Understanding breach of confidence.
An equitable doctrine that protects information shared in trust. The claim sits in the space between contract, fiduciary duty, and intellectual property, and reaches conduct those other doctrines cannot always catch.
The law protects information not because it is property, but because the relationship in which it was shared demands that it not be turned against the person who disclosed it.The equitable foundation of confidence
Breach of confidence is the equitable cause of action that protects the substance of trust in commercial and personal relationships. Unlike a contract claim, which enforces the specific terms of a bargain, or a fiduciary duty claim, which addresses disloyalty in a relationship of discretionary power, breach of confidence reaches any situation in which information has been communicated on the understanding (express, implied, or imposed by the circumstances) that it will not be used against the interests of the person who shared it. In Canadian law, the doctrine is sourced in equity and applied regardless of whether a written non-disclosure agreement exists.
The practical significance of the doctrine lies in its breadth. It can be invoked against a former employee who takes customer data, a joint venture partner who exploits technical know-how learned in diligence, a prospective buyer who uses pricing data to build a competing product, or an advisor who exploits information gained in a professional engagement. The claim does not require ownership of intellectual property. It does not require a signed NDA. It requires only that the three elements of the cause of action can be proven.
What is Breach of Confidence?
Breach of confidence occurs when a person who has received information in circumstances importing an obligation of confidence uses or discloses that information in a way that is inconsistent with the obligation and to the detriment of the person who imparted it. The test is functional: courts ask whether the substance of the information was confidential, whether the circumstances of disclosure communicated an expectation of confidence, and whether the information was in fact misused. Intent to harm is not required. An honest but mistaken belief that the information was free to use is generally not a defence where the three elements are satisfied.
Origins and Legal Foundations
The modern doctrine descends from nineteenth-century English equity cases, most famously Prince Albert v. Strange (1849) and Morison v. Moat (1851). The contemporary Canadian test is most commonly traced to the English decision in Coco v. A.N. Clark (Engineers) Ltd., [1969] R.P.C. 41, where Megarry J. articulated the three-part framework that Canadian courts adopted.
The Supreme Court of Canada formally adopted the Coco three-part test: the information must have the necessary quality of confidence about it; it must have been imparted in circumstances importing an obligation of confidence; and there must have been an unauthorized use of that information to the detriment of the party communicating it. The Court held that confidential geological data shared during acquisition negotiations had been misused when the recipient used it to acquire the property for itself. A constructive trust was imposed over the mining property, reinforcing the principle that equitable remedies can transfer proprietary rights where the conduct demands it.
Key Elements of the Claim
| Element | What must be proven | What it is not |
|---|---|---|
| Necessary quality of confidence | The information is not public, not trivial, and has some commercial or personal value because it is not generally known. | Information in the public domain, trivial gossip, or the general skill and knowledge an employee carries in their head. |
| Imparted in confidence | The circumstances (relationship, instrument, context) communicated to the recipient that the information was not for free use. | Information volunteered at a trade conference, published in marketing materials, or shared without any expectation of restriction. |
| Unauthorized use to detriment | The recipient used or disclosed the information inconsistently with the obligation, causing harm or unjust gain. | Use that was consented to, use of information genuinely developed independently, or use after the information became public through legitimate means. |
Each element does independent work. A claim can fail at the first stage because the information is too general or already public, at the second because the circumstances did not communicate an obligation of confidence, or at the third because no detrimental use occurred or because the defendant's conduct is explained by independent development. A well-pleaded case addresses each element with specific evidence rather than conclusory assertions.
Relationship to other claims.
Breach of confidence frequently overlaps with contract, fiduciary duty, and intellectual property. The distinctions are not academic: they determine what must be proven, who bears the onus, and which remedies are available.
Choosing the right cause of action (or combination of them) is a strategic decision. Confidence claims have broader reach than contract but narrower reach than fiduciary duty. They operate alongside intellectual property regimes but fill gaps the IP statutes do not cover. And they differ from privacy and unjust enrichment in ways that affect pleading, discovery, and trial.
Breach of Confidence vs Breach of Contract
A well-drafted non-disclosure agreement offers the advantage of precision: it defines the information, specifies permitted uses, sets a duration, and addresses remedies. But contract alone has limits. It binds only the signatories; it may be narrowly drafted in ways that exclude the actual misuse; and its remedies are typically calibrated to expectation damages rather than the disgorgement of profits that confidence can reach. Breach of confidence, by contrast, applies regardless of whether an NDA exists, reaches downstream recipients in some cases, and opens the door to equitable remedies that a pure contract claim cannot. Where both are available, they are typically pleaded together.
Breach of Confidence vs Breach of Fiduciary Duty
Fiduciary duty requires a relationship of trust characterized by discretionary power and vulnerability. Breach of confidence does not. A prospective joint venture partner who receives confidential information in diligence may owe a confidence obligation without owing a fiduciary duty. Where a fiduciary relationship does exist (director to corporation, lawyer to client, partner to partner), the two claims often travel together: the onus shifts on the fiduciary side, causation is applied more flexibly, and disgorgement is available without proof of loss. Pleading both preserves the full range of remedies and forces the defendant to meet both standards of scrutiny.
Breach of Confidence and Intellectual Property
Patents, copyrights, and trademarks protect specific categories of intellectual output, but they do not protect everything commercially valuable. Ideas and methodologies not yet reduced to a patentable invention, pricing spreadsheets, customer lists, and pre-publication manuscripts all sit outside formal IP protection while being exactly the kind of information confidence was designed to protect. In trade-secret cases especially, breach of confidence is often the primary cause of action, with IP infringement pleaded in the alternative where fixed expressions or registered rights are also implicated. Confidence protects the substance; IP protects the form.
Distinction from Privacy and Unjust Enrichment
Privacy torts (intrusion upon seclusion, public disclosure of private facts) protect the individual's personal sphere and generally require the information to concern the plaintiff's private life rather than commercial affairs. Unjust enrichment addresses benefits received without juristic reason and is typically pleaded where a confidence or fiduciary claim is not squarely available. Each can be pleaded alongside breach of confidence in appropriate cases, but each has its own elements and remedy set. Confidence remains the primary doctrine where commercial information has been shared in trust and later turned against the claimant.
Common scenarios.
The doctrine shows up in a predictable set of fact patterns: departing employees, misused trade secrets and client lists, and confidential information shared during pre-contractual negotiations or joint ventures. Each has its own evidentiary rhythm.
Misuse of Confidential Business Information
Pricing models, supplier contracts, financial projections, strategic plans, customer data, and internal performance analytics are the commercial core of most modern businesses. When that information leaks to a competitor, whether through a departing executive, a disgruntled insider, or a prospective buyer who walked away from a transaction, the damage is often immediate: margins compress, bids are undercut, customers are approached with tailored proposals. Breach of confidence provides the framework for both stopping the use and recovering the benefit. Courts take the commercial sensitivity of such information seriously, and the first question is usually whether urgent injunctive relief is appropriate to preserve the position while the full claim is litigated.
Employee and Executive Misconduct
Employees owe an implied duty of fidelity during employment that extends to the protection of confidential information. Senior employees and executives carry obligations that may survive the employment relationship, particularly where the information qualifies as a trade secret or where written covenants are in place. The line between legitimate use of general skill and knowledge (which the law permits an employee to take to a new job) and misuse of confidential information (which it does not) is where most cases turn. Courts examine what was actually taken, how it was used, whether it conferred an unearned head-start, and whether the new employer knew or ought to have known of its provenance. Springboard doctrine plays an important role in shaping the appropriate remedy.
Misuse of Client Lists or Trade Secrets
Customer lists and trade secrets are among the most frequently litigated subjects in confidence cases. A customer list is not automatically confidential: a publicly compiled roster of general prospects usually is not, but a curated list developed over years that captures buying patterns, pricing history, contact hierarchy, and internal decision-makers often is. Trade secrets (formulas, processes, technical know-how) are confidential by their nature if the holder has taken reasonable steps to protect them. The reasonableness of those steps matters: access controls, confidentiality marking, password protection, and limited circulation all go to whether the information has the necessary quality of confidence.
Breach During Commercial Negotiations or Joint Ventures
Diligence in M&A, investor pitches, joint venture discussions, and licensing negotiations routinely involve exchanges of sensitive commercial information. When a deal falls through and one side uses what it learned to compete directly or to structure an alternative transaction that displaces the original counterparty, breach of confidence is often the primary remedy. Lac Minerals itself is this scenario. The existence (or absence) of a pre-diligence NDA is relevant but not determinative: equity will find an obligation of confidence where the circumstances communicated one, even in the absence of a signed agreement. Springboard-style injunctions and constructive trusts are frequently deployed in this category.
Defending a confidence claim.
The same three elements that define the claim define the defence. Information not truly confidential, circumstances that did not import an obligation, absence of misuse or detriment, and a short list of established equitable defences.
| Defence | Basis | Effect if established |
|---|---|---|
| Not truly confidential | Information is in the public domain, is trivial, or is the generality of skill and experience the defendant carries in their head. | Claim fails at the first element; no further analysis of circumstances or misuse is required. |
| No confidential circumstances | Information was shared openly, at a public event, or without any basis from which an obligation of confidence could be inferred. | Claim fails at the second element; the recipient was free to use it. |
| No misuse or detriment | The defendant did not use the information, or used it only with consent, or the claimant cannot show detriment or unjust gain flowing from the use. | Claim fails at the third element; declaratory relief may still be available in limited cases. |
| Independent development | The defendant developed the same information or product independently, without use of the claimant's disclosure. | Use is explained by the independent source; the claimant's information is not the cause of the alleged harm. |
| Consent & authorisation | Express or implied consent to use, or authorisation under an NDA or other instrument. | Use falls within the permitted scope; liability does not attach. |
| Laches & limitation | Unreasonable delay causing prejudice to the defendant, or the expiry of the two-year period under the Limitations Act, 2002. | Equitable relief barred or reduced; monetary claims statutorily barred subject to discoverability. |
When Information is Not Truly Confidential
The first and most frequently successful defence is that the information lacks the necessary quality of confidence. Information disclosed in a public filing, product announcement, industry publication, or trade conference is no longer confidential, even if the particular recipient learned it in private. Similarly, skill, experience, industry insight, and general know-how that an employee acquires in the course of their work is theirs to carry to a new employer. The defence often succeeds where the claimant has overclaimed, asserting confidence over information that is generic, already in the market, or so bound up with the defendant's own capabilities that it cannot meaningfully be separated.
Lack of Confidential Circumstances
Even genuinely non-public information may be shared in circumstances that do not communicate an obligation of confidence. An unsolicited disclosure, a conversation at a networking event, or information volunteered without any marking or preamble may fail the second element. The defence is fact-intensive: it turns on the relationship between the parties, the context of the disclosure, the presence or absence of confidentiality language, and whether a reasonable person in the recipient's position would have understood that restrictions applied. Claimants defeat this defence by pointing to explicit confidentiality language, course of dealing, industry norms, or the commercial sensitivity of the subject matter itself.
Absence of Misuse or Detriment
The third element is the narrowest defence path because Canadian courts have repeatedly held that detriment is interpreted broadly, extending to wounded feelings and loss of opportunity as well as hard financial loss. Still, a defendant who can show that the information was not in fact used (for example, that a product was independently designed before the disclosure was received), or that any use caused no harm and no unjust gain, may defeat the claim. Independent development is the most common pathway here, and it is one reason defendants in this area routinely maintain clean development records, segregated teams, and documented innovation timelines.
Other Available Defences
Beyond the three elements, equity recognises a familiar cluster of defences. Consent, whether express (in an NDA or governance instrument) or implied (from course of dealing), defeats the claim for the scope of the authorisation. Laches bars equitable relief where the claimant's unreasonable delay has prejudiced the defendant. The Ontario Limitations Act, 2002, imposes a two-year basic limitation period from discoverability, with a fifteen-year ultimate limitation period. Public interest disclosure, while more developed in the English authorities than in Canadian law, may justify disclosure of iniquity or serious wrongdoing. Each of these defences is narrowly construed and will not succeed on a bare assertion: the defendant must plead specifics and adduce evidence.
Remedies and court relief.
The remedy set is equitable first. Injunctions to stop the misuse, accounting and constructive trust to strip the gain, delivery-up and Anton Piller orders to preserve the evidence, and damages or equitable compensation to repair the loss.
| Remedy | What it does | When it is deployed |
|---|---|---|
| Damages / equitable compensation | Monetary award to repair loss or restore the claimant's position. | Where the misuse has caused quantifiable financial harm or diminished value. |
| Accounting for profits | Disgorgement of all gains obtained through the breach, regardless of claimant's loss. | Where profits are the more reliable measure of the wrong, or where loss is hard to quantify but gain is evident. |
| Constructive trust | Proprietary remedy treating specific assets acquired through breach as held for the claimant. | Where identifiable assets can be traced to the breach, including in insolvency where priority matters. |
| Injunctive relief | Interim, interlocutory, or permanent orders restraining use or disclosure of the information. | Where misuse is ongoing or imminent and damages would not be an adequate remedy. |
| Delivery-up & destruction | Orders requiring return or destruction of materials containing the confidential information. | Paired with injunctions to remove the physical ability to continue the misuse. |
| Anton Piller order | Civil search order authorising entry onto premises to preserve evidence at imminent risk of destruction. | Exceptional cases where the claimant meets the strict Anton Piller threshold; supervised by an independent solicitor. |
Damages and Equitable Compensation
Damages in confidence cases are assessed with equitable flexibility. The measure can approximate what a reasonable licence fee would have been (the so-called user principle), the lost profits the claimant would otherwise have earned, or the broader economic harm of having a competitor launch a product on the back of the misused information. Where the relationship is also fiduciary, equitable compensation applies: foreseeability does not constrain recovery, and causation is applied flexibly to restore the claimant to the position they would have occupied absent the breach. Claimants preserve the full range by pleading both measures in the alternative and by adducing expert evidence on quantum early.
Accounting for Profits and Constructive Trust
An accounting for profits requires the defendant to disgorge all gains that flow from the misuse. Because the focus is the defendant's benefit rather than the claimant's loss, it is particularly valuable where profits are significant but claimant-side damages are difficult to quantify. A constructive trust goes further. It treats specific identifiable property acquired through the breach as held for the claimant, giving proprietary priority over the defendant's other creditors. In Lac Minerals, the Court imposed a constructive trust over the mining property itself, not merely damages measured by its value. Proprietary relief of this kind is particularly powerful in insolvency scenarios and where the misappropriated asset has appreciated in the defendant's hands.
Injunctive Relief
Injunctions are the characteristic remedy in confidence cases. At the interlocutory stage, the test from RJR-MacDonald Inc. v. Canada (Attorney General), [1994] 1 S.C.R. 311, requires a serious issue to be tried, irreparable harm if the order is not granted, and a balance of convenience favouring the order. In confidence cases, irreparable harm is often readily established: once misused information is in the market, its confidential character is destroyed and damages cannot restore it. Springboard injunctions go further, restraining use even after the information has become public, for a period calibrated to neutralise the head-start the defendant obtained by premature access. Permanent injunctions at trial can restrain disclosure indefinitely in appropriate cases.
Anton Piller Orders and Preservation Remedies
An Anton Piller order authorises the claimant, supervised by an independent solicitor, to enter the defendant's premises and seize evidence that is at imminent risk of destruction. The threshold is high: an extremely strong prima facie case, serious potential or actual damage, clear evidence that the defendant has incriminating material, and a real possibility that the evidence would be destroyed if the order were sought on notice. Where granted, the order is carried out under strict protocols designed to prevent abuse: the supervising solicitor is independent of the claimant, documents are imaged rather than removed where possible, and the defendant is given immediate access to legal advice. Complementary preservation orders (Mareva-style freezing orders, preservation-of-evidence orders, and rolling injunctions paired with imaging obligations) are often deployed together to secure both the evidence and the assets.


