Software Intellectual Property & Source Code Disputes
Software intellectual property disputes typically require detailed technical analysis of the code, data, or system itself. I provide expert evidence in matters involving software ownership, copyright infringement, licensing compliance, misappropriation of trade secrets, and database rights. My experience covers codebases ranging from embedded firmware and mobile applications to enterprise platforms and machine learning systems, as well as database IP disputes involving the subsistence, ownership, and infringement of database rights under the Copyright and Rights in Databases Regulations 1997. My instructions in this area have spanned the UK High Court (including the Intellectual Property List), international arbitration, and US proceedings.
What This Involves
Forensic code review in IP disputes involves the structured examination of source code, compiled binaries, version control history, and associated development artefacts to address specific questions put by the instructing party or the court. In my experience, the core questions in these matters tend to concern authorship (who wrote the code), originality (whether the code was independently developed or derived from another work), and compliance (whether the software meets the terms of its licence or specification). The methodology must be systematic, reproducible, and clearly documented so that it can withstand scrutiny from an opposing expert and cross-examination at trial.
A typical examination may involve line-by-line comparison of source files, analysis of version control metadata (including commit timestamps, author records, and branch histories), review of build systems and dependency configurations, and assessment of coding patterns and conventions. Where source code is not directly available, I have experience with reverse engineering and decompilation of compiled software and embedded firmware to recover functional logic for comparison. The tools and techniques used vary depending on the programming languages, platforms, and repositories involved, and I set out the methodology in detail within my expert report.
Database rights disputes raise distinct technical questions. The sui generis database right under the Copyright and Rights in Databases Regulations 1997 protects databases in which there has been a substantial investment in obtaining, verifying, or presenting the contents. The technical analysis in these matters often focuses on how a database was populated: whether its contents were obtained by collecting existing independent materials (which may attract protection) or whether the data was created as a by-product of another activity (which, following the distinction drawn in cases such as British Horseracing Board v William Hill, may not). I examine database architectures, data ingestion pipelines, ETL (extract, transform, load) processes, and the technical mechanisms by which data is collected, verified, and structured. Where infringement is alleged, the analysis addresses whether a substantial part of the database contents was extracted or re-utilised, which requires both quantitative and qualitative assessment of the data at issue.
In matters involving allegations of trade secret misappropriation or AI model theft, the analysis often extends beyond the source code itself to encompass training data pipelines, model architectures, hyperparameter configurations, and deployment artefacts. In each case, the objective is to provide the court or tribunal with a clear, technically grounded opinion on the specific questions at issue, acknowledging the limitations of the available evidence and the boundaries of what the analysis can and cannot determine.
Typical Instructions
- • Source code authorship and copyright analysis
- • Software licensing and IP ownership disputes
- • Database rights: subsistence, ownership, extraction, and re-utilisation
- • Reverse engineering and decompilation for IP theft detection
- • Misappropriation of trade secrets in software products
- • AI model theft and misuse of proprietary algorithms
- • Open source licence compliance and contamination analysis
- • Forensic comparison of competing codebases
Representative Experience
Selected from anonymised and public matters.
- • Investigation into alleged theft of an AI model from a Software-as-a-Service product, involving forensic analysis of source code and model architecture.
- • Forensic examination of embedded software source code in an IP theft dispute involving payment technology applications.
- • Assessment of confidential information misuse in commercial software, involving analysis of source code similarities and development timelines.
- • IP theft investigation concerning enterprise booking software, including forensic comparison of competing codebases.
- • Decompilation of embedded device firmware to investigate allegations of source code theft.
- • Expert declaration on source code version control, repository integrity, and manipulation of commit metadata in a copyright dispute over the NGINX web server software (Lynwood Investments/NGINX, $670m acquisition).
- • McKenzie friend on technical matters in a database rights dispute concerning postal address databases, involving questions of database population methodology, extraction, and re-utilisation (IDDQD Ltd v Codeberry Ltd [2025] EWHC 2561 (Ch)).
Related Insights
Forensic Code Review: What Courts Need to See in Software IP Disputes
How forensic source code analysis works in litigation, what it can reveal about authorship and copying, and what makes code evidence defensible in court.
What to Expect When Instructing a Technology Expert Witness
A practical guide for solicitors and in-house counsel on the process, timelines, and key considerations when instructing a technology expert under CPR Part 35 in England and Wales.
Related Expertise
Considering instructing a technology expert?
For a preliminary discussion about whether technology expert evidence may assist your matter, or to discuss the scope of a potential instruction.
Discuss an instruction