其他證據(jù)。

第三部分 關(guān)于請求承擔(dān)民事責(zé)任的舉證參考

六、停止侵權(quán)

23.對于侵犯商業(yè)秘密行為判決停止侵害的民事責(zé)任,停止侵害的時(shí)間一般持續(xù)到該商業(yè)秘密已為公眾所知悉時(shí)為止。原告能夠舉證證明依照上述規(guī)定判決停止侵害的時(shí)間明顯不合理的,可以請求法院在依法保護(hù)原告的商業(yè)秘密競爭優(yōu)勢的情況下,判決被告在一定期限或者范圍內(nèi)停止使用該商業(yè)秘密。

24.原告可以請求法院判決被告返還或者銷毀商業(yè)秘密載體,清除其控制的被訴侵權(quán)信息。

七、賠償損失

25.原告能夠舉證證明其因被侵權(quán)所受到的實(shí)際損失的,可以請求法院按照其實(shí)際損失確定賠償數(shù)額;實(shí)際損失難以確定的,原告能夠舉證證明被告因侵權(quán)所獲得的利益的,可以請求法院按照被告因侵權(quán)所獲得的利益確定賠償數(shù)額;原告的損失或者被告獲得的利益難以確定的,原告可以請求法院參照商業(yè)秘密許可使用費(fèi)的倍數(shù)合理確定。對故意侵犯商業(yè)秘密,情節(jié)嚴(yán)重的,原告可以請求法院在按照上述方法確定數(shù)額的一倍以上五倍以下確定賠償數(shù)額。賠償數(shù)額包括原告為制止侵權(quán)行為所支付的合理開支。

26.原告請求參照商業(yè)秘密許可使用費(fèi)確定因被侵權(quán)所受到的實(shí)際損失的,可以舉證證明許可的性質(zhì)、內(nèi)容、實(shí)際履行情況以及侵權(quán)行為的性質(zhì)、情節(jié)、后果等事實(shí)。

27.原告因被侵權(quán)所受到的實(shí)際損失、被告因侵權(quán)所獲得的利益、商業(yè)秘密許可使用費(fèi)難以確定的,原告可以請求法院根據(jù)侵權(quán)行為的情節(jié)判決給予五百萬元以下的賠償。

28.原告請求法院根據(jù)侵權(quán)行為的情節(jié)判決給予五百萬元以下的賠償?shù)?,可以舉證證明商業(yè)秘密的性質(zhì)、商業(yè)價(jià)值、研究開發(fā)成本、創(chuàng)新程度、能帶來的競爭優(yōu)勢以及被告的主觀過錯(cuò)、侵權(quán)行為的性質(zhì)、情節(jié)、后果等事實(shí)。
  29.原告已經(jīng)提供被告因侵權(quán)所獲得的利益的初步證據(jù),但與侵犯商業(yè)秘密行為相關(guān)的賬簿、資料由被告掌握的,原告可以請求法院責(zé)令被告提供該賬簿、資料。被告無正當(dāng)理由拒不提供或者不如實(shí)提供的,原告可以請求法院根據(jù)其主張和提供的證據(jù)認(rèn)定被告因侵權(quán)所獲得的利益。

30.原告舉證證明因侵權(quán)行為導(dǎo)致商業(yè)秘密為公眾所知悉的,可以請求法院在依法確定賠償數(shù)額時(shí),考慮商業(yè)秘密的商業(yè)價(jià)值。

31.原告主張被告惡意侵犯其商業(yè)秘密且情節(jié)嚴(yán)重,請求懲罰性賠償?shù)?,?yīng)當(dāng)在起訴時(shí)明確賠償數(shù)額、計(jì)算方式以及所依據(jù)的事實(shí)和理由。

32.原告主張被告具有侵犯商業(yè)秘密的惡意,可以圍繞以下事實(shí)提供證據(jù):

(1)被告經(jīng)原告或者利害關(guān)系人通知、警告后,仍繼續(xù)實(shí)施侵權(quán)行為的;

(2)被告或其法定代表人、管理人是原告或者利害關(guān)系人的法定代表人、管理人、實(shí)際控制人的;

(3)被告與原告或者利害關(guān)系人之間存在勞動(dòng)、勞務(wù)、合作、許可、經(jīng)銷、代理、代表等關(guān)系,且接觸過被侵犯的商業(yè)秘密的;

(4)被告與原告或者利害關(guān)系人之間有業(yè)務(wù)往來或者為達(dá)成合同等進(jìn)行過磋商,且接觸過被侵犯的商業(yè)秘密的;

(5)其他可以認(rèn)定為故意的情形。

33.原告主張被告侵犯商業(yè)秘密行為情節(jié)嚴(yán)重的,可以圍繞以下事實(shí)提供證據(jù):
 ?。?)因侵犯商業(yè)秘密行為被行政處罰或者法院裁判承擔(dān)責(zé)任后,再次實(shí)施相同或者類似侵權(quán)行為;
 ?。?)以侵犯商業(yè)秘密為業(yè);

(3)侵權(quán)行為持續(xù)時(shí)間長;
 ?。?)偽造、毀壞或者隱匿侵權(quán)證據(jù);
 ?。?)拒不履行保全裁定;
 ?。?)侵權(quán)獲利或者原告受損巨大;

(7)侵權(quán)行為可能危害國家安全、公共利益或者人身健康;
  (8)其他可以認(rèn)定為情節(jié)嚴(yán)重的情形。

34.原告主張懲罰性賠償?shù)模栽嬉虮磺謾?quán)所受到的實(shí)際損失或者按照侵權(quán)人因侵權(quán)所獲得的利益作為計(jì)算基數(shù)。該基數(shù)不包括原告為制止侵權(quán)所支付的合理開支。

第四部分 關(guān)于程序事項(xiàng)的舉證參考

八、保全

35.在證據(jù)可能滅失或者以后難以取得的情況下,申請人可以在訴訟過程中依法向法院申請保全證據(jù)。

36.因情況緊急,在證據(jù)可能滅失或者以后難以取得的情況下,申請人可以在提起訴訟前依法向法院申請保全證據(jù)。

37.被申請人試圖或者已經(jīng)以不正當(dāng)手段獲取、披露、使用或者允許他人使用申請人的商業(yè)秘密,可能會使判決難以執(zhí)行或者造成申請人其他損害,或者將會使申請人的合法權(quán)益受到難以彌補(bǔ)的損害的,申請人可以在訴訟過程中依法向法院申請行為保全。

38.因情況緊急,不立即申請保全會使判決難以執(zhí)行或者造成申請人其他損害,或者將會使申請人的合法權(quán)益受到難以彌補(bǔ)的損害的,申請人可以在提起訴訟前依法向法院申請行為保全。

39.申請人申請行為保全并主張“情況緊急”的,可以圍繞以下事實(shí)提供證據(jù):  

(1)申請人的商業(yè)秘密即將被非法披露; 
 ?。?)訴爭的商業(yè)秘密即將被非法處分; 

(3)申請人的商業(yè)秘密在展銷會等時(shí)效性較強(qiáng)的場合正在或者即將受到侵害; 
   (4)其他需要立即采取行為保全措施的情況。

40.申請人申請行為保全并主張被申請人的行為會給其造成“難以彌補(bǔ)的損害”的,可以圍繞以下事實(shí)提供證據(jù):
 ?。?)被申請人的行為將會侵害申請人享有的商譽(yù)等權(quán)利且造成無法挽回的損害;
 ?。?)被申請人的行為將會導(dǎo)致侵權(quán)行為難以控制且顯著增加申請人損害;
 ?。?)被申請人的侵害行為將會導(dǎo)致申請人的相關(guān)市場份額明顯減少;

(4)對申請人造成其他難以彌補(bǔ)的損害。

41.申請人申請行為保全的,應(yīng)當(dāng)依法提供擔(dān)保。申請人提供的擔(dān)保數(shù)額,應(yīng)當(dāng)相當(dāng)于被申請人可能因執(zhí)行行為保全措施所遭受的損失,包括責(zé)令停止侵權(quán)行為所涉產(chǎn)品的銷售收益、保管費(fèi)用等合理損失。

42.行為保全措施一般不因被申請人提供擔(dān)保而解除,但申請人同意的除外。

43.為制止侵犯商業(yè)秘密行為,申請人能夠在提出保全申請后、保全裁定作出前明確商業(yè)秘密的具體內(nèi)容,同時(shí)提供載有商業(yè)秘密的合同、文檔、計(jì)算機(jī)軟件、產(chǎn)品、招投標(biāo)文件、數(shù)據(jù)庫文件等證據(jù)的,可以申請?jiān)V前或訴中證據(jù)保全或行為保全。

44.因被申請人的行為或者其他原因,可能使判決難以執(zhí)行或者造成申請人其他損害的,申請人可以在訴訟過程中依法向法院申請財(cái)產(chǎn)保全并提供相應(yīng)擔(dān)保。

45.因情況緊急,不立即申請保全會使申請人的合法權(quán)益受到難以彌補(bǔ)的損害的,申請人可以在提起訴訟前依法向法院申請財(cái)產(chǎn)保全。申請人應(yīng)當(dāng)提供相當(dāng)于請求保全數(shù)額的擔(dān)保。

46.被申請人可以提供充分有效擔(dān)保,請求解除財(cái)產(chǎn)保全。

九、調(diào)查令

47.當(dāng)事人申請調(diào)查收集證據(jù),請求法院頒發(fā)調(diào)查令,由當(dāng)事人的訴訟代理人代為調(diào)查收集證據(jù)的,應(yīng)滿足準(zhǔn)予調(diào)查收集證據(jù)申請應(yīng)具備的條件,且需同時(shí)符合以下條件:

(1)申請人的訴訟代理人為執(zhí)業(yè)律師,且持令代為調(diào)查收集證據(jù)的人僅限于調(diào)查令上列明的執(zhí)業(yè)律師;

(2)調(diào)查令足以克服當(dāng)事人及其訴訟代理人不能自行收集證據(jù)的客觀原因;

(3)被調(diào)查收集的證據(jù)不涉及國家秘密、商業(yè)秘密、個(gè)人隱私等且不存在其他不宜由訴訟代理人持調(diào)查令收集的情形。

48.持有調(diào)查令的律師于調(diào)查令有效期內(nèi),按照調(diào)查令載明的證據(jù)名稱或范圍向被調(diào)查人調(diào)查收集證據(jù)。持有調(diào)查令的律師向被調(diào)查人調(diào)查收集證據(jù)時(shí),同時(shí)出示其律師執(zhí)業(yè)證書原件供被調(diào)查人核對。

49.被調(diào)查人對調(diào)查令和相關(guān)律師身份核對無異后,按照調(diào)查令載明的名稱或范圍提供證據(jù)。

50.被調(diào)查人提供的證據(jù)在持有調(diào)查令的律師和被調(diào)查人的共同見證下封存,由持有調(diào)查令的律師及時(shí)、完整的提交法院或由被調(diào)查人在合理期間內(nèi)采用郵寄等方式提交法院。

51.被調(diào)查人因故未能提供證據(jù)或者拒不協(xié)助調(diào)查的,持有調(diào)查令的律師于調(diào)查令有效期屆滿后三日內(nèi)向法院書面說明相關(guān)情況。

十、訴訟中的保密措施

52.涉及商業(yè)秘密的案件,雙方當(dāng)事人可以申請不公開審理。當(dāng)事人可以申請法院在互聯(lián)網(wǎng)公布裁判文書時(shí)刪除涉及商業(yè)秘密的信息。

53.雙方當(dāng)事人所提交證據(jù)涉及商業(yè)秘密或者其他需要保密的商業(yè)信息的,當(dāng)事人可以申請法院在證據(jù)保全、證據(jù)交換、舉證質(zhì)證、委托鑒定、詢問、開庭等訴訟活動(dòng)中采取必要的保密措施,保密措施包括但不限于以下情形:

(1)針對不同訴訟環(huán)節(jié),申請對接觸涉密證據(jù)的人員范圍作出限制;

(2)要求接觸涉密證據(jù)的當(dāng)事人簽訂保密承諾書;

(3)申請對涉密證據(jù)不予交換,僅通過當(dāng)庭出示的方式由對方當(dāng)事人發(fā)表質(zhì)證意見;

(4)對于證據(jù)中需要保密的部分進(jìn)行不影響案件審理的遮擋;

(5)申請采取其他必要的保密措施。

54.接觸前款涉密證據(jù)的當(dāng)事人,不得出于本案訴訟之外的任何目的披露、使用、允許他人使用在訴訟程序中接觸到的秘密信息。

55.當(dāng)事人違反前款所稱的保密措施的要求,擅自披露商業(yè)秘密或者在訴訟活動(dòng)之外使用或者允許他人使用在訴訟中接觸、獲取的商業(yè)秘密的,應(yīng)當(dāng)依法承擔(dān)民事責(zé)任。構(gòu)成民事訴訟法第一百一十一條規(guī)定情形的,依法采取強(qiáng)制措施。構(gòu)成犯罪的,依法追究刑事責(zé)任。

十一、刑民交叉
  56.由公安機(jī)關(guān)、檢察機(jī)關(guān)或者法院保存的與被訴侵權(quán)行為具有關(guān)聯(lián)性的證據(jù),侵犯商業(yè)秘密民事案件的當(dāng)事人因客觀原因不能自行收集的,可以向法院申請調(diào)查收集上述證據(jù),但可能影響正在進(jìn)行的刑事訴訟程序的除外。

57.當(dāng)事人可以主張依據(jù)生效刑事裁判認(rèn)定的實(shí)際損失或者違法所得確定針對同一侵犯商業(yè)秘密行為提起的民事訴訟的賠償數(shù)額。

58.涉及同一侵犯商業(yè)秘密行為的刑事案件尚未審結(jié)的,當(dāng)事人可以請求法院中止審理侵犯商業(yè)秘密民事案件。是否中止審理,由民事案件的審理法院根據(jù)案件具體情況確定。

Beijing Intellectual Property Court

Reference for Proof in Civil Cases of Infringements of Trade Secrets

This Reference for Proof is aimed at effectively solving the difficulty of proof in civil cases of infringements of trade secrets, guiding the parties concerned to better fulfill the burden of proof, maintaining the core competitiveness of technological innovation enterprises, equally protecting the legitimate rights and interests of Chinese and foreign parties in accordance with the law, and optimizing the legalized business environment. This Reference for Proof is hereby formulated in combination with main issues in the trial of civil cases of infringements of trade secrets and in accordance with the Anti-unfair Competition Law of the People’s Republic of China, the Interpretation of the Supreme People’s Court on Several Issues Concerning the Application of Laws in the Trial of Civil Cases of Unfair Competition, the Provisions of the Supreme People’s Court on Several Issues Concerning the Application of Laws in the Trial of Civil Cases of Infringements of Trade Secrets, the Several Provisions of the Supreme People’s Court on Evidence in Civil Procedures Involving Intellectual Property Rights, the Interpretation of the Supreme People's Court on the Application of Punitive Damages in the Trial of Intellectual Property Infringement Civil Cases, the Guidelines on the Evidence Rules for Intellectual Property Civil Litigation of Beijing High People’s Court and relevant provisions.

Part I Reference for Proof of Rights

Trade secrets usually refer to commercial information including technical information and business information etc. that are not known to the public, have commercial value, and have been processed through corresponding non-disclosure measures by the right holders.

Technical information mainly includes technology-related information, such as structures, raw materials, components, formulas, materials, samples, patterns, propagation materials of new plant varieties, processes, methods or their steps, algorithms, data, computer programs, and related documents.

Business information mainly includes information related to business activities, such as ideas, management, sales, finance, plans, samples, bidding materials, customer information and data. Customer information includes the customer’s name, address, contact information, transaction habits, intentions, content, and other information.

I. The Party that may File a Lawsuit in accordance with the Law

1. The plaintiff may file a trade secret infringement lawsuit in accordance with the law if the said plaintiff can provide evidence to prove that the said plaintiff is the right holder or interested parties of the trade secret.

2. The licensee of a trade secret exclusive license contract can file a trade secret infringement lawsuit independently.

The licensee of a trade secret sole license contract can file a trade secret infringement lawsuit jointly with the right holder, or do so independently if the right holder does not file such a lawsuit.

The licensee of a trade secret non-exclusive license contract may file a trade secret infringement lawsuit jointly with the right holder, or file such a lawsuit independently with written authorization of the right holder.

II. Legal Requirements of Trade Secrets

3. The plaintiff may claim that the trade secret is not known to the public, if the said plaintiff provides evidence to prove that the trade secret shall not be generally known to or easily acquired by relevant personnel in the field when the alleged infringement occurs.

4. If the plaintiff provides evidence to prove that the new information that is sorted, improved, or processed from the information known to the public is not be generally known to or easily acquired by relevant personnel in the field when the alleged infringement occurs, the said plaintiff may claim that the said new information constitutes the trade secret. To prove that the new information is not known to the public, the plaintiff may submit the process, records, etc. of such sorting, improvement, and processing as evidence.

5. If the plaintiff claims to have taken corresponding non-disclosure measures for the trade secret, the said plaintiff may based on factors such as the nature of the trade secret and its carriers, the commercial value of the trade secret, the identifiable degree of the non-disclosure measures, the degree of correspondence between the non-disclosure measures and the trade secret, and the plaintiff’s willingness to keep confidential the trade secret, provide evidence to prove that reasonable non-disclosure measures commensurate with the trade secret have been taken thereby before the alleged infringement occurred in order to prevent the disclosure of the trade secret.

6. If the plaintiff claims to have taken corresponding non-disclosure measures for the trade secret, the said plaintiff can provide evidence to prove the existence of any of the following facts:

(1) A confidentiality agreement has been signed or non-disclosure obligations have been provided for in the agreement;

(2) Confidentiality requirements have been stated by means of articles of association, training, rules and regulations, written notifications, etc. to the employees, former employees, suppliers, customers, visitors, etc. of the plaintiff who can access and acquire the trade secret;

(3) Visitors have been restricted from entering secret-related factories, workshops and other production and business premises or the said production and business premises have been subjected to differentiated management;

(4) The trade secret and its carriers have been distinguished and managed by such means as marking, classifying, isolating, encrypting, sealing, and restricting the scope and authority of persons who can access or acquire the trade secret;

(5) Measures such as prohibiting or restricting the use, access, storage and copying have been taken to computer equipment, electronic equipment, network equipment, storage equipment, software, etc. that can access and acquire the trade secret;

(6) The plaintiff’s former employees have been required to register, return, delete or destroy the trade secret and its carriers that they have accessed or acquired, and to continue to assume their non-disclosure obligations; or

(7) Other reasonable non-disclosure measures that have been taken.

7. If the plaintiff claims that the trade secret has commercial value, the said plaintiff may based on factors such as the cost of research and development of the trade secret, the profits from implementing the trade secret, the profits available from the trade secret, and the time period during which the competitive advantages can be maintained due to the trade secret, provide evidence to prove that the trade secret unknown to the public has real or potential commercial value. If the phased results formed in the production and business activities conform to the above provisions, the plaintiff can claim that the phased results have commercial value.

III. Defense Against Legal Requirements

8. If the defendant claims that the plaintiff’s trade secret does not meet legal requirements of trade secrets, the said defendant can provide evidence to prove the existence of any of the following facts:

(1) The trade secret had been known to the public when the alleged infringement occurred;

(2) The plaintiff has not taken corresponding non-disclosure measures;

(3) The trade secret does not have any commercial value; or

(4) The trade secret is under other circumstances where it does not meet legal requirements.

9. If the defendant claims that the plaintiff’s trade secret has been known to the public, the said defendant can provide evidence to prove the existence of any of the following facts:

(1) The plaintiff’s trade secret belongs to commercial rules or industry practice in the field;

(2) The plaintiff’s trade secret only involves the simple combination of product size, structure, material and component, etc., so that it can be acquired directly by relevant personnel in the field by observing products in the market;

(3) The plaintiff’s trade secret has been publicly disclosed in public publications or other media, including literature, promotional materials, web pages, etc.;

(4) The plaintiff’s trade secret has been disclosed through public reports, exhibitions, etc.; or

(5) The plaintiff’s trade secret can be acquired by relevant personnel in the field from other public channels.

10. If the defendant claims that the plaintiff has not taken corresponding non-disclosure measures for the trade secret thereof, the said defendant can provide evidence from such aspects as the identifiable degree of non-disclosure measures, the degree of correspondence between the non-disclosure measures and the value of the trade secret, the characteristics of the information carriers involved, and the degree of difficulty in acquiring the trade secret through proper means.

Part II Reference for Proof of Infringement

IV. Forms of Infringement

11. If the plaintiff claims that the defendant has committed an infringement of the trade secret thereof, the said plaintiff can provide evidence to prove the existence of any of the following facts:

(1) The defendant acquires the plaintiff’s trade secret by theft, bribery, fraud, coercion, electronic intrusion, or other improper means;

(2) The defendant discloses, uses or allows another person to use the plaintiff’s trade secret acquired by the foregoing means;

(3) The defendant discloses, uses, or allows another person to use the trade secret in violation of the non-disclosure obligations of the said defendant or the plaintiff’s requirements for keeping such trade secret confidential; or

(4) The defendant abets a person, tempts or aids a person into or in acquiring, disclosing, using or allowing another person to use the plaintiff’s trade secret in violation of the non-disclosure obligations thereof or the plaintiff’s requirements for keeping such trade secret confidential.

12. If the plaintiff claims that the defendant acquires the trade secret from the right holder by any other improper means, the said plaintiff can provide evidence to prove that the means by which the defendant acquires the trade secret violates the law or business ethics.

13. If the plaintiff claims that the defendant has committed a specific act of infringing on the trade secret thereof, the said plaintiff can provide any of the following evidence:

(1) Products, product manuals, promotional materials, computer software or documents produced or made by the defendant that contain the plaintiff’s trade secret;

(2) A contract between the defendant and a third party that contains the plaintiff’s trade secret;

(3) The appraisal report, evaluation opinion, or investigation conclusion that presents that the alleged information used by the defendant is the same or substantially the same as the plaintiff’s trade secret;

(4) Materials that present that the defendant has a contractual relationship or other relationship with the entity that discloses, uses, or allows another person to use the trade secret;

(5) Records that the plaintiff’s trade secret keys, restricted access systems, or physical security devices have been cracked or circumvented;

(6) Witness testimony that can show the theft, disclosure, or use of the plaintiff’s trade secret;

(7) Product manuals and promotional materials containing the plaintiff’s trade secret;

(8) Relevant materials that show the defendant still provide another person with help though the said defendant knows or should have known that such another person has infringed on the plaintiff’ trade secret;

(9) Audio and video recordings, chat records, or emails about the defendant’s abetting a person, tempting or aiding a person into or in infringing upon the plaintiff’s trade secret; or

(10) Other evidence that can prove that the defendant has committed an infringement of the trade secret.

14. If the plaintiff claims that the defendant violates the non-disclosure obligation thereof, the said plaintiff may provide evidence to prove that the defendant shall bear such non-disclosure obligation in accordance with the law or contract. If such non-disclosure obligation is not stipulated in the contract, the said plaintiff may provide evidence to prove that the defendant has known or should have known that the information acquired thereby is the plaintiff’s trade secret based on the principle of good faith, the nature and purpose of the contract, the process of contracting, and trading habits.

15. If the plaintiff claims that the defendant is an employee or former employee thereof, the said plaintiff may provide evidence to prove that the defendant is a member of the defendant’s operating, managerial or other personnel with labor relations. If the plaintiff claims that such employee has channels or opportunities to acquire such trade secret, the said plaintiff can provide evidence to prove the existence of any of the following facts:

(1) Such employee’s duties, responsibilities and authorities are related to the involved trade secret;

(2) The work undertaken by or the tasks assigned by the entity to such employee are related to the involved trade secret;

(3) Such employee participates in production and business activities related to the trade secret;

(4) Such employee once kept, used, stored, copied, controlled or otherwise accessed or acquired the involved trade secret and its carriers; or

(5) There are other facts that prove such employee has channels or opportunities to acquire the involved trade secret.

16. If the plaintiff claims that the alleged information is substantially the same as the trade secret thereof, the said plaintiff can provide evidence based on such factors as degree of similarities and differences between the alleged information and such trade secret, whether relevant personnel in the field will easily think of the difference between the alleged information and such trade secret when the alleged infringement occurs, whether the alleged information is substantially different from such trade secret in use, use method, purpose, effect, etc., and the trade secret-related information in the public domain. Specifically, the plaintiff can provide any of the following evidence:

(1) The appraisal opinions or evaluation opinions issued by a qualified appraisal agency or evaluation agency, and a relevant expert assistant’s opinions;

(2) Products, contracts, or letters of intent that can reflect the alleged information is substantially the same as the plaintiff’s trade secret;

(3) Source of the aforementioned evidence from a third party related to the defendant; or

(4) Other evidence that can prove that the alleged information is substantially the same as the plaintiff’s trade secret.

17. If the plaintiff claims that the defendant uses the trade secret thereof, the said plaintiff may provide evidence to prove the existence of any of the following facts:

(1) The defendant’s direct use of the plaintiff’s trade secret in production and operation activities;

(2) The defendant’s use of such trade secret after modification or improvement thereof; or

(3) The defendant’s adjustment, optimization or improvement of relevant production and business activities based on such trade secret.

18. If the plaintiff provides preliminary evidence that reasonably shows that the trade secret thereof has been infringed upon, and any piece of the following evidence, the defendant shall prove that it hasn’t committed any act of infringing upon such trade secret:

(1) There is evidence that the defendant has channels or opportunities to acquire such trade secret, and the alleged information used thereby is substantially the same as such trade secret;

(2) There is evidence that such trade secret has been disclosed or used by the defendant or is at risk of being disclosed or used thereby; or

(3) There is other evidence that the trade secret has been infringed by the defendant.

19. If the plaintiff can provide evidence to prove that a natural person, legal person, or unincorporated organization other than a business has infringed on the business secret thereof, the said plaintiff can file a lawsuit in accordance with relevant laws and regulations and claim the civil liability of the infringer.

V. Defense against Infringement

20. If the defendant denies infringement of the plaintiff’s trade secret, the said defendant can provide any of the following evidence:

(1) The appraisal opinion, evaluation report or investigation conclusion issued by a qualified appraisal agency or evaluation agency that presents the alleged information is not the same as the plaintiff’s trade secret;

(2) The lawful authorization letter or contract that proves the defendant discloses, uses or allows another person to use the trade secret upon lawful authorization;

(3) Development documents, research and development records and audio-video files about the project independently researched and developed by the defendant or the reverse engineering;

(4) The customer’s explanation or witness testimony about the plaintiff’s voluntary market transactions with the defendant who is a former employee of the plaintiff or a new entity thereof based on the trust in such employee; or

(5) Other evidence.

21. If the defendant claims that the alleged information is acquired through reverse engineering, the said defendant can provide any of the following evidence:

(1) The purchase contract of the product obtained through public channels or the certificate or bill of accepting the given product;

(2) Work records, videos, or document data that show the relevant technical information is obtained from the product acquired through public channels by relevant technical means such as disassembly, surveying, mapping, and analysis;

(3) Contracts or emails that prove relevant technical information is obtained from the product acquired through public channels by entrusting others to use such technical means as disassembly, surveying, mapping and analysis; or

(4) Other evidence that can prove the alleged information is acquired through reverse engineering.

22. If the defendant claims that the alleged information is obtained on the basis of personal reliance, the said defendant can provide any of the following evidence:

(1) Description of the characteristics of the industry that emphasizes personal skills;

(2) Statements, explanations, chatting records or emails in which the customer clarifies the voluntary transactions with defendant on the basis of personal reliance;

(3) Documents or communication records that prove neither material conditions nor the trading platform provided by the plaintiff are/is used in the transaction with the relevant customer; or

(4) Other evidence that can prove that the alleged information is acquired based on personal reliance.

Part III Reference for Proof on Requests for Civil Liability 

VI. Cease of Infringement 

23. For the civil liability of cease of infringement ruled for an act of infringing upon a trade secret, the period of cease of infringement generally last until the date when the trade secret is known to the public. If the plaintiff can provide evidence to prove that the period of cease of infringement ruled in accordance with the preceding paragraph is obviously unreasonable, the said plaintiff may request the court to rule that the defendant stop using the plaintiff’s trade secret within a certain period or to a certain scope while protecting according to law the competitive advantages of such trade secret.

24. The plaintiff may request the court to rule that the defendant return or destroy carriers of the trade secret and delete the alleged information under the control thereof.

VII. Damages

25. If the plaintiff can provide evidence to prove the actual losses suffered thereby due to the infringement, the said plaintiff may request the court to determine the amount of damages according to such actual losses; if it’s difficult to determine such actual losses but the plaintiff can provide evidence to prove the defendant’s profits from the infringement, the said plaintiff may request the court to determine the amount of damages according to such profits; if it’s difficult to determine neither such losses nor such profits, the plaintiff may request the court to reasonably determine the amount of damages with reference to the multiple of the trade secret license fee. If the defendant commits an act of intentionally infringing upon the plaintiff’s trade secret and the consequences are serious, the plaintiff may request the court to determine the amount of damages more than one time but not more than five times the amount determined in accordance with the above-mentioned method. The amount of damages include the reasonable expenses paid by the plaintiff to stop the infringement.

26. If the plaintiff requests to determine the actual losses incurred due to the infringement with reference to the trade secret license fee, the said plaintiff may provide evidence to prove the nature, content, actual performance of the license, and the nature, circumstances, consequences, etc. of the infringement.

27. If it is difficult to determine any of the plaintiff’s actual losses due to the infringement, the defendant’s profits from the infringement, and the trade secret license fee, the plaintiff may request the court to award compensation no less than RMB 5 million based on the consequences of the infringement.

28. If the plaintiff requests the court to award compensation no less than RMB 5 million, the said plaintiff may provide evidence to prove the nature, commercial value, research and development cost and degree of innovation of the trade secret, the competitive advantages the trade secret can bring, as well as the nature, circumstances, consequences and other facts of the infringement and the defendant’s subjective fault.

29. If the plaintiff has provided preliminary evidence of the profits the defendant has obtained from the infringement, but the account book or material related to the infringement of the trade secret is in the possession of the defendant, the plaintiff may request the court to rule that the defendant provide such account book or material. If the defendant refuses to provide it without justifiable reasons or does not provide it truthfully, the plaintiff may request the court to determine the profits obtained by the defendant from the infringement based on the claims made and evidence provided thereby.

30. If the plaintiff provides evidence to prove that the trade secret is known to the public due to the infringement, the said plaintiff may request the court to consider the commercial value of the trade secret when determining the amount of damages in accordance with the law.

31. If the plaintiff claims that the defendant intentionally infringes upon the trade secret thereof and the consequences are serious, and requests punitive damages, the amount and method of calculation of damages and the facts and reasons on which they are based shall be clarified when filing the lawsuit.

32. If the plaintiff claims that the defendant has the intention to infringe on the trade secret thereof, the said plaintiff may provide evidence based on any of the following facts:

(1) The defendant continues to commit the infringement after being notified or warned by the plaintiff or interested parties;

(2) The defendant or the legal representative or manager thereof is the legal representative, manager or actual controller of the plaintiff or interested parties;

(3) The defendant has formed labor, labor service, cooperation, license, distribution, agency, representative or other relationship with the plaintiff or interested parties, and has accessed the alleged information;

(4) The defendant has business dealings or negotiated with the plaintiff or interested parties, and has accessed the alleged information; or

(5) Other circumstances under which the defendant is deemed to have such intention.

33. If the plaintiff claims that the defendant’s infringement of the trade secret thereof causes serious consequences, the said plaintiff may provide evidence of any of the following facts:

(1) After being punished by an administrative penalty or a court decision for infringement of the plaintiff’s trade secret, the defendant commits a same or similar infringement;

(2) The defendant operates mainly by infringing the trade secret;

(3) The infringement lasts for a long time;

(4) The defendant forges, destroys or conceals evidence of infringement;

(5) The defendant refuses to perform an order of preservation;

(6) The defendant profits a lot or the plaintiff suffers huge losses from the infringement;

(7) The infringement may endanger national security, public interest or personal health; or

(8) Other circumstances in which it shall be deemed that serious consequences are caused.

34. Where the plaintiff claims punitive damages, the plaintiff’s actual losses, the illegal gains or profits from the infringement of the defendant can be taken as the basis for calculation. Such basis does not include reasonable expenses paid by the plaintiff to stop the infringement.

Part IV Reference for Proof of Procedural Matters 

VIII. Preservation

35. Where any evidence may be extinguished or may be hard to obtain at a later time, the applicant may, in the course of an action, apply to the court for evidence preservation.

36. Where any evidence may be extinguished or may be hard to obtain at a later time, if the circumstances are urgent, the applicant may, before instituting an action, apply to the court for evidence preservation.

37. If the respondent attempts to or has used improper means to acquire, disclose, use or allow another person to use the applicant’s trade secret, which may make it difficult to enforce the judgment or cause other damages to the applicant, or will cause irreparable damages to the applicant's legitimate rights and interests, the applicant may, in the course of an action, apply to the court for behavior preservation.

38. If the circumstances are urgent, not applying for preservation immediately will make it difficult to enforce the judgment or cause other damages to the applicant, or will cause irreparable damages to the applicant’s legitimate rights and interests, the applicant may, before instituting an action, apply to the court for behavior preservation.

39. If the applicant applies to the court for behavior preservation and claims “the circumstances are urgent”, the said applicant may provide evidence based on any of the following facts:

(1) The applicant’s trade secret is about to be illegally disclosed;

(2) The disputed trade secret is about to be illegally disposed of;

(3) The applicant’s trade secret is being or about to be infringed upon in time-sensitive occasions such as trade fairs; or

(4) Other circumstances that preservation measures shall be taken immediately happen.

40. Where the applicant applies for behavior preservation and claims that the respondent’s behavior will cause “irreparable damages” thereto, the said applicant may provide evidence based on any of the following facts:

(1) The respondent’s act will infringe upon the applicant’s rights and interests such as goodwill and cause irreparable damages thereto;

(2) The respondent’s act will cause the infringement to be difficult to control and significantly increase damages to the applicant;

(3) The infringement by the respondent will result in a significant decrease in the relevant market share of the applicant; or

(4) Other irreparable damages will be caused to the applicant.

41. If the applicant applies for behavior preservation, the said applicant shall provide security in accordance with the law. The amount of security provided by the applicant shall be equivalent to the losses that the respondent may suffer as a result of taking behavior preservation measures, including reasonable losses such as the sales benefits and storage costs of the products involved in the cease of infringement ruled.

42. Behavior preservation measures are generally not released because of the security that the respondent provides, except with the consent of the applicant.

43. If the applicant can clarify the specific content of the trade secret after the preservation application is filed and before the preservation ruling is made, and provide the contract, document, computer software, product, bidding document, database files, and other evidence containing such trade secret, the said applicant may apply for evidence preservation or behavior preservation before or during the lawsuit in order to stop the infringement of the trade secret thereof.

44. If the respondent’s actions or other reasons may make it difficult to enforce the judgment or cause other damages to the applicant, the applicant may apply to the court for property preservation and provide the corresponding security according to law in the course of the lawsuit.

45. If the circumstances are urgent, not applying for preservation immediately will cause irreparable damages to the applicant's legitimate rights and interests, the applicant may apply to the court for property preservation according to law before filing a lawsuit. The applicant shall provide security equivalent to the preservation amount requested.

46. The respondent may provide sufficient and effective security to request the release of the property preservation.

IX. Investigation Order

47. If the applicant requests the court to issue an investigation order for the purposes of investigation and collection of evidence, and entrusts an agent to do so, the requirements under which the application for investigation and collection of evidence shall be approved and the following requirements shall be met at the same time:

(1) The applicant’s agent is a practicing lawyer, and the person who holds such order to investigate and collect evidence on behalf of the applicant is the practicing lawyer specified in the investigation order;

(2) The investigation order is sufficient to overcome the objective reasons why the applicant and the agent thereof cannot collect evidence on their own; and

(3) The evidence investigated and collected involves not any of the state secrets, trade secrets, personal privacy, etc., and under no other circumstances is it not suitable for such agent to hold such investigation order for collecting evidence.

48. The agent holding the investigation order investigates and collects evidence from the respondent in accordance with the name or scope of the evidence specified in such investigation order within its validity period. When such agent collects evidence from the respondent, an original practice certificate thereof is presented to the respondent for verification.

49. After verifying the investigation order and the identity of the involved agent, the respondent provides evidence in accordance with the name or scope specified in the investigation order.

50. The evidence provided by the respondent is sealed under the joint witness of the agent holding the investigation order and the respondent, and then submitted to the court timely and completely by such agent or the respondent by mail within a reasonable period of time.

51. If the respondent fails to provide evidence or refuses to assist in the investigation for some reason, the agent holding the investigation order can explain the relevant situation to the court in writing within three days upon the expiration of the investigation order.

X. Non-disclosure Measures in Litigation

52. In a case involving a trade secret, the parties may apply for a trial in camera. The parties may apply to the court to delete the information involving the trade secret when publishing judgments on the Internet.

53. If the evidence submitted by the parties involves a trade secret or other business information that needs to be kept confidential, the parties may apply to the court to take necessary non-disclosure measures in litigation activities such as evidence preservation, evidence exchange, proof cross-examination, entrusted appraisal, inquiries, and court sessions. Such non-disclosure measures include but are not limited to the following circumstances:

(1) In different litigation processes, to apply for restrictions on the scope of persons who have access to such evidence;

(2) To request the parties who have access to such evidence to sign a non-disclosure guarantee letter;

(3) To apply for non-exchange of such evidence, and only presenting such evidence to the other party for the purpose of delivering the cross-examination opinions in the court;

(4) To cover the part of the evidence that needs to be kept confidential without affecting the trial of the case; and

(5) To apply for other necessary non-disclosure measures.

54. The parties who have access to the evidence mentioned in the preceding paragraph shall not disclose, use, or allow another person to use the confidential information that the parties have accessed during the proceedings for any purpose other than the litigation in this case.

55. If a party in violation of preceding paragraph, discloses the trade secret without authorization or uses the trade secret other than litigation activities or allows another person to use the trade secret that the party accesses to or acquires in litigation, the said party shall bear civil liability in accordance with the law. If the circumstances provided for in Article 111 of the Civil Procedure Law happen, compulsory measures shall be taken in accordance with the law; if a crime is constituted, the party shall be held criminally responsible.

XI. Criminal and Civil Cross Cases

56. If the evidence related to the alleged infringement is preserved by the public security organ, the procuratorial organ or the court, and the parties of a civil case of trade secret infringement cannot collect it on their own due to objective reasons, they may apply to the court for investigation and collection of the above-mentioned evidence, unless they may affect the ongoing criminal proceedings.

57. The parties can claim that the amount of damages in civil cases of infringement of the same trade secret shall be determined based on the actual losses or illegal profits as determined by the effective criminal judgment.

58. If a criminal case involving infringement of a trade secret has not yet been concluded, the parties may request the court to suspend the trial of the civil case of such infringement of the trade secret. Whether the trial is suspended shall be determined by the trial court of the civil case based on the specific circumstances of the case.

本站僅提供存儲服務(wù),所有內(nèi)容均由用戶發(fā)布,如發(fā)現(xiàn)有害或侵權(quán)內(nèi)容,請點(diǎn)擊舉報(bào)
打開APP,閱讀全文并永久保存 查看更多類似文章
猜你喜歡
類似文章
英漢對照法律文書(2)
馬來西亞司法制度——簡易程序(二)
訴訟法律 ( y z)
美國ITC337調(diào)查針對商業(yè)秘密的保護(hù)力度很大 | 每日IP英文第431期
送達(dá)難的美國解決方案
40個(gè)美國侵權(quán)法法律英語概念(上)
更多類似文章 >>
生活服務(wù)
熱點(diǎn)新聞
分享 收藏 導(dǎo)長圖 關(guān)注 下載文章
綁定賬號成功
后續(xù)可登錄賬號暢享VIP特權(quán)!
如果VIP功能使用有故障,
可點(diǎn)擊這里聯(lián)系客服!

聯(lián)系客服