Without Evidence, You Lose Even When You Have Rights
Copyright arises automatically at the moment of creation. No registration with the Agency for Cultural Affairs is required, and no examination process like patents exists. The moment a web design is completed, the moment an illustration is finished — from that point forward, the copyright belongs to the creator.
However, this "automatic arising" convenience becomes a pitfall in real-world practice. That is because the existence of a right and being able to assert that right and prevail are two different things.
Suppose a freelance designer discovers a logo they delivered to a client appearing on another company's website. The designer is certain they created it, but the other party claims "our in-house designer created this independently." At that moment, what matters is proof that "I created this first." Even when it seems obvious, an assertion without evidence will not hold up in legal proceedings.
Similar cases arise in multiple forms. A situation where the company that commissioned freelance illustration claims to have acquired the copyright and restricts secondary use. A case where a past design is suspected of being reused in another project. A case where draft data leaked during production is used commercially by a third party. In all of these, whether you have copyright evidence on hand dramatically changes how you can respond.
In civil copyright infringement litigation, the general rule is that the party claiming infringement (the plaintiff) bears the burden of proof. This means two points must be proven: "I am the rights holder" and "the other party infringed my rights." In proving the former, evidence showing "who created what and when" is indispensable.
The starting point for protecting your creative work is accumulating evidence to assert your rights during ordinary times. Using registration systems, affixing timestamps, saving work logs — these may seem tedious, but they are the kind of thing you only realize you should have done after a dispute arises.
Copyright Registration System — What It Can and Cannot Do
Japan's Copyright Act includes a registration system with the Agency for Cultural Affairs. However, this registration has a different character from copyright systems in Western countries. In Japan, because copyright arises without registration, registration is not a requirement for the right to arise — it is positioned as "an auxiliary means of proof."
The main items that can currently be registered are as follows.
Real-name registration is a system for registering who the actual author is for works published under anonymous or pseudonymous names. Registration creates a presumption that the author is the true rights holder. It functions as a means for creators active under pen names or business names to publicly record the connection to their real identity.
Registration of the date of first publication registers the date of first publication (or first public announcement) of a work. This creates a public record that the work existed on that date. It has effect in situations where the order of creation is disputed, such as when multiple creators independently created works on the same theme.
Registration of copyright transfer registers the fact of copyright assignment or inheritance. Copyright is an intangible property right, and the fact of transfer is difficult to see from outside. By registering a transfer, it becomes opposable even against good-faith third parties.
Registration applications are made to the Copyright Division of the Agency for Cultural Affairs. Registration fees range from a few thousand yen to tens of thousands of yen depending on the type. Application forms and copies of the target work (in the case of digital data, a CD-ROM, etc.) must be submitted.
However, the copyright registration system also has clear limitations. First, except for program works, the system is centered on registration of "when it was published or announced" rather than "when it was created." It can be unsuitable for proving the production stage. Second, what registration proves is only the information at the time of registration, and responding to subsequent changes in content becomes complex. Furthermore, because there is no mechanism to examine the authenticity of registered information, the risk of false registration cannot be eliminated.
Given these limitations, rather than using copyright registration alone as a rights protection measure, combining it with timestamps and notarization as described below is the best practical approach.
Evidence Preservation via Timestamps, Notarization, and Hash Values
Multiple evidence preservation methods are available as supplements to the copyright registration system, or as alternatives when registration is not performed. The mechanism and applicable scenarios for each are organized here.
Timestamp services are systems in which a third-party organization certifies that electronic data existed at a specific time. Multiple private operators such as Seiko Solutions and TDT (time authentication authorities) offer services, some available from a few hundred yen per month. A "timestamp token" is issued with time information added to the hash value of the target file, functioning as tamper-proof time certification.
By affixing timestamps to final versions and major intermediate files of deliverables — web design source files, illustration PSD data, video project files — you can objectively prove the fact that "at minimum, this data existed at this point in time."
Fixed date certification at a notary public is a system in which a notary certifies a document with a date. The procedure is available at notary offices throughout Japan, with a fee of ¥700 (per document). However, the fixed date only certifies the date on which that document existed; it does not guarantee the authenticity of its contents. It is more suited to obtaining fixed dates for copyright-related contracts and agreements rather than for the creative work itself.
Blockchain utilization is a relatively new evidence preservation method. It uses the tamper-resistant nature of distributed ledgers to record the hash value of files and registration time. Multiple domestic and international services exist, but legal evaluation as evidence is still in a developing phase. For now, treating it as a supplementary measure is appropriate.
Metadata retention and utilization is also an important evidence preservation method. EXIF data embedded in image files records the date and time of creation, software used, author information, and more. Version management history of design files, Git commit logs, and cloud storage file update history serve similar functions. These exist without any special procedures, but managing and preserving them consciously increases their evidentiary value.
Specifically, the following points are worth keeping in mind:
- Enter "author" information in document properties when saving Photoshop, Illustrator, and similar files
- Manage production files with a Git repository and preserve commit history
- Enable version history in cloud storage and configure deletion protection
- Self-email major milestone completion files to create timestamps at no cost
Self-emailing is a simple method achievable at zero cost. Sending work-in-progress files to yourself causes the mail server's timestamp to be attached. Its legal evidentiary capacity is inferior to the timestamp services mentioned above, but it is effective from the perspective of accumulating multiple pieces of evidence as supplementary records.
Evidence Management Checklist by Production Phase
Evidence preservation can be reliably implemented by incorporating it into each phase of the production workflow. To avoid regret later, the following organizes steps from order acceptance through post-completion.
Pre-order and contracting stage
- Include company name, date, and version number explicitly in proposals and estimates
- Specify copyright ownership (assignment or license) explicitly in the contract, and obtain a fixed date certification
- Centrally manage and do not delete client requirement confirmation emails
- Conduct a reverse image search in advance to confirm no similar existing works
During production
- Enable version management functions in Git or design tools
- Affix timestamps at major milestones (drafts, intermediate submissions)
- Save work logs (sketches, thinking notes) with dates
- Record the source and usage conditions of materials, fonts, and external resources
At delivery
- Calculate the hash value (SHA-256, etc.) of deliverables and record it in-house
- Include copyright-related clauses in delivery confirmation and acceptance documents
- Double-save final deliverable backups to both cloud and physical media
- Register with a timestamp service (particularly for high-value projects or those expected to be used long-term)
Post-completion
- Retain client correspondence emails for 3–5 years after project completion
- When publishing deliverables in a portfolio, explicitly note the "initial public release date"
- Periodically check for unauthorized use via reverse image searches
- Keep in mind the copyright duration (70 years after the author's death) and organize records for important works
Regarding retention periods for evidence, the right to claim damages for copyright infringement based on tort expires after "3 years from when the damage and the perpetrator became known," or "20 years from the time of the tort" (Civil Code Article 724). Evidence for major works should be retained for at least 20 years after production completion.
Initial Response When You Discover Rights Infringement
This section organizes how to proceed when infringement is discovered with evidence in hand. The quality of the initial response significantly affects the speed and outcome of subsequent resolution.
Securing evidence (immediately after discovery)
First, preserve the state of infringement as evidence. Take multiple screenshots of the problematic web page and save them with filenames containing the URL and access date and time. Using a web archive service to create an archive of the page is also effective. For unauthorized use on social media, record the post URL and account information.
Reviewing your own evidence
Next, organize the evidence on hand. Collect timestamped files, production version histories, email correspondence with clients, and delivery records in one place. Be ready to rebut if the other party claims "I created this first."
Assessing the possibility of copyright infringement
Multiple factors come into play when determining whether infringement has occurred. "Similarity of ideas" does not constitute copyright infringement, but "similarity of expression" can. Whether it was intentional copying or coincidental similarity also changes the appropriate response. Whether the other party had access to your work (dependency) is also an important factor. If self-judgment is difficult, consultation with an attorney specializing in copyright is recommended.
Notifying the other party
If infringement is clear, the general procedure is to first contact the other party. Notify them by certified mail with delivery confirmation (naiyō shōmeiyūbin) of "notification of the fact of copyright infringement," "request to cease use," and "claim for damages (if necessary)." Since certified mail records the date and time of delivery, it becomes useful in subsequent proceedings. Consider consulting an attorney at this stage as well.
Government agencies and legal procedures
If negotiations fail, options include consultation with the Agency for Cultural Affairs and filing civil mediation or litigation through an attorney. Copyright infringement is also subject to criminal penalties (imprisonment of up to 10 years or a fine of up to ¥10 million), so criminal complaint is also an option for egregious cases. However, since legal proceedings involve cost and time, it is important to make a comprehensive judgment considering the scale of infringement, amount of damage, and prospects for resolution.
Evidence preservation during ordinary times and rapid initial response when infringement is discovered are the two pillars of protecting your creative work. Making "copyright belongs to the creator" function as a real right in practice requires both an understanding of the system and practical preparation.
References
- Agency for Cultural Affairs, "Explanation of the Copyright Registration System," https://www.bunka.go.jp/seisaku/chosakuken/seidokaisetsu/toroku/
- Software Information Center (SOFTIC), "Explanation of the Registration System for Program Works," https://www.softic.or.jp/
- Agency for Cultural Affairs, "Copyright Textbook," https://www.bunka.go.jp/seisaku/chosakuken/seidokaisetsu/kyoiku_textbook/