Louis Vuitton Malletier v Ng Hoe Seng [2025] SGHC 122
This is the first Singapore decision by a High Court Judge on the quantum of statutory damages under the multi-factorial framework in s 31(6) of the Singapore Trade Marks Act.
Law. Faith. Justice. Community. Culture.
Louis Vuitton Malletier v Ng Hoe Seng [2025] SGHC 122
This is the first Singapore decision by a High Court Judge on the quantum of statutory damages under the multi-factorial framework in s 31(6) of the Singapore Trade Marks Act.
Singapore Court of Appeal considers trade mark infringement and passing off claim involving internet keyword advertising: East Coast Podiatry Centre Pte Ltd v Family Podiatry Centre Pte Ltd [2025] SGCA 28
https://www.elitigation.sg/gd/s/2025_SGCA_28
As discussed in my comment on the High Court decision of this case here, this case concerned the defendant’s use of keywords “east coast podiatry”, “Podiatry East Coast”, and/or “Podiatrist East Coast” (the “Signs”) in Google ads. The ads appeared in various forms with links redirecting users to the defendant’s website, which did not contain the claimant’s Mark or any of its variants. The defendant used the Signs to advertise the impending opening of a new branch at the East Coast area, following advice from a Google consultant to use location-based keywords. The Court of Appeal (CA) dismissed the claimant’s appeal.
Continue reading “Contrasting Web Scraping Cases in SG and US “
Significance: Singapore Court of Appeal clarifies the law on breach of confidence, when wrongful gain and wrongful loss damages may be claimed for same or different sets of information, and pleadings for such claims.
Can the use of a competitor’s name in your Google ad words amount to intellectual property / trademark infringement and passing off?
Maybe.
Continue reading “IP questions about rebranding Twitter to “X” “
Siemens Industry Software Inc. (formerly known as Siemens Product Lifecycle Management Software Inc) v Inzign Pte Ltd [2023] SGHC 50
Employee installed unauthorised version of Siemens’ commercial software on a company laptop for his work without permission. Siemens sued the company for copyright infringement. Court held the company vicariously liable for the employee’s infringement but not directly or primarily liable.
In Asia Petworld Pte Ltd v Sivabalan s/o Ramasami [2022] SGHC 128, the General Division of the Singapore High Court (Philip Jeyaretnam J) analysed certain categories of information to determine if they were subject to implied general confidentiality obligations post-employment. The Court affirmed a key principle that the knowledge and experience that an employee acquires during his employment is not protectable confidential information post-employment.
I’ve been researching on choice of law issues in the metaverse.
Second Life is sort of a beta-metaverse, where people lived, made love and transacted virtually through avatars. Facebook’s proposed #metaverse is just an Augmented Reality (AR) enhanced version of the concept.
I stumbled on this eyebrow-raising litigation concerning Second Life.
A study found that more than half of employees steal confidential company information when they leave their employment. Data taken include customer email addresses and contact lists. Some of these may include personal data.
Employees can use stolen data to solicit clients or trade secrets to develop competing products or services. Some have tried to sell stolen data online for millions of dollars. Such conduct may harm the company’s reputation, trade connections and business interests. The company may also be deemed to be in breach of data protection legislation.
I’ve written about this issue elsewhere. Here’re further thoughts on it.
Insert robust confidentiality clauses in employment contracts. It should be drafted bespoke to your business context to ensure it covers the type of confidential data your business deals with. Note that there are legal nuances about the scope of such clauses which affect their enforceability.
Confidentiality clauses should be drafted alongside non-solicitation, garden leave, termination and forfeiture provisions to ensure they harmonize and work together to protect the company.
Develop & implement written policies on data management, security and access.
Ensure that such policies are read, briefed and explicitly acknowledged by all employees.
Access to, and admin control of, highly secret or sensitive data should be restricted to select categories of employees.
Personal email accounts, storage devices, cloud storage applications should be prohibited. Provide company-controlled storage devices and cloud storage solutions.
Just before an employee’s termination, their company devices should be immediately returned. If there is a suspected data breach, do not conduct your own checks on the device as you may accidentally overwrite evidential data. There may be subsequent allegations raised about the chain of custody of the evidence.
Instead, consider sending it to an external IT forensic expert to conduct the review. If there are internal skilled IT personnel who are able to conduct such a forensic investigation, ensure that this is done by such personnel with their every activity logged.
The forensic investigation should be able to reveal if data has been emailed, copied, transferred or deleted.
Some IT forensic service providers include:
https://www.infinityforensics.com/
http://www.rp-ds.com/#!/our-services
https://www.rsm.global/singapore/service/advisory/digital-forensics-investigation
https://www.am-investigators.com/investigator-services/
https://private-investigator-singapore.com/digital-forensics-singapore/
There are IT solutions which enable you to detect when large amounts of data have been transferred or copied out of any company device.
Set the company VPN or intranet network to disable access to commonly used cloud storage applications like Dropbox, Box and Google Drive.
For employees who have tendered their resignations and are serving out their notice period, consider conducting a spot check on their company devices and accounts while they are still employed with the company. Check their access to data on cloud or shared servers or drives for unusual activity. If necessary, place them on garden leave.
A review of devices and accounts, suspension of accounts, and suspension of account-connected devices such as smartphones should be conducted on the last day of employment.
You will need to act fast in preparing the evidence and court papers to apply for an urgent interim injunction or court order to stop the ex-employee from further wrongful use or disclosure of the confidential data. (It is interim in the sense that it is temporary until the entire matter has been resolved.)
Other commonly sought orders in an interim injunction include:
The aforementioned interim injunction is part of the main civil claim that a business can bring against its ex-employees.
In the main civil claim, the company may claim, in addition to a permanent injunction, for monetary damages or an account of the profits. An account of profits is an order to disclose the profits made by the defendant, and to pay to the claimant such amount, derived from the wrongful use of the confidential information.
As regards damages, the claimant may claim for:
A breach of confidence per se may not amount to a criminal offence. However, if there is unauthorized access to computer systems, it may be criminal.
You may wish to report the matter to the police. The police may consider it a private civil matter. However, in some situations, especially where it concerns regulated industries like banking and finance, the police will take action. For example, in 2008, 7 ex-employees of Citibank stole customer data and left for rival bank UBS. They were charged under the Computer Misuse Act and banking customer secrecy provisions in the Banking Act.
If personal data may have been taken, you will need to assess whether the data breach notification obligations in the Personal Data Protection Act 2012 are triggered. There are certain deadlines to such assessments and notifications. Broadly, the criteria for data breach notification is significant harm to affected individuals (based on class of personal data) or significant scale (500 or more individuals).
Businesses would want to swiftly respond to data breaches by courting customers or employees who may have been poached, assuring remaining customers about their data, and patch any gaps in their data security or management processes.
In legal disputes concerning these circumstances, the following legal issues are commonly fought between parties.
A confidentiality obligation may apply because of an express contract term or under the general law of equity.
If it is based on an express contract term, the issues which follow is the scope of the term and the interpretation of the wording.
If it is based on the general law of equity, the Singapore Court of Appeal in I-Admin (Singapore) Pte Ltd v Hong Ying Ting and others [2020] SGCA 32 has held that the court must first consider two prerequisites:
a. whether the information in question has the necessary quality of confidence about it; and
b. whether it was imparted in circumstances importing an obligation of confidence. An obligation of confidence will also be found where confidential information has been accessed or acquired without the plaintiff’s knowledge or consent.
It is upon the satisfaction of these prerequisites that an action for breach of confidence may be presumed.
The presumption can be displaced where, eg, the defendant came across the information by accident or was unaware of its confidential nature or believed that there is a strong public interest in disclosing it. The burden of proof is shifted to the defendant to prove that his conscience was unaffected.
The legal framework to analyse whether data or information is confidential or trade secrets is broadly also based on (i) the wording of the contract term (if any); or (ii) general law’s categorization of types of information applied to the facts.
On (ii), the legal authority often cited is Faccenda Chicken Ltd v Fowler [1985] 1 All ER 724 (Ch). There, the English High Court classified 3 categories: (i) trivial information; (ii) confidential information which when internalized into the memory of an employee becomes part of his skill and knowledge; (iii) specific trade secrets so confidential that even if learnt by heart cannot be used by an employee after he has left the employment.
It is often held by courts that client information, client lists, pricing information, unique recipes, unique chemical formula, etc. are confidential.
Compilation of data into database based on information from the public domain may be deemed confidential (I-Admin).
While an express contractual provision on confidentiality will not apply to a third party who receives the confidential information, e.g. the new employer of the employee who left the claimant, a third party recipient may be imposed with an obligation of confidence under general equitable principles.
This is significant because it would allow the claimant to also claim against the new or prospective employer.
The approach set out in I-Admin mentioned above would apply. The question thus is whether the information is confidential and the information was imparted in circumstances importing an obligation of confidentiality.
The issue is the knowledge the recipient has about whether the information is confidential and how the recipient received the information.
If indeed it would be obvious to any reasonable person that the information is confidential, the recipient may well be subject to the confidentiality obligation.
It is often the case that employees will use the confidential data stolen to benefit themselves in a new business they begin or for a new employer.
As such, the claimant company will often also claim in breach of non-solicit of customers and/or non-compete clauses (if any).
The usual issues which then arise is whether those clauses are reasonable and thus enforceable. Or even if not, whether parts of such clauses can be severed to render the remainder enforceable.
Optimally, these clauses should have been well drafted from the outset, narrowly limited to protect only the legitimate interests of the employer, and customized to the specific employer’s context.