Tap to close
Confidential Information Disputes Commercial Litigation · Sub-Practice

Breach of Confidence.

Equitable doctrine · from the obligation to hold information in trust The unauthorized use or disclosure of information imparted in circumstances importing an obligation of confidence. Distinct from contract, fiduciary duty, and intellectual property, the tort protects the substance of commercial and personal trust. Claimants must show the information was confidential, that it was communicated in circumstances importing confidence, and that it was used to the claimant's detriment. Remedies include damages, equitable compensation, accounting for profits, constructive trust, injunctions, delivery-up, and Anton Piller orders.

Grigoras Law acts for corporations, founders, senior employees, joint venture partners, and professionals in breach of confidence disputes across Ontario. We represent both claimants and respondents in cases involving misuse of trade secrets, client and supplier lists, pricing and margin data, technical know-how, and information shared under NDAs or in pre-contractual negotiations. We move quickly on urgent preservation and injunctive relief when disclosure is ongoing or imminent.

What we do

Breach of confidence services.

Confidential information work runs along three lines: the subject matter (what kind of information, and whether it qualifies as confidential in the first place), the context of disclosure (the relationship or instrument that made it confidential), and the remedy (what actually stops the misuse and compensates for it). Each item below links to the treatise.

Representative work

Selected breach of confidence matters.

A representative matter from Grigoras Law's confidential information practice. Names and identifying details have been removed. Additional representative work is available on request, subject to the confidentiality obligations that attach to sensitive commercial files.

Ontario Superior Court of JusticeBreach of confidence, fiduciary duty, and equitable remedies

Alleged insider competition and misuse of confidential commercial assets

Counsel to a Canadian company pursuing claims against a former insider and related parties for disloyal competition and exploitation of proprietary pricing, product, and customer intelligence. Relief sought includes an accounting and disgorgement, constructive trust with tracing, permanent injunctive restraints on use or disclosure of confidential material, delivery-up and deletion orders, and preservation and production of records to quantify diverted business. Monetary relief claimed encompasses general, aggravated, and punitive damages, together with interest and costs.

Confidence
The law, explained

A practitioner's guide to breach of confidence in Ontario.

Long-form analysis of the doctrine that governs commercial information disputes in this province: what qualifies as confidential information, what it means to impart information in circumstances importing an obligation of confidence, how confidence differs from contract and fiduciary duty and intellectual property, the recurring scenarios (employees, joint ventures, trade secrets, client lists), the defences that succeed, and the remedies (equitable and monetary) that courts actually grant. Written as a reference. Updated periodically.

Chapter 01

Understanding breach of confidence.

An equitable doctrine that protects information shared in trust. The claim sits in the space between contract, fiduciary duty, and intellectual property, and reaches conduct those other doctrines cannot always catch.

The law protects information not because it is property, but because the relationship in which it was shared demands that it not be turned against the person who disclosed it. The equitable foundation of confidence

Breach of confidence is the equitable cause of action that protects the substance of trust in commercial and personal relationships. Unlike a contract claim, which enforces the specific terms of a bargain, or a fiduciary duty claim, which addresses disloyalty in a relationship of discretionary power, breach of confidence reaches any situation in which information has been communicated on the understanding (express, implied, or imposed by the circumstances) that it will not be used against the interests of the person who shared it. In Canadian law, the doctrine is sourced in equity and applied regardless of whether a written non-disclosure agreement exists.

The practical significance of the doctrine lies in its breadth. It can be invoked against a former employee who takes customer data, a joint venture partner who exploits technical know-how learned in diligence, a prospective buyer who uses pricing data to build a competing product, or an advisor who exploits information gained in a professional engagement. The claim does not require ownership of intellectual property. It does not require a signed NDA. It requires only that the three elements of the cause of action can be proven.

What is Breach of Confidence?

Breach of confidence occurs when a person who has received information in circumstances importing an obligation of confidence uses or discloses that information in a way that is inconsistent with the obligation and to the detriment of the person who imparted it. The test is functional: courts ask whether the substance of the information was confidential, whether the circumstances of disclosure communicated an expectation of confidence, and whether the information was in fact misused. Intent to harm is not required. An honest but mistaken belief that the information was free to use is generally not a defence where the three elements are satisfied.

The modern doctrine descends from nineteenth-century English equity cases, most famously Prince Albert v. Strange (1849) and Morison v. Moat (1851). The contemporary Canadian test is most commonly traced to the English decision in Coco v. A.N. Clark (Engineers) Ltd., [1969] R.P.C. 41, where Megarry J. articulated the three-part framework that Canadian courts adopted.

The Canadian Framework
Lac Minerals Ltd. v. International Corona Resources Ltd., [1989] 2 S.C.R. 574

The Supreme Court of Canada formally adopted the Coco three-part test: the information must have the necessary quality of confidence about it; it must have been imparted in circumstances importing an obligation of confidence; and there must have been an unauthorized use of that information to the detriment of the party communicating it. The Court held that confidential geological data shared during acquisition negotiations had been misused when the recipient used it to acquire the property for itself. A constructive trust was imposed over the mining property, reinforcing the principle that equitable remedies can transfer proprietary rights where the conduct demands it.

Key Elements of the Claim

ElementWhat must be provenWhat it is not
Necessary quality of confidenceThe information is not public, not trivial, and has some commercial or personal value because it is not generally known.Information in the public domain, trivial gossip, or the general skill and knowledge an employee carries in their head.
Imparted in confidenceThe circumstances (relationship, instrument, context) communicated to the recipient that the information was not for free use.Information volunteered at a trade conference, published in marketing materials, or shared without any expectation of restriction.
Unauthorized use to detrimentThe recipient used or disclosed the information inconsistently with the obligation, causing harm or unjust gain.Use that was consented to, use of information genuinely developed independently, or use after the information became public through legitimate means.

Each element does independent work. A claim can fail at the first stage because the information is too general or already public, at the second because the circumstances did not communicate an obligation of confidence, or at the third because no detrimental use occurred or because the defendant's conduct is explained by independent development. A well-pleaded case addresses each element with specific evidence rather than conclusory assertions.

Chapter 02

Relationship to other claims.

Breach of confidence frequently overlaps with contract, fiduciary duty, and intellectual property. The distinctions are not academic: they determine what must be proven, who bears the onus, and which remedies are available.

Choosing the right cause of action (or combination of them) is a strategic decision. Confidence claims have broader reach than contract but narrower reach than fiduciary duty. They operate alongside intellectual property regimes but fill gaps the IP statutes do not cover. And they differ from privacy and unjust enrichment in ways that affect pleading, discovery, and trial.

Breach of Confidence vs Breach of Contract

A well-drafted non-disclosure agreement offers the advantage of precision: it defines the information, specifies permitted uses, sets a duration, and addresses remedies. But contract alone has limits. It binds only the signatories; it may be narrowly drafted in ways that exclude the actual misuse; and its remedies are typically calibrated to expectation damages rather than the disgorgement of profits that confidence can reach. Breach of confidence, by contrast, applies regardless of whether an NDA exists, reaches downstream recipients in some cases, and opens the door to equitable remedies that a pure contract claim cannot. Where both are available, they are typically pleaded together.

Breach of Confidence vs Breach of Fiduciary Duty

Fiduciary duty requires a relationship of trust characterized by discretionary power and vulnerability. Breach of confidence does not. A prospective joint venture partner who receives confidential information in diligence may owe a confidence obligation without owing a fiduciary duty. Where a fiduciary relationship does exist (director to corporation, lawyer to client, partner to partner), the two claims often travel together: the onus shifts on the fiduciary side, causation is applied more flexibly, and disgorgement is available without proof of loss. Pleading both preserves the full range of remedies and forces the defendant to meet both standards of scrutiny.

Breach of Confidence and Intellectual Property

Patents, copyrights, and trademarks protect specific categories of intellectual output, but they do not protect everything commercially valuable. Ideas and methodologies not yet reduced to a patentable invention, pricing spreadsheets, customer lists, and pre-publication manuscripts all sit outside formal IP protection while being exactly the kind of information confidence was designed to protect. In trade-secret cases especially, breach of confidence is often the primary cause of action, with IP infringement pleaded in the alternative where fixed expressions or registered rights are also implicated. Confidence protects the substance; IP protects the form.

Distinction from Privacy and Unjust Enrichment

Privacy torts (intrusion upon seclusion, public disclosure of private facts) protect the individual's personal sphere and generally require the information to concern the plaintiff's private life rather than commercial affairs. Unjust enrichment addresses benefits received without juristic reason and is typically pleaded where a confidence or fiduciary claim is not squarely available. Each can be pleaded alongside breach of confidence in appropriate cases, but each has its own elements and remedy set. Confidence remains the primary doctrine where commercial information has been shared in trust and later turned against the claimant.

Chapter 03

Common scenarios.

The doctrine shows up in a predictable set of fact patterns: departing employees, misused trade secrets and client lists, and confidential information shared during pre-contractual negotiations or joint ventures. Each has its own evidentiary rhythm.

Misuse of Confidential Business Information

Pricing models, supplier contracts, financial projections, strategic plans, customer data, and internal performance analytics are the commercial core of most modern businesses. When that information leaks to a competitor, whether through a departing executive, a disgruntled insider, or a prospective buyer who walked away from a transaction, the damage is often immediate: margins compress, bids are undercut, customers are approached with tailored proposals. Breach of confidence provides the framework for both stopping the use and recovering the benefit. Courts take the commercial sensitivity of such information seriously, and the first question is usually whether urgent injunctive relief is appropriate to preserve the position while the full claim is litigated.

Employee and Executive Misconduct

Employees owe an implied duty of fidelity during employment that extends to the protection of confidential information. Senior employees and executives carry obligations that may survive the employment relationship, particularly where the information qualifies as a trade secret or where written covenants are in place. The line between legitimate use of general skill and knowledge (which the law permits an employee to take to a new job) and misuse of confidential information (which it does not) is where most cases turn. Courts examine what was actually taken, how it was used, whether it conferred an unearned head-start, and whether the new employer knew or ought to have known of its provenance. Springboard doctrine plays an important role in shaping the appropriate remedy.

Misuse of Client Lists or Trade Secrets

Customer lists and trade secrets are among the most frequently litigated subjects in confidence cases. A customer list is not automatically confidential: a publicly compiled roster of general prospects usually is not, but a curated list developed over years that captures buying patterns, pricing history, contact hierarchy, and internal decision-makers often is. Trade secrets (formulas, processes, technical know-how) are confidential by their nature if the holder has taken reasonable steps to protect them. The reasonableness of those steps matters: access controls, confidentiality marking, password protection, and limited circulation all go to whether the information has the necessary quality of confidence.

Breach During Commercial Negotiations or Joint Ventures

Diligence in M&A, investor pitches, joint venture discussions, and licensing negotiations routinely involve exchanges of sensitive commercial information. When a deal falls through and one side uses what it learned to compete directly or to structure an alternative transaction that displaces the original counterparty, breach of confidence is often the primary remedy. Lac Minerals itself is this scenario. The existence (or absence) of a pre-diligence NDA is relevant but not determinative: equity will find an obligation of confidence where the circumstances communicated one, even in the absence of a signed agreement. Springboard-style injunctions and constructive trusts are frequently deployed in this category.

Chapter 04

Defending a confidence claim.

The same three elements that define the claim define the defence. Information not truly confidential, circumstances that did not import an obligation, absence of misuse or detriment, and a short list of established equitable defences.

DefenceBasisEffect if established
Not truly confidentialInformation is in the public domain, is trivial, or is the generality of skill and experience the defendant carries in their head.Claim fails at the first element; no further analysis of circumstances or misuse is required.
No confidential circumstancesInformation was shared openly, at a public event, or without any basis from which an obligation of confidence could be inferred.Claim fails at the second element; the recipient was free to use it.
No misuse or detrimentThe defendant did not use the information, or used it only with consent, or the claimant cannot show detriment or unjust gain flowing from the use.Claim fails at the third element; declaratory relief may still be available in limited cases.
Independent developmentThe defendant developed the same information or product independently, without use of the claimant's disclosure.Use is explained by the independent source; the claimant's information is not the cause of the alleged harm.
Consent & authorisationExpress or implied consent to use, or authorisation under an NDA or other instrument.Use falls within the permitted scope; liability does not attach.
Laches & limitationUnreasonable delay causing prejudice to the defendant, or the expiry of the two-year period under the Limitations Act, 2002.Equitable relief barred or reduced; monetary claims statutorily barred subject to discoverability.

When Information is Not Truly Confidential

The first and most frequently successful defence is that the information lacks the necessary quality of confidence. Information disclosed in a public filing, product announcement, industry publication, or trade conference is no longer confidential, even if the particular recipient learned it in private. Similarly, skill, experience, industry insight, and general know-how that an employee acquires in the course of their work is theirs to carry to a new employer. The defence often succeeds where the claimant has overclaimed, asserting confidence over information that is generic, already in the market, or so bound up with the defendant's own capabilities that it cannot meaningfully be separated.

Lack of Confidential Circumstances

Even genuinely non-public information may be shared in circumstances that do not communicate an obligation of confidence. An unsolicited disclosure, a conversation at a networking event, or information volunteered without any marking or preamble may fail the second element. The defence is fact-intensive: it turns on the relationship between the parties, the context of the disclosure, the presence or absence of confidentiality language, and whether a reasonable person in the recipient's position would have understood that restrictions applied. Claimants defeat this defence by pointing to explicit confidentiality language, course of dealing, industry norms, or the commercial sensitivity of the subject matter itself.

Absence of Misuse or Detriment

The third element is the narrowest defence path because Canadian courts have repeatedly held that detriment is interpreted broadly, extending to wounded feelings and loss of opportunity as well as hard financial loss. Still, a defendant who can show that the information was not in fact used (for example, that a product was independently designed before the disclosure was received), or that any use caused no harm and no unjust gain, may defeat the claim. Independent development is the most common pathway here, and it is one reason defendants in this area routinely maintain clean development records, segregated teams, and documented innovation timelines.

Other Available Defences

Beyond the three elements, equity recognises a familiar cluster of defences. Consent, whether express (in an NDA or governance instrument) or implied (from course of dealing), defeats the claim for the scope of the authorisation. Laches bars equitable relief where the claimant's unreasonable delay has prejudiced the defendant. The Ontario Limitations Act, 2002, imposes a two-year basic limitation period from discoverability, with a fifteen-year ultimate limitation period. Public interest disclosure, while more developed in the English authorities than in Canadian law, may justify disclosure of iniquity or serious wrongdoing. Each of these defences is narrowly construed and will not succeed on a bare assertion: the defendant must plead specifics and adduce evidence.

Chapter 05

Remedies and court relief.

The remedy set is equitable first. Injunctions to stop the misuse, accounting and constructive trust to strip the gain, delivery-up and Anton Piller orders to preserve the evidence, and damages or equitable compensation to repair the loss.

RemedyWhat it doesWhen it is deployed
Damages / equitable compensationMonetary award to repair loss or restore the claimant's position.Where the misuse has caused quantifiable financial harm or diminished value.
Accounting for profitsDisgorgement of all gains obtained through the breach, regardless of claimant's loss.Where profits are the more reliable measure of the wrong, or where loss is hard to quantify but gain is evident.
Constructive trustProprietary remedy treating specific assets acquired through breach as held for the claimant.Where identifiable assets can be traced to the breach, including in insolvency where priority matters.
Injunctive reliefInterim, interlocutory, or permanent orders restraining use or disclosure of the information.Where misuse is ongoing or imminent and damages would not be an adequate remedy.
Delivery-up & destructionOrders requiring return or destruction of materials containing the confidential information.Paired with injunctions to remove the physical ability to continue the misuse.
Anton Piller orderCivil search order authorising entry onto premises to preserve evidence at imminent risk of destruction.Exceptional cases where the claimant meets the strict Anton Piller threshold; supervised by an independent solicitor.

Damages and Equitable Compensation

Damages in confidence cases are assessed with equitable flexibility. The measure can approximate what a reasonable licence fee would have been (the so-called user principle), the lost profits the claimant would otherwise have earned, or the broader economic harm of having a competitor launch a product on the back of the misused information. Where the relationship is also fiduciary, equitable compensation applies: foreseeability does not constrain recovery, and causation is applied flexibly to restore the claimant to the position they would have occupied absent the breach. Claimants preserve the full range by pleading both measures in the alternative and by adducing expert evidence on quantum early.

Accounting for Profits and Constructive Trust

An accounting for profits requires the defendant to disgorge all gains that flow from the misuse. Because the focus is the defendant's benefit rather than the claimant's loss, it is particularly valuable where profits are significant but claimant-side damages are difficult to quantify. A constructive trust goes further. It treats specific identifiable property acquired through the breach as held for the claimant, giving proprietary priority over the defendant's other creditors. In Lac Minerals, the Court imposed a constructive trust over the mining property itself, not merely damages measured by its value. Proprietary relief of this kind is particularly powerful in insolvency scenarios and where the misappropriated asset has appreciated in the defendant's hands.

Injunctive Relief

Injunctions are the characteristic remedy in confidence cases. At the interlocutory stage, the test from RJR-MacDonald Inc. v. Canada (Attorney General), [1994] 1 S.C.R. 311, requires a serious issue to be tried, irreparable harm if the order is not granted, and a balance of convenience favouring the order. In confidence cases, irreparable harm is often readily established: once misused information is in the market, its confidential character is destroyed and damages cannot restore it. Springboard injunctions go further, restraining use even after the information has become public, for a period calibrated to neutralise the head-start the defendant obtained by premature access. Permanent injunctions at trial can restrain disclosure indefinitely in appropriate cases.

Anton Piller Orders and Preservation Remedies

An Anton Piller order authorises the claimant, supervised by an independent solicitor, to enter the defendant's premises and seize evidence that is at imminent risk of destruction. The threshold is high: an extremely strong prima facie case, serious potential or actual damage, clear evidence that the defendant has incriminating material, and a real possibility that the evidence would be destroyed if the order were sought on notice. Where granted, the order is carried out under strict protocols designed to prevent abuse: the supervising solicitor is independent of the claimant, documents are imaged rather than removed where possible, and the defendant is given immediate access to legal advice. Complementary preservation orders (Mareva-style freezing orders, preservation-of-evidence orders, and rolling injunctions paired with imaging obligations) are often deployed together to secure both the evidence and the assets.

Common questions

Frequently asked.

Quick answers to questions we hear most often. For anything specific to your situation, an intake form is the right next step.

Disclaimer. The answers provided in this FAQ section are general in nature and should not be relied upon as formal legal advice. Each individual case is unique, and a separate analysis is required to address specific context and fact situations. For comprehensive guidance tailored to your situation, we welcome you to contact our team.
01

Do I need a signed NDA to bring a breach of confidence claim?

No. The doctrine is equitable and applies whether or not a written non-disclosure agreement is in place. Courts examine the substance of the disclosure, not just the paperwork. Where information was shared in circumstances that communicated an expectation of confidence (a negotiation, a joint venture, a professional engagement, an executive role, a pitch to a prospective investor), an obligation of confidence will often be imposed regardless of whether an NDA was signed. That said, an NDA is still valuable: it defines the information clearly, sets the scope of permitted use, establishes duration, and can expand the remedy set through contractual provisions. In practice, confidence and contract claims are typically pleaded together where both are available. The absence of an NDA is never fatal to a confidence claim, but the presence of one makes the case substantially easier to prove.

02

Does a customer list actually qualify as confidential information?

It depends on the list. A publicly available directory of prospects in an industry is not confidential: anyone with access to the same public sources could assemble it. A carefully curated internal list developed over years, by contrast, often is. What typically tips a list into confidence territory is the layered intelligence it carries: buying patterns, pricing history, contact hierarchy inside the customer organization, internal decision-makers, preferences, pain points, and relationship notes. Courts also look at how the list was treated internally. Access controls, password protection, confidentiality marking, limited circulation, and a clear internal understanding that it was not to leave the company all reinforce the confidential character. A list that was shared loosely, left unmarked on a shared drive, or carried around on personal devices without restriction is harder to protect after the fact. The question for any business is less whether a claim could theoretically be brought and more whether the evidence of confidential treatment has been built.

03

When a senior employee leaves with knowledge, what's the line between general skill and misuse?

This is the central question in most employee-departure cases. Canadian law recognizes that employees are entitled to carry with them their general skill, knowledge, and experience, including the capability to perform the work they were hired to do and the industry understanding they developed on the job. What they cannot take is specific confidential information: documents (electronic or paper), specific customer data, pricing formulas, unpublished pipelines, trade secrets, or the kind of concrete intelligence that was protected while they were employed. The practical test courts apply examines what was actually taken, what was done with it, and whether the new employer received a demonstrable head-start that would not have been available from public sources or the employee's own general skill. Where files were downloaded to personal storage, where solicitations were surgically targeted using internal data, or where a competing product was built on extracted technical material, the line has usually been crossed. Where the departing employee simply uses their learned expertise to compete fairly with the former employer, it has not.

04

What is a springboard injunction and when is it available?

A springboard injunction is an equitable remedy that restrains a defendant from using the head-start they obtained by misusing confidential information, even after the information itself has entered the public domain. The idea, developed in the English authorities and applied in Canadian courts, is that a person who has vaulted ahead of the market through premature or unauthorized access to confidential material should not benefit from that lead once the information is public. The injunction neutralizes the advantage for a period calibrated to the head-start. It is not indefinite: once the natural development timeline has caught up, the restraint lifts. Springboard relief is most commonly deployed in trade-secret, product-launch, and joint-venture scenarios where the defendant could plausibly have developed the same result independently given time, but in fact did not. The relief is discretionary and depends on the claimant establishing both the misuse and the duration of the advantage the defendant actually obtained.

05

What is an Anton Piller order, and will my case qualify?

An Anton Piller order is a civil search order granted in exceptional cases to preserve evidence that would otherwise be destroyed. It authorizes the claimant, supervised by an independent solicitor, to enter the defendant's premises and seize or image the relevant materials. The threshold is deliberately high. A claimant must establish an extremely strong prima facie case, serious potential or actual damage, clear evidence that the defendant has incriminating material in their possession, and a real possibility (not just a fear) that the evidence would be destroyed if the defendant were given notice. Most cases do not qualify, and that is by design: the remedy is intrusive and courts reserve it for situations where ordinary preservation orders would be inadequate. Where it is granted, the execution is governed by strict protocols that include supervision by an independent solicitor, imaging rather than removal where possible, and immediate access by the defendant to legal advice. The decision to seek one is made only after careful review of the evidence landscape and the risk profile of the opposing party.

06

How are damages measured in a breach of confidence case?

Courts have several measures available and frequently allow claimants to plead them in the alternative. The user principle treats the unauthorized use as though the defendant had paid a reasonable licence fee and measures damages accordingly. Claimants may instead prove lost profits, demonstrating with expert evidence the sales or margin they would have earned but for the misuse. Equitable compensation (where the relationship is also fiduciary) applies a more flexible causation analysis and is not constrained by tort foreseeability. Finally, where the defendant has profited from the breach, an accounting for profits strips the gain regardless of whether the claimant's own loss matches the defendant's enrichment. A constructive trust may be imposed over specific property acquired through the breach, providing proprietary priority in insolvency. The choice among these measures is strategic and depends on the evidence: where profits are evident and loss is difficult to quantify, accounting is often the stronger remedy; where loss is clear and profits diffuse, damages may be more reliable.

07

How long do I have to bring a claim?

In Ontario, the basic limitation period is two years from the date on which the claim was discovered or ought reasonably to have been discovered, under the Limitations Act, 2002. Discoverability is not always obvious in confidence cases, because the misuse is often conducted quietly and becomes apparent only when its consequences show up in the market. Courts apply the discoverability analysis with that reality in mind. There is also an ultimate limitation period of fifteen years from the underlying act, regardless of discoverability. In addition to the statutory bar, the equitable doctrine of laches can defeat a claim where unreasonable delay has prejudiced the defendant, even within the statutory period. The practical guidance is to act promptly once misuse is suspected. Preservation steps, forensic review, and a reasoned assessment of the claim are typically undertaken in parallel, and delay in seeking urgent relief can itself be raised against you in the injunction analysis. If you are unsure whether the clock has started, that itself is a reason to consult counsel sooner rather than later.

08

How does breach of confidence overlap with fiduciary duty in the same case?

They frequently travel together, particularly in cases involving directors, officers, senior employees, partners, or professional advisors. Fiduciary duty is the broader relationship (discretionary power, vulnerability, and an undertaking of loyalty), and confidence is often one of the specific obligations within it. Where both apply, the fiduciary framework carries procedural advantages: the onus shifts to the fiduciary on certain issues, causation is applied flexibly, and disgorgement is available without proof of loss. The confidence claim remains useful even where fiduciary duty is available because it may reach third parties who received the information without standing in a fiduciary relationship to the claimant. In practice, well-drafted pleadings include both causes of action and allow the court to apply whichever framework best fits the proven facts. The two doctrines are not redundant; they cover different segments of the same misconduct.

09

If a third party receives misappropriated information, are they liable?

Potentially yes. Canadian equity recognizes liability for third parties who participate in or benefit from a breach, most commonly framed as knowing assistance or knowing receipt in the fiduciary context and as direct confidence liability where the third party received information knowing (or with enough notice that they ought to have known) of its confidential character and misappropriation. A new employer who hires a senior executive from a competitor and receives materials that are obviously internal to the former employer cannot always claim surprise. A prospective investor who continues to use diligence materials after negotiations break down may also be on notice. Courts apply a constructive-knowledge analysis in addition to actual knowledge. The practical implication for defendants: onboarding protocols for lateral hires, clean-desk procedures, and documented independent-development timelines all matter. For claimants: pleading third parties into the action preserves remedies where the primary wrongdoer is judgment-proof or has transferred the benefit downstream.

10

What should I do immediately if I suspect my confidential information has been misused?

The first forty-eight hours matter. Preserve your own evidence first: back up email, log file access, secure device images where possible, and do not alert the suspected wrongdoer while the forensic picture is still being assembled. Document the timeline of what was shared, to whom, and under what terms or instruments. Identify the specific information that is at risk and the basis on which it qualifies as confidential. Consider whether any NDAs, employment agreements, restrictive covenants, or shareholders' agreements apply. Then move quickly to counsel. Early advice is critical because interim injunctive relief depends on moving before the misuse becomes entrenched, and preservation orders (including Anton Piller where appropriate) are easier to obtain before the defendant has time to clean up. Delay hurts the injunction analysis and gives the defendant time to distance themselves from the evidence. The cases that succeed are almost always the ones where the claimant acted decisively and quickly.

Start your file

Confidence cases move fast. The first forty-eight hours usually shape the result.

For claimants, the window for meaningful preservation and injunctive relief is short. Once misused information enters the market, its confidential character may be destroyed and damages alone will rarely restore the position. For defendants, the threshold questions (whether the information was truly confidential, whether circumstances imported an obligation, whether use was authorized or explained by independent development) determine whether the claim even reaches trial. Grigoras Law acts on both sides, from urgent preservation questions through to full trial and appeals.

Call: 888-407-4333 Email: info@grigoraslaw.com Hours: Mon to Fri · 7am to 7pm ET Response: within 2 business days

Confidential consultation

09000 00000

65 Queen Street west, Suite 1240, toronto, Ontario M5H 2M5

Requeast a Consulastion

our team of experienced lawyers are at your service