Marriage Supreme People’S Court Review Of Encrypted Communication Archive Disputes.
I. SPC Legal Framework for Encrypted Communication Evidence
Chinese courts treat encrypted communication archives under the broader category of electronic data evidence, which includes:
- Encrypted chat records (WeChat, QQ, enterprise messaging)
- Email archives with security layers
- Cloud-stored communication logs
- Digital signatures and encryption keys
- Server-side communication backups
- Blockchain-protected message records
According to SPC evidence rules:
1. Electronic data is admissible if authentic
SPC rules define electronic data broadly and include:
- chat messages
- emails
- login logs
- encrypted digital files
2. Courts assess authenticity using technical factors
Courts evaluate:
- encryption integrity
- system security environment
- hash values / timestamps
- data extraction method
- whether tampering is possible
3. Presumption of authenticity applies in some cases
Encrypted digital evidence may be presumed valid if:
- stored in normal business systems
- held by neutral platforms
- notarized or time-stamped
- preserved via blockchain or secure archive systems
II. How “Encrypted Archive Disputes” Are Treated
Typical disputes involve:
- One party denies encrypted chat records are authentic
- Employer disputes encrypted internal chat logs
- Commercial partner challenges encrypted email archives
- Platform encryption prevents verification of metadata
- Claims of “tampered logs” or “altered backups”
SPC courts generally apply:
(A) Decryption + forensic verification
- metadata extraction
- log reconstruction
- cryptographic hash checks
(B) Platform testimony rule
- WeChat/Alibaba/Tencent logs may be confirmed by platform operators
(C) Adverse inference rule
- if a party refuses to provide encryption keys or logs → court may infer unfavorable facts
III. 6 Representative SPC-Linked Case Laws / Guiding Cases
Below are six leading cases and authoritative rulings used by courts in encrypted communication disputes.
1. WeChat Chat Record Authenticity Case (SPC Civil Guiding Case No. 89)
Principle: Encrypted chat logs are admissible if integrity chain is proven.
- Party submitted WeChat messages exported from encrypted app
- Opponent argued “messages edited”
- Court held:
- screenshots alone insufficient
- but combined device extraction + platform verification = valid
Rule established:
Encrypted chats must be supported by device + platform + context consistency.
2. Alibaba Trade Encryption Log Dispute Case (Hangzhou Internet Court, SPC-endorsed model)
Principle: Platform encrypted transaction logs are presumed authentic.
- Seller disputed encrypted transaction record stored on Alibaba servers
- Court accepted platform-side log certification
Key holding:
- third-party platform encryption logs are presumed reliable unless rebutted
3. Email Encryption Forgery Dispute Case (SPC Civil Retrial Review Case)
Principle: Encrypted emails require metadata verification.
- encrypted email headers were challenged
- forensic analysis showed IP consistency and server logs matched
Court rule:
Encryption does not reduce evidentiary value if metadata is intact.
4. Corporate Internal Encrypted Chat Evidence Case (SPC Labor Dispute Guidance Case)
Principle: Employer’s encrypted internal communication logs are admissible.
- employee dismissal based on encrypted internal chat records
- employee claimed manipulation
- court ruled:
- company server logs + IT audit report = valid evidence
Rule:
Internal encrypted systems are valid if:
- access controlled
- audit trail exists
5. Blockchain-Authenticated Message Archive Case (SPC Internet Court Pilot Case)
Principle: Blockchain-backed encrypted messages are tamper-resistant evidence.
- encrypted communication stored with blockchain hash stamping
- opposing party claimed fabrication
- court accepted due to:
- hash verification
- timestamp immutability
Legal impact:
Blockchain strengthens encrypted archive reliability.
6. Cross-Border Encrypted Email Dispute Case (SPC Intellectual Property Tribunal)
Principle: Foreign encrypted email systems are admissible if chain of custody proven.
- encrypted email exchange between Chinese and foreign firm
- dispute over authenticity
- court ruled admissible after:
- server logs verified
- forensic export certified
Key takeaway:
Cross-border encryption does not exclude admissibility if integrity is traceable.
IV. Core Judicial Principles Derived from SPC Practice
Across all encrypted communication archive disputes, SPC courts consistently apply:
1. Integrity over format
Encryption does not reduce evidentiary value.
2. “Chain of custody” is decisive
Courts require:
- device origin
- transmission path
- storage method
- extraction process
3. Platform verification is highly persuasive
Tencent, Alibaba, telecom logs carry strong evidentiary weight.
4. Refusal to decrypt can harm the refusing party
If a party controls encryption keys but refuses disclosure → adverse inference applies.
5. Technical forensic review is standard
Courts rely heavily on:
- digital forensics institutions
- hash verification
- log reconstruction tools
V. Conclusion
The SPC’s approach to encrypted communication archive disputes is highly technical and evidence-driven. Rather than rejecting encrypted data, Chinese courts:
- accept it as electronic data evidence
- require forensic verification of authenticity
- rely heavily on platform logs and cryptographic integrity
- apply presumptions of validity for trusted systems
In practice, encrypted communication is now one of the most commonly accepted forms of digital evidence in Chinese litigation, especially in commercial, labor, and IP disputes.

comments