Injunctive Relief
Rapid court orders to stop use, disclosure, or further dissemination of confidential information.
Jump to sectionLegal Solutions
Grigoras Law acts for clients across Ontario in breach of confidence matters, including misuse and disclosure of trade secrets, confidential business information, and personal confidences. We advise on NDAs, information governance, and internal investigations. We act for plaintiffs and defendants, move quickly to preserve evidence, and seek targeted relief such as interlocutory injunctions, Anton Piller orders, delivery up and destruction, and accounts of profits. Where appropriate, we pursue damages and negotiated undertakings to protect your competitive advantage.
What We Do
Rapid court orders to stop use, disclosure, or further dissemination of confidential information.
Jump to sectionExceptional search and preservation relief to secure evidence and prevent spoliation.
Jump to sectionDisgorgement of benefits obtained from misuse and proprietary remedies where justified.
Jump to sectionSwift action against departing staff or fiduciaries who take or exploit confidential business information.
Jump to sectionProtection of compiled datasets, pricing models, and technical know-how that create a competitive edge.
Jump to sectionMisuse claims arising from information shared for a limited purpose during deals or joint ventures.
Jump to sectionNo confidentiality, no confidential circumstances, independent creation, public domain, and limitations defences.
Jump to sectionYour Legal Team

Counsel, Civil & Appellate Litigation
Representative Work
Ontario · Employment / trade secrets
Counsel to a technology company seeking injunctive relief and damages after a senior employee departed and allegedly misused proprietary client lists and technical documentation.
Ontario · M&A / confidentiality
Represented a vendor in a dispute arising from alleged unauthorised disclosure of confidential financial information shared during due diligence for a proposed acquisition.
Ontario · Injunctive relief / evidence preservation
Obtained an Anton Piller order to preserve electronic records and prevent destruction of evidence in a dispute involving alleged misuse of proprietary manufacturing processes.
Ontario · Partnership / accounting of profits
Counsel to a former partner seeking an accounting of profits and enforcement of confidentiality obligations following dissolution of a professional services partnership.
Ontario · Software / independent development
Successfully defended a software developer against allegations of confidential information misuse by establishing that the disputed features were independently developed and publicly available.
Insights & Analysis
A breach of confidence arises not from property ownership but from the duty of trust between parties — confirmed by the Supreme Court of Canada in Cadbury Schweppes Inc. v. FBI Foods Ltd., [1999] 1 S.C.R. 142. When a person uses or discloses information provided to them in circumstances giving rise to an obligation of confidentiality, they become liable in equity. Even without a written agreement, courts can find an implied duty of confidence when the circumstances show that secrecy was expected and the information had genuine commercial value.
This cause of action is particularly important in commercial and employment settings, where the unauthorised disclosure of trade secrets, client lists, or proprietary data can cause immediate and lasting harm. Unlike intellectual property rights, which must be registered or established at law, the duty of confidence arises from the nature of the relationship and the character of the information itself.
A breach of confidence is established when confidential information is shared, received, or used without permission. Information commonly protected under this doctrine includes business plans, customer databases, pricing models, manufacturing processes, and technical know-how. The protection is equitable in nature, making it flexible and responsive to the facts of each case.
The Supreme Court of Canada confirmed that breach of confidence is an equitable doctrine rooted in the conscience of the recipient rather than in property rights. The Court also confirmed that Canadian courts may award compensatory damages in addition to — or instead of — purely equitable remedies, giving plaintiffs flexible and effective tools to address commercial harm caused by misuse of confidential information.
The modern Canadian test for breach of confidence originates from Lac Minerals Ltd. v. International Corona Resources Ltd., [1989] 2 S.C.R. 574, in which the Supreme Court held that three elements must be proven:
The information must be secret, valuable, and not generally available to the public. Courts examine the steps taken to maintain secrecy and the competitive advantage the information provides.
The information must have been communicated in circumstances importing an obligation of confidence — whether arising from an express agreement or implied from the nature of the relationship.
There must have been an unauthorised use of the information resulting in detriment to the party who communicated it — economic loss, reputational harm, or an unfair competitive advantage gained by the defendant.
This three-part test has been consistently applied by courts across Canada and remains the foundation of the action today. It is this test that governs how claims are pleaded, how defences are structured, and how courts assess the appropriate remedy.
Information with the Necessary Quality of Confidence — The information must be secret, valuable, and not generally available to the public. Courts examine the steps taken to maintain its confidentiality, the effort invested in its creation, and whether it provides a competitive advantage. Information that is publicly available, freely shared, or of trivial value will not attract protection.
Circumstances Importing an Obligation of Confidence — The duty may arise from an express agreement, such as a non-disclosure clause, or it may be implied from the nature of the relationship. Employers, joint venture partners, and professional advisers often owe such duties even without formal documentation. The key question is whether a reasonable person in the position of the recipient would have understood that the information was conveyed in confidence.
Unauthorised Use to the Detriment of the Plaintiff — The defendant must have used or disclosed the information in a way that was not authorised and that caused harm. Detriment can include economic loss, reputational damage, or an unfair competitive benefit gained by the defendant at the plaintiff's expense.
A breach of confidence often overlaps with other causes of action. Understanding how these claims interact helps determine the most appropriate strategy for litigation or settlement — including which claims should be pursued in the alternative and which remedies are most likely to be available.
| Claim | Foundation | Key Distinction From Breach of Confidence |
|---|---|---|
| Breach of Contract | Agreement between parties | Enforces specific terms; requires a valid contract. Breach of confidence applies even without a contract, where an equitable duty arises from the relationship. |
| Breach of Fiduciary Duty | Relationship of trust and undertaken loyalty | Applies where one party has undertaken to act in another's best interests. Breach of confidence focuses on misuse of information, not the fiduciary relationship itself — the two can be pleaded together or separately. |
| Intellectual Property | Statutory rights (copyright, patent, trademark) | IP rights require registration or creation of a qualifying work. Breach of confidence fills the gap for information deliberately kept secret rather than registered — such as a proprietary formula or process. |
| Privacy Law | Statutory and common law privacy protections | Privacy law protects individual autonomy and personal information. Breach of confidence protects control over commercially valuable information — the focus is economic rather than personal. |
| Unjust Enrichment | Gain at another's expense without justification | Overlaps where the defendant profits from misuse of confidential information. Courts may order disgorgement of profits or impose a constructive trust to prevent the defendant retaining the benefit of the breach. |
A breach of contract claim enforces the specific terms of an agreement, while breach of confidence relies on equitable principles that apply even where no contract exists. This distinction is important because an obligation of confidence may arise simply from the relationship between the parties or the nature of the information itself — no written NDA is required.
In Ontario, written confidentiality clauses are enforceable under contract law principles and can be supplemented by equitable duties of confidence. Where an agreement exists, its terms will generally define the limits of confidentiality, but courts can still apply equitable relief where fairness requires it — particularly where the contract does not exhaustively address how certain information may be used.
A fiduciary duty arises where one party has undertaken to act in the best interests of another. Breach of confidence focuses on misuse of information obtained in confidence — the two are conceptually distinct but often arise from the same facts.
The Supreme Court found that no fiduciary duty existed between the parties — yet the defendant had nonetheless breached its equitable duty of confidence by using information disclosed during joint venture negotiations to acquire a valuable mining property for its own benefit. The court imposed a constructive trust over that property, demonstrating both the independence of the breach of confidence claim and the breadth of the remedies available when equity intervenes.
Breach of confidence protects information that has commercial value because it is secret. It often complements intellectual property law by filling the gaps where copyright, patent, or trademark protection does not apply. A company's proprietary method or formula that is deliberately kept secret — rather than patented — can still be protected through a breach of confidence claim. The action therefore plays a key role in safeguarding business innovation that depends on secrecy rather than registration.
Although breach of confidence may intersect with privacy concerns, its focus is commercial rather than personal. Privacy law protects individual autonomy, while breach of confidence protects control over valuable information where the harm is primarily economic. The doctrine also overlaps with unjust enrichment, particularly where a defendant profits from the misuse of another's information. In those cases, the court may order disgorgement of profits or impose equitable remedies to prevent the defendant from retaining any unjust benefit derived from the breach.
Breach of confidence cases arise in many commercial contexts. Businesses often face these claims when confidential information is misused by employees, contractors, competitors, or potential business partners. Prompt action is essential to preserve confidentiality and prevent further damage — courts respond quickly where a real and ongoing risk of dissemination is established.
Staff who take client lists, pricing models, or strategic data to a competitor on departure. Senior executives may also owe fiduciary duties that extend beyond their departure date.
Information shared during due diligence or joint venture discussions later used unilaterally — the scenario at issue in Lac Minerals. Courts can impose constructive trusts over assets wrongfully acquired.
Databases, customer lists, and trade secrets compiled through skill and expense that give a wrongdoer an unfair commercial head start — even where some underlying data is publicly available.
Financial models, pricing structures, marketing strategies, and supplier data shared in a business context and then used or disclosed without authority to undermine the originating company's position.
Confidential business information forms the backbone of commercial competitiveness. This includes financial models, pricing structures, marketing strategies, and supplier data. Unauthorised use or disclosure can undermine a company's position in the market, often before any legal proceeding can be commenced. Courts frequently grant injunctions to stop further misuse and may award damages or equitable remedies to restore fairness. Where the harm is ongoing and irreparable, urgent relief is available under Courts of Justice Act, R.S.O. 1990, c. C.43, s. 101 and Rule 40 of the Rules of Civil Procedure.
Employees and executives have a duty not to misuse confidential information obtained through their employment. When departing staff take client lists or strategic data to a competitor, the employer may have grounds for immediate injunctive relief — and in some cases, liability may extend to the recipient employer as well.
The Supreme Court held that senior executives are fiduciaries who cannot exploit confidential opportunities gained through their position, even after their employment ends. The duty does not simply cease at the moment of resignation — where the opportunity was identified and developed in the course of employment, the former executive remains accountable for any benefit taken at the corporation's expense.
Client lists and trade secrets are among the most litigated forms of confidential information. Courts consider whether the information required skill, effort, or expense to compile and whether it was protected by internal policies or limited access. Even where some data is publicly available, a compiled database or list that provides a competitive advantage can be protected if it is unique and not easily reconstructed. The key question is whether the information gives an unfair head start to someone who should not possess it.
Parties entering into commercial negotiations often share proprietary information with the expectation of confidentiality. When one party later uses that information for its own benefit, courts can find that a duty of confidence was breached — even in the absence of a formal NDA. The Lac Minerals case illustrates this scenario precisely: information disclosed during joint venture discussions was used by one party to purchase valuable mineral property for itself. The court ordered the property to be held in constructive trust for the disclosing party, providing full restitutionary relief.
Defending against a breach of confidence claim requires showing that one or more elements of the cause of action are not made out. This may include challenging the existence of confidentiality, the alleged obligation of confidence, or the claim of misuse and harm. The most effective defences attack the evidence at the foundation of the claim — before expensive proceedings unfold.
| Defence | What It Establishes | Element Defeated |
|---|---|---|
| Information Already Public | The information was in the public domain, widely known in the industry, or easily discoverable through independent means before or at the time of alleged disclosure | Quality of Confidence (Element 1) |
| No Expectation of Secrecy | The information was shared voluntarily or without limitation — no agreement or understanding of confidentiality existed at the time | Obligation of Confidence (Element 2) |
| Independent Development | The defendant developed the same information independently, without using what was shared by the plaintiff | Unauthorised Use (Element 3) |
| No Detriment / Speculative Loss | The alleged harm cannot be connected to the defendant's use of the information, or is speculative and not supported by evidence | Detriment (Element 3) |
| Consent | The plaintiff expressly or impliedly authorised the use or disclosure complained of | Unauthorised Use (Element 3) |
| Public Interest Disclosure | The disclosure was justified to expose wrongdoing, regulatory breach, or serious misconduct — courts balance confidentiality against the public interest in exposure | Obligation of Confidence (Element 2) |
| Limitation Period | The claim was not brought within the basic two-year limitation period under Ontario's Limitations Act, 2002 | Procedural bar — claim extinguished |
Information that is already in the public domain, widely known within an industry, or easily discoverable through independent means will not attract protection. Courts refuse to extend confidentiality to material that any competitor could reasonably obtain through research or observation. Demonstrating that the information was public, outdated, or of trivial value can defeat a claim at an early stage — sometimes before the costly disclosure and discovery phases of litigation.
Even where information is valuable, a duty of confidence will not arise if it was shared without an expectation of secrecy. Where parties communicated in the course of open negotiations without any agreement or understanding of confidentiality, no equitable obligation may be found. Evidence that information was shared voluntarily or without limitation — such as in public presentations, marketing materials, or open-ended discussions — is often central to this defence.
It is not enough that information was disclosed — the claimant must prove that the defendant used it improperly and caused harm. If the information was never used, or if the alleged harm cannot be connected to its use, the claim will fail. In some cases, defendants can show that they independently developed the same information, or that any loss claimed by the plaintiff is speculative and unsupported by evidence of actual commercial damage.
Other defences include consent, independent creation, reverse engineering, and disclosure in the public interest — where a court may balance the obligation of confidence against the public benefit in the information being known. A claim may also be barred if brought outside the basic two-year limitation period under Ontario's Limitations Act, 2002, S.O. 2002, c. 24, Sch. B. Where a defendant has been subject to an injunction that should not have been granted, they may also seek damages under the plaintiff's undertaking as to damages.
Courts in Ontario have broad discretion to fashion remedies that restore fairness and prevent ongoing misuse of confidential information. The appropriate remedy depends on the nature of the breach, the conduct of the defendant, and the type of loss suffered — and because breach of confidence is an equitable doctrine, courts are not constrained to choose between a limited menu of fixed outcomes.
Compensates the plaintiff for losses caused by the breach — lost profits, loss of goodwill, reputational damage. Where precise calculation is impossible, courts award equitable compensation to ensure fairness.
Strips the defendant of financial benefit obtained through the breach. In exceptional cases, courts impose a constructive trust over specific property or assets acquired through misuse of confidential information.
Prevents further disclosure, requires return or destruction of materials, and preserves the status quo pending resolution. Often the most critical remedy where ongoing harm is threatened.
Anton Piller orders allow entry to the defendant's premises to secure evidence at risk of destruction. Preservation orders protect documents and electronic files until the case is resolved.
Damages are awarded to place the plaintiff in the position they would have been in had the breach not occurred. This may include lost profits, loss of goodwill, or reputational damage caused by the wrongful disclosure or use of confidential information. Where the loss cannot be precisely calculated — as is common in cases involving the misuse of trade secrets or client relationships — the court may award equitable compensation. This ensures fairness even where the harm is difficult to quantify with mathematical precision.
If the defendant has gained a financial benefit from the misuse of confidential information, the court may order an accounting for profits, stripping the defendant of the wrongful gain rather than merely compensating the plaintiff. In exceptional cases, it may impose a constructive trust over property or assets acquired through the breach — preventing the defendant from benefiting from their wrongdoing.
The Supreme Court imposed a constructive trust over an entire mining property acquired through the misuse of confidential data — transferring legal title from the defendant to the plaintiff as the appropriate equitable remedy. This remedy is particularly powerful because it does not merely award a money judgment, which the defendant may be unable or unwilling to satisfy. Instead, it gives the plaintiff a proprietary interest in the specific asset obtained through the breach.
Injunctions are one of the most effective remedies in breach of confidence cases. They can prevent further disclosure, require the return or destruction of materials, and preserve the status quo until the dispute is resolved. To obtain an interlocutory injunction, a party must meet the three-part test from RJR-MacDonald Inc. v. Canada (Attorney General), [1994] 1 S.C.R. 311:
The claim must raise a genuine legal question — more than merely frivolous or vexatious. The merits are not fully assessed at the injunction stage.
The applicant will suffer harm that cannot be adequately compensated by a damages award if the injunction is not granted — loss of unique business relationships, ongoing disclosure of secrets, or damage impossible to quantify.
The harm to the applicant from refusing the order outweighs the harm to the respondent from granting it. Courts also consider the public interest where broader implications are engaged.
For procedural guidance on injunctions in Ontario, see Rule 40 of the Rules of Civil Procedure, R.R.O. 1990, Reg. 194.
In rare circumstances where there is a real risk that evidence will be destroyed, the court may issue an Anton Piller order allowing the plaintiff to enter the defendant's premises without prior notice to search for and secure materials. This extraordinary order is used sparingly and requires proof of a strong case, possession of crucial materials, and a genuine risk of destruction. Legal supervision is mandatory, and the defendant retains the right to seek variation or discharge after execution.
Courts may also issue preservation orders under Rule 45 of the Rules of Civil Procedure to protect documents, electronic files, or other materials containing confidential information until the case is resolved. These orders are particularly important where digital records — which can be easily deleted or overwritten — are at risk, and should be sought early once litigation is anticipated or threatened.
Common Questions
Confidential information refers to data or details that are not publicly available and have been shared with an expectation of privacy. This can include trade secrets, business plans, client lists, technical specifications, financial records, and personal data. For information to be considered confidential, it must be treated as such by the parties involved and should not be easily accessible to others. Confidentiality is often established through agreements, but it can also be implied based on the nature of the relationship, such as between a doctor and patient or solicitor and client. The key factor is whether the information holds value due to its secrecy and whether its disclosure could harm the party that provided it.
The law requires that confidential information must have the necessary quality of confidence about it. This means that it is not trivial or public knowledge and is kept secret. Additionally, the information must have been shared in circumstances that imply an obligation of confidentiality. This can occur in professional settings, business transactions, or personal relationships. It is essential to clearly define and communicate what constitutes confidential information to all parties involved to ensure that it is adequately protected.
The legal consequences of breaching confidentiality can be significant and multifaceted. A party found to have breached confidentiality may face various legal remedies, including injunctions, damages, and account of profits. An injunction may be issued to prevent further disclosure or use of the confidential information, thereby protecting the injured party's interests. Damages can be awarded to compensate the injured party for any financial losses or harm caused by the breach, including loss of business opportunities or damage to reputation. Additionally, the court may order an account of profits, requiring the breaching party to surrender any gains made from the misuse of the confidential information.
In some cases, reputational damage and loss of trust can have long-lasting effects, impacting professional relationships and business opportunities. Legal proceedings can be complex and costly, making it crucial to seek experienced legal counsel to navigate these issues effectively. Furthermore, breaching confidentiality can lead to a breakdown in business relationships and could result in additional legal claims such as breach of contract or fiduciary duty. It is essential to understand the full scope of potential consequences to mitigate risks and respond appropriately.
Protecting your confidential information involves several proactive steps. Firstly, implement robust confidentiality agreements with employees, business partners, and contractors to clearly outline expectations and obligations. These agreements should specify what information is considered confidential, the duration of confidentiality, and the consequences of breaches. Secondly, limit access to sensitive information to only those who need it and use secure methods for storing and sharing data, such as encryption and password protection.
Regularly train employees on the importance of confidentiality and the potential consequences of breaches. Establishing a culture of confidentiality within your organisation can help prevent accidental disclosures and reinforce the seriousness of maintaining secrecy. Additionally, monitor and audit the use of confidential information to detect any unauthorised access or misuse early. If you suspect a breach, act swiftly to investigate and mitigate the impact. Legal measures, such as seeking an injunction, can also be taken to prevent further disclosure and protect your interests.
If you are accused of breaching confidentiality, it is essential to take the accusation seriously and seek legal advice immediately. An experienced solicitor can help you understand the allegations and evaluate your options. Begin by gathering all relevant documents and evidence related to the confidential information and the circumstances of its disclosure. This may include emails, agreements, and any communications with the party alleging the breach.
Your solicitor can help you build a defence, which may involve proving that the information was not confidential, that it was disclosed with permission, or that the disclosure was necessary and lawful. It is also crucial to refrain from further disclosing the information and to follow your solicitor's advice closely to protect your legal position. Additionally, you may need to engage in settlement discussions or mediation to resolve the issue without escalating it to court. Addressing the accusation promptly and professionally can help mitigate potential damage to your reputation and business relationships.
Yes, third parties can be held liable for using confidential information if they knew or ought to have known that the information was confidential and obtained through improper means. The law imposes obligations on third parties to respect the confidentiality of information they receive. If a third party benefits from the misuse or disclosure of confidential information, they can be subject to legal action, including injunctions, damages, and account of profits.
Third-party liability often depends on the circumstances under which the information was acquired. For instance, if a third party knowingly received confidential information from someone who was breaching their duty of confidence, they could be held accountable. The courts may also consider whether the third party acted in good faith or whether they took steps to verify the confidentiality status of the information. Seeking legal advice is crucial to understand the specific circumstances and potential liabilities involved in such cases. It is important to take appropriate measures to ensure that you are not inadvertently using or disclosing confidential information improperly obtained.
Breach of Confidence
If your confidential information has been misused or is at risk, Grigoras Law can help. We act quickly to stop disclosure, recover advantages taken, and protect your position in court with practical, business-focused strategies.

our team of experienced lawyers are at your service