Case Study · IPR & Technology Law
Protecting ₹3 Crore Software: Enforcing Copyright Against a Competitor's Source Code Theft
Client Background & Context
The Situation When Our Client Came to Us
Our client — a Hyderabad-based software development company — had spent 4 years and approximately ₹3 crore building a proprietary logistics management platform. The platform incorporated unique algorithms for route optimisation and real-time fleet tracking that gave it a significant competitive advantage in the market.
A competitor that had unsuccessfully attempted to acquire our client six months earlier launched a directly competing product. Within weeks of launch, our client’s technical team identified that the competitor’s product shared striking similarities — identical edge-case behaviours, identical variable naming conventions visible in an unminified JavaScript bundle, and near-identical API response structures.
A detailed technical comparison confirmed that the competitor had access to our client’s source code — almost certainly through a former senior developer who had joined the competitor 8 months earlier and had had full source code access during his employment.
The competitor had already signed 3 customers who were also prospects of our client, representing approximately ₹60 lakh in annual recurring revenue. Every additional month of the competitor’s operation would cause irreversible harm to our client’s market position.
Key Challenges
What Made This Matter Complex
Preserving Evidence Before the Competitor Could Destroy It
Once aware of the claim, the competitor could destroy the incriminating source code. Obtaining injunctive relief before service of notice was essential — but required moving within hours, not days.
Proving Copying Without Discovery
At the pre-injunction stage, our client had to demonstrate copying without access to the competitor’s internal systems. The unminified JavaScript bundle was the critical evidence — but its admissibility and the forensic methodology for comparison had to be established precisely.
Employment Law Intersection
The case involved a former employee’s breach of confidence — creating a parallel claim track that required careful coordination with employment law principles and the enforceability of the ex-employee’s confidentiality obligations.
Business Continuity for Our Client
While the legal proceedings progressed, our client needed to protect its existing customer relationships against the competitor’s sales efforts — requiring urgent advisory on what representations could be made about the litigation.
Engagement Timeline
How We Handled It — Phase by Phase
Phase 1: Emergency Application
- Retained on a Monday morning — injunction application filed by end of day Wednesday
- Assembled technical evidence: side-by-side source code comparison, API analysis, identical variable naming documentation
- Prepared Section 65B BSA certificate for digital evidence from the competitor’s public-facing application
- Filed ex parte application before the High Court of Telangana — obtained injunction within 72 hours
Phase 2: Criminal Complaint
- Filed criminal complaint under Section 66 IT Act and Copyright Act provisions with Hyderabad Cybercrime Cell
- Provided forensic analysis to cybercrime cell — facilitating their independent investigation
- Competitor’s premises searched; backup copies of disputed code seized by police
Phase 3: Contested Proceedings
- Competitor contested the injunction — filed affidavit denying copying
- Appointed software forensic expert witness — produced detailed technical report on code similarities
- Court-appointed technical expert confirmed substantial similarity and access by the ex-employee
- Injunction confirmed at inter partes hearing — competitor required to withdraw product from market
Phase 4: Settlement
- Competitor’s customers switched back to our client following product withdrawal
- Negotiated comprehensive settlement: substantial financial compensation, acknowledgement of copyright, undertaking not to re-develop the copied features for 3 years
- Former employee entered into separate settlement including confidentiality acknowledgement
SIRI Law LLP Expertise Applied
This matter drew on SIRI Law LLP’s cross-practice capabilities — combining deep subject matter expertise with procedural precision and strategic judgment.
Our Legal Approach
The Strategy That Delivered Results
The case succeeded because of the combination of evidentiary quality and procedural speed. Ex parte injunctions in IP cases require the applicant to demonstrate prima facie case and balance of convenience — and the quality of the technical comparison evidence was central to both.
We structured the technical analysis specifically to address the legal standard for substantial similarity in software copyright — going beyond visual similarity to address the functional and structural similarities that Indian courts have recognised as determinative in software cases.
The parallel criminal complaint was a deliberate strategic choice — the cybercrime cell’s independent seizure of the disputed code removed any argument that the injunction was based on fabricated evidence. It also created practical pressure on the competitor that accelerated settlement.
The Section 65B certificate for digital evidence from the competitor’s public-facing application was prepared with particular care — software copyright cases frequently fail on evidentiary grounds when digital evidence authentication is not handled precisely from the outset.
Key Principles Applied
Software Copyright
Trade Secret
IT Act Section 66
Digital Evidence (BSA 2023)
Ex Parte Injunction
IP Due Diligence
Outcomes Achieved
What Our Client Achieved
Ex Parte Injunction in 72 Hours
Product removed from market within 3 days of our retainer — preventing further customer loss and demonstrating decisive legal capability to the competitor.
Criminal Investigation Outcome
Cybercrime cell’s independent investigation corroborated our client’s evidence — strengthening the civil claim substantially.
Full Market Restoration
All 3 customers signed after the competitor’s product launch ultimately returned to our client following the competitor’s product withdrawal.
Substantial Financial Settlement
Settlement included meaningful financial compensation, 3-year development restriction, and formal acknowledgement of copyright ownership — protecting against future copying attempts.
Key Learnings & Implications
What This Matter Teaches Clients in Similar Situations
Software copyright protection in India is effective — but only if enforced quickly. Every day of continued access to copied code risks further dissemination, modification to obscure the copying, and additional customer loss that may be impossible to reverse.
The investment in clear employment agreements with comprehensive IP assignment, confidentiality, and notice provisions is the most cost-effective IP protection available. The ex-employee’s obligations were central to this case — and their enforceability was never seriously in question because they had been drafted precisely.
For technology companies: maintain version control with timestamps, document code authorship, and register copyright where commercially significant software is concerned. These practices transform a potential copying dispute from an evidentiary challenge into a clear, documentable case.
Have a Similar Matter?
We can advise you on your specific situation in a confidential consultation.
Contact Us →Facing a Similar Legal Challenge?
All consultations are confidential. Our team has the expertise to advise you on your specific matter.
Also see: View IPR & Technology Law · Contact Us

