Canada: Protection Of Trade Secrets And Confidential Information

Last Updated: June 4 2008
Article by Edward T. Fan


With the rise of the information age and growth of the knowledge economy, managing and protecting information, as well as enforcing against its misuse, have become increasingly critical to business enterprises. Aside from protecting the intellectual capital of a business through the patent, copyright and trade mark registration systems, the law further protects against misuse of confidential information, including trade secrets, to a business that takes the appropriate steps to protect such information.

A business may choose to keep certain business information confidential and to maintain trade secrets rather than seeking statutory protection through patent or copyright laws. Patents and copyright are statutorily protected for a limited time only, and only in the jurisdictions in which protection is applied for and registered. On the other hand, trade secrets and confidential information, if properly protected and managed, can be preserved indefinitely and are not restricted to specific jurisdictions. Furthermore, in many situations, the subject matter of a trade secret might not be suitable or even eligible for patent or copyright protection under the relevant statutes, thus leaving trade secret protection as the only option.

The law relating to confidential information and trade secrets has developed partly to promote certain desirable commercial behaviour. While aiming to enforce good faith behaviour between commercial parties and provide remedies for misuse of confidential information, the law has also evolved to discourage undue restraints on trade, especially in the area of non-competition by former employees.

This paper examines the fundamental concepts in the law regarding confidential information and trade secrets in the context of commercial dealings. Issues relating to confidentiality of personal information, such as under the Freedom of Information and Protection of Privacy Act1 and the Personal Information Protection and Electronic Documents Act (Canada),2 are not examined in this paper, but it should be noted that these and other statutes can create obligations that should be considered in the formation of an information-management strategy for a Canadian business.

The Nature of Confidential Information and Trade Secrets

The terms "trade secrets" and "confidential information" have been used somewhat interchangeably by the courts. "Trade secrets" generally refers to information relating to more technical matters such as secret processes or formulas; and "confidential information" relates to non-technical matters such as business plans or pricing information.3 Although this paper uses the term "confidential information" to encompass trade secrets, note that the courts have not always treated these terms consistently.4

Trade Secrets

The courts have not set out a comprehensive definition for a trade secret. What is clear is that the element of secrecy must be present for a trade secret to exist. That is, once a trade secret enters the public domain, such as through publication in a trade journal or marketing of a readily reverse-engineered product embodying the trade secret, it is no longer a trade secret.5 Other characteristics of a trade secret were enunciated by the Court in R.I. Crain Ltd. v. Ashton.6 While noting that he had been unable to find a definition for a trade secret under Canadian jurisprudence, Justice Chevrier accepted definitions from U.S. jurisprudence and concluded that trade secrets include the following:

  1. a property right that, as soon as discovered, gives the discoverer the full right to use;

  2. a plan, process, tool, mechanism or compound known only to its owner and the employees to whom it is necessary to confide it;

  3. a secret formula or process not patented, but known only to certain individuals who use it in compounding some article of trade having commercial value; and not merely denoting the privacy with which business is carried on;

  4. any secret formula, pattern, process, device or compilation of information used continuously in the operation of the business and that gives the owner an opportunity to obtain an advantage over competitors who do not know or use it.7

Draft legislation has also attempted to set out the characteristics of trade secrets. In 1986, the Alberta Institute of Law Research & Reform recommended enactment of legislation to protect trade secrets and define the term "trade secret." Although this draft legislation never came into force, the proposed definition is nonetheless generally consistent with court decisions and can thus provide guidance in analyzing whether certain information is a trade secret:

Trade secret means information including but not limited to a formula, pattern, compilation, program, method, technique, or process, or information contained or embodied in a product devise or mechanism which:

  1. is, or may be used in a trade or business,

  2. is not generally known in the trade or business,

  3. has economic value from not being generally known, and

  4. is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.8

It has been suggested that in the context of the information technology industry, most technology that is created through the expenditure of time and resources, and that is coupled with the necessary quality of confidence and inaccessibility to competitors, can be protected as a trade secret.9

Confidential Information

As is the case with trade secrets, for any information to qualify as confidential, the element of secrecy must exist. Confidential information can therefore not be public property or in the public knowledge.

A list of factors to consider in determining whether or not information is confidential is set out in Pharand Ski Corp. v. Alberta:10

  1. the extent to which the information is known outside the owner's business;

  2. the extent to which it is known by employees and others involved in the owner's business;

  3. the extent of measures taken by him to guard the secrecy of the information;

  4. the value of the information to him and his competitors;

  5. the amount of money or effort expended by him in developing the information;

  6. the ease or difficulty with which the information could be properly acquired or duplicated by others (i.e., by their independent endeavours).

In listing these factors, the Court cautioned that this list is not exhaustive and that none of these factors, alone or in combination, should be taken as determinative.11

Trade Secrets as Distinguished from Trade Knowledge

In the employment context, the courts have found that certain information gained by a person during employment may fall within the area of trade knowledge, which is different from trade secrets or confidential information and not protectable as such.12 An employee is free to take trade knowledge from job to job and any restrictive covenant purporting to stop a departing employee from using this trade knowledge is prima facie an illegal restraint on trade and, therefore, unenforceable.13

Trade knowledge is typically distinguished from trade secrets and other confidential information as being the skills, general knowledge and any personal goodwill that an employee obtained in the course of employment.14 In making this determination, the following factors can be considered:

  1. the nature of the employment;

  2. the nature of the information;

  3. whether the employer impressed on the employee the confidentiality of the information;

  4. whether the information can be easily isolated from other information that the employee is free to use or disclose.15

Property in Confidential Information

Characterizing confidential information as property is controversial.16 For purposes of the theft provisions in the Criminal Code,17 confidential information is not property.18 The Court in Cadbury Schweppes emphasized that actions for breach of confidence are rooted in the relationship of confidence rather than in the characteristics of the information involved.

It can be useful to think of confidential information and trade secrets as being capable of being controlled rather than owned. Use or dissemination of such information can be controlled through contractual means or through other obligations implied by law without necessarily asserting property rights. In the employment context, there is also an implied condition of employment that an employee who learns of an invention or discovery, including a trade secret, becomes a trustee of that discovery for his or her employer even beyond the term of employment.19

Causes of Action Relating to Misuse of Confidential Information

The Duty of Confidence

A duty of confidence arises when a person acquires knowledge of confidential information, including trade secrets, under circumstances in which the person has notice or agreed that the information is confidential.20 A duty of confidence can exist beyond the traditional categories of contractual obligation, fiduciary duty or relationship between the parties and is based on elements of trust and reasonable expectations.21 The courts have considered an action for breach of confidence to be sui generis, with roots in contract, equity and property law.22

The test to determine whether a duty of confidence arises is an objective one: whether a reasonable person standing in the shoes of the recipient of the information would have realized that the information was given in confidence.23

Industry customs may play a role in the court's determination of whether a duty of confidence arises.24 The courts have found that evidence with regard to industry customs is relevant in determining the reasonable expectation of confidentiality, even in the absence of an express confidentiality agreement between the parties.25 In one case, it was also suggested that a conversation "in the field" between two engineers can be regarded as a circumstances of confidence.26

Although a relationship need not exist between the parties for a duty of confidence to arise, the courts have recognized several relationships that give rise to confidentiality obligations for example, a relationship in which confidential information is disclosed for a limited purpose, such as to a manufacturer for the purpose of manufacturing a product;27 similarly, in a relationship between licensors and licensees, the courts have found that a licensee cannot disclose confidential information that was provided to it for the purposes of a licensing arrangement;28 in a relationship between partners in a partnership or a joint venture, information disclosed between the partners has been considered to be disclosed in a confidential relationship;29 and in a relationship between employers and employees, it has been held that an employee owes his or her employer a duty of fidelity and good faith upon termination, which encompasses the duty not to retain and use documented client lists and other confidential information received in the course of employment;30 and finally, when two parties enter into a contract, even if the contact is silent on the matter of confidence, it has been held that the law will imply an obligation to treat as confidential any confidential information passed between the parties for the purposes of the contract.31

A duty of confidence has also been held to arise in the context of commercial negotiations32 even if the negotiations ultimately fail to result in a contract or commercial arrangement,33 and perhaps especially so if the negotiations were a ruse to gather confidential information.34 In Lac Minerals, a leading case on the obligations that can arise even if a proposed commercial arrangement does not ultimately come to fruition, confidential information regarding a potential property for purchase was disclosed during negotiations for a joint venture.35 The Court found that the recipient of this information had obligations of confidentiality even after negotiations fell through, and that the recipient was in breach of those obligations when it used the information to acquire the property for itself, to the discloser's detriment.

Establishing a Claim of Breach of Confidentiality

Protection of confidential information has roots in the broad equitable principle of good faith: "[He] who received information in confidence shall not take unfair advantage of it."36 A duty of confidence does not give rise to a positive obligation, but rather the confidant has a negative obligation: not to misuse the information. In Lac Minerals, the Court stated that if a claim for breach of confidentiality has occurred, the burden of proof is on the plaintiff to show three elements:

  1. that the information conveyed was confidential;

  2. that it was communicated in confidence;

  3. that it was misused by the confidant.37

The Court held, however, that if information is disclosed in confidence, the recipient is entitled to use it only for the purposes explicitly authorized, and the burden of proof rests with the recipient to show that the use of the information was authorized.38

An action for breach of confidence is not limited to that solely against a direct recipient of the information. A third-party recipient may also be liable for unauthorized use of confidential information if he or she had actual, imputed or constructive knowledge that the information was confidential.39

Defeating a Claim of Confidentiality Breach

There are a number of circumstances that the courts have accepted as militating against a finding of a breach of confidentiality:40

  1. if the parties to the disclosure have expressly agreed that the information will be considered nonconfidential; 41

  2. if the recipient had a right to receive the information and use it any way he or she chose;42

  3. if the recipient has not had an opportunity to reject the attempted disclosure.43

  4. if the recipient did not know that the information received was obtained or communicated in breach of trust or confidence.44

  5. if the recipient of the confidential information neither knew nor ought to have known of the alleged limited purpose of the disclosure.45

  6. if the information that is the subject of a duty of confidence ceases to be confidential.46

  7. if the information disclosed in circumstances of confidence must be made available to the public by law.47

The "Springboard" Principle

One specific type of misuse of confidential information that the courts have prohibited is based on the "springboard" principle. The springboard principle provides that a person who obtained information in confidence is not permitted to use it as a springboard, or an unfair head start, for activities detrimental to the confider, even after the information becomes available to the public.48 This principle was developed partly to provide redress where even though the misappropriated information may be "nothing very special," the misuse of the information nonetheless permits a recipient of that information to enter the market faster than would otherwise be possible.49 The English authorities have expressed the reasoning for extending the restriction beyond the time that the information becomes public to account for any unfair head start given to the possessor of the information in comparison to a member of the public.50 This restriction is to promote equality between a person who possesses the relevant information prior to public disclosure and someone who receives the information through public disclosure and who would generally still have to prepare plans and specifications, construct prototypes and conduct tests in order to enter the market.51

In Cadbury Schweppes, the leading Canadian case dealing with springboard principle, a licensor revealed to the licensee, under licence, confidential information about a recipe for a tomato cocktail with clam broth. After receiving notice to terminate the licence, the licensee used the confidential information to develop a competing product. Even though it was held that the information was "nothing very special" and a competing drink could have been developed without the use of the confidential information, it was nonetheless found that using the confidential information gave the licensee a head start that would not have otherwise been available but for its misuse of the confidential information. Damages were assessed for the period of time the licensee would reasonably be expected to develop a competing product without using the confidential information, a period that amounted to the springboard period enjoyed by the licensee.52

The Fiduciary Duty

A person who owes a fiduciary duty has a positive obligation to act altruistically for the sole benefit of the beneficiary. A fiduciary relationship co-exists with an obligation of confidence with respect to confidential information53 and so a fiduciary duty includes a duty of confidence.

Whereas a duty of confidence may arise when a third party acquires the confidential information, a fiduciary duty can arise only between the fiduciary and the beneficiary.54 The law recognizes certain relationships as fiduciary in nature, including director-corporation, trustee-beneficiary, solicitor-client, partners and principal-agent.55

Directors, officers and other senior management are fiduciaries to their employers. Fiduciary obligations include a duty of loyalty and good faith, and an avoidance of a conflict of duty and selfinterest. 56 In Canadian Aero Services Ltd. v. O'Malley,57 the Court held that a finding of fiduciary obligations on the directors and senior officials of a company was simply a recognition of the degree of control they have over the operations of the company. It has been noted that generally an employee whose actions require another person's approval will not likely be seen as a fiduciary.58

Besides being found in the traditionally recognized relationships, a fiduciary duty may be found to exist if the following characteristics are found in a relationship:

  1. The fiduciary has scope for exercise of some power or discretion.

  2. The fiduciary can unilaterally exercise that power or discretion to affect the legal or practical interests of the beneficiary.

  3. The beneficiary is peculiarly vulnerable to the fiduciary.59

The courts are generally reluctant to find fiduciary obligations between arm's-length commercial parties.60 While the courts accept that disclosure of any confidential information will generally place the confider in some position of vulnerability,61 in the commercial context this vulnerability is seen as flowing from the terms of a commercial relationship freely entered into by the parties and is not the kind of vulnerability that will serve to elevate the relationship to one that is fiduciary in nature.62 In this type of relationship, the courts will generally leave the parties to contract for the position that they desire, and supplement that contract with a duty to not misuse confidential information.63 Despite this, a court has stepped in to find a fiduciary relationship when the vulnerability arises from the inability of a party, despite its best efforts, to prevent an injurious exercise of power or discretion that is combined with a grave inadequacy, or absence, of other legal or practicable remedies to prevent the wrongful exercise of that power or discretion.64

Establishing a Claim of Breach of Fiduciary Duty

Unlike a claim for breach of confidentiality, the plaintiff need not have suffered detriment to establish a claim of breach of fiduciary duty65 and so actions for breach of confidence often also allege breach of fiduciary duty because of the lower threshold for breach.66 However, the courts may be reluctant to impose a fiduciary duty where there is also a breach of confidence, perhaps because the remedies available for a breach of confidence are broad and generally at least equivalent to those available for a breach of fiduciary duty.67

To establish a claim for breach of fiduciary duty in the context of misuse of confidential information or trade secrets, a plaintiff must show the same elements as in other claims for a breach of fiduciary duty, and must establish that the defendant owed a fiduciary duty to the plaintiff and breached this duty.68


Both legal and equitable remedies are available for a breach of confidentiality, whereas breach of fiduciary duty may be redressed only through equitable remedies.69 The array of remedies available in a breach of confidence action is vast70 and the courts have taken a flexible approach to fashion appropriate remedies, given the sui generis nature of the action.71


The nature of confidential information is such that misuse by a recipient tends to destroy the value of the information by compromising its confidentiality. As the disclosure or continued misuse of confidential information can destroy the very thing a plaintiff is seeking to protect, obtaining a swift interlocutory injunction can be the most important practical remedy available to a plaintiff.72

A party seeking an interlocutory injunction must prove that (1) there is a serious issue to be tried; (2) irreparable harm would be suffered by the party seeking the injunction if it is not granted; and (3) the balance of convenience favours granting of the injunction.73 In an application for interlocutory injunction in the trade secret context, the plaintiff would need to establish that the defendant possessed a trade secret; that the defendant knew it was a trade secret; that the acquisition of the trade secret was improper; and that the balance of convenience favoured granting the injunction.74 The examination for balance of convenience requires the court to consider whether the injunction would inflict damage on the defendant disproportionate to the legitimate interests of the plaintiff.75

A plaintiff who is successful on the merits can also seek a permanent injunction to provide an ongoing prohibition against the misuse of the confidential information beyond the disposition of the case. An injunction that is framed in a manner that includes a restraint on the use of information already in the public domain is too broad.76 The plaintiff bears the onus of showing that the injunction goes no further than is reasonably necessary to protect his or her interests.77

A plaintiff's failure to seek an interlocutory injunction may significantly undermine any claim for a permanent injunction.78 In Cadbury Schweppes, the plaintiff's delay in seeking an injunction, the transitory and peripheral nature of the information sought to be protected and the adequacy of a monetary remedy were all factors the Court considered in deciding against granting a permanent injunction.

The scope of an injunction may be limited by time79 and place.80 It may restrict only certain activities81 and last only until the relevant information is no longer secret.82

The grant of a permanent injunction follows a court's consideration of the full merits of a case. It is a discretionary remedy and the court may decide against granting an injunction if damages are deemed sufficient and appropriate.83


Damages are awarded to compensate for the loss suffered by the successful plaintiff. In calculating damages, the courts strive to look at what the situation would have been "but for" the activity of the defendant, with a view to avoid overcompensation where the misused confidential information is "nothing very special."84

Damages may be assessed on one or more of the following bases:

  1. confider's loss of profit;

  2. value of consultant's fee that would have been paid to develop the information;

  3. depreciation of the value of the information resulting from the breach;

  4. development costs in acquiring the information;

  5. capitalization of an appropriate royalty;

  6. market value of the information85

The court's task is to examine the positions of the plaintiff and the defendant, and to determine the approach that best puts the plaintiff in the position as if no wrong had occurred.86

Although an award of damages for loss of actual sales can be made, loss of opportunity to apply profits from lost sales to other markets has been held to be too remote.87 Likewise, loss of enhancement of reputation has been held to be too remote to result in award of damages.88

Other Remedies

Aside from injunctions and damages, other available remedies include constructive trusts, accounting of profits, equitable liens, tracing orders, fair licence and punitive or exemplary damages.

Constructive trusts may be imposed to ensure that the wealth that would have accrued for the benefit of the plaintiff is restored to the plaintiff.89 Justice La Forest, in Lac Minerals, explains that so long as a valid restitutionary claim has been made out, it is not necessary that confidential information is recognized as property for the remedy of constructive trust to be appropriate; more important is "the right of the [rightful] property holder to have changes in value accrue to his account rather than to the account of the wrongdoer."90 In Lac Minerals, the valuation of the property for assessing damages was found to be "virtually impossible," and so in view of this difficulty, the uniqueness of the property and the fact that the plaintiff would have acquired the property but for the defendant's breaches of duty, Justice La Forest found that a constructive trust is the appropriate remedy.91 However, it was also noted in Lac Minerals that constructive trusts would generally not be the appropriate remedy in most cases and "should only be awarded if there is reason to grant to the plaintiff the additional rights that flow from recognition of a right of property."92

An accounting of profits is another available remedy that is meant to deprive the defendant of profits that are improperly made. In light of the Cadbury Schweppes decision, accounting of profits is unlikely to be awarded where the information is "nothing very special," and that only a springboard period is provided by the misuse of confidential information.93

Other remedies include declaratory relief and delivery up orders. The court may provide declaratory relief, a discretionary remedy whereby the court issues a declaration as to ownership. Usually ancillary to an injunction, the court may also order delivery up or destruction of the confidential material.94

Protecting Trade Secrets and Confidential Information

Many practical ways are available to protect trade secrets within an organization, often based simply on applying common sense and forethought.

The most commonly used legal tool is the confidentiality agreement, also known as nondisclosure agreement. This type of agreement is used to clarify what constitutes confidential information and the authorized uses of that information. This agreement is typically useful in situations involving prospective employees, departing employees, partners, parties in negotiations, customers and suppliers. Especially for incoming employees, it is also important that the confidentiality agreement includes a covenant prohibiting the employee from using confidential information belonging to third parties, such as a former employer. An employer is vicariously liable for any wrongful acts of employees within their scope of employment,95 and an employer should be careful that its operation does not inadvertently misuse another party's confidential information that would lead to liability.

Restrictive covenants, including non-competition provisions, can be used to limit the rights of a party to engage in activity that may be detrimental to or undesired by the company. Common examples of these covenants are non-competition provisions that limit an ex-employee's ability to compete with the former employer and restrict an ex-employee from soliciting customers or other employees of the former employer. In crafting restrictive covenants, one must bear in mind the presumption that all covenants in restraint of trade are prima facie void, but that this presumption can be rebutted on a showing that the covenant is reasonable and goes no further than is necessary to protect an employer's interests.96 If the business of the employer, such as a personnel agency, does not involve trade secrets, a restrictive covenant limiting an employee's ability to be associated with any other firm engaged in a similar business after termination may be held to be unreasonable and, therefore, void.97 An employee's use of personal knowledge gained from employment also should not be restrained.98 For departing employees, an exit interview in which the confidentiality obligations of the employees are re-emphasized or at which the obligations are set out in a letter to the employee can also be useful to remind the departing employee of his or her obligations.

Another way for a business to protect its trade secrets and confidential information is to set up a management program in which the business's key information, including trade secrets, is identified and then placed under "lock and key." For practical purposes, one of the best ways to keep confidential information secret is to simply limit access to it. For electronic data, files having confidential information can be encrypted and/or stored on a network hard drive requiring authentication to access. Confidential documents, in electronic or paper form, can also be marked as confidential to provide notice to anyone coming across the documents.

Businesses in the software industry can also arrange for employees assigned to sensitive projects to use computers that are disconnected from external networks.

Another important tool for protecting confidential information is to provide training to staff and employees on the handling of confidential information. Confidentiality is compromised at times (1) inadvertently, such as through a casual conversation; (2) through sub-optimal practices, such as not insisting upon a confidentiality agreement before disclosing sensitive information; or (3) through plain carelessness, such as leaving confidential documents unattended at a public location. A training program designed to make employees aware of what a business considers to be its confidential information and to explain the policies on handling the information can greatly reduce unintended "leaks" of confidential information.


Trade secrets and confidential information can be valuable assets to a business enterprise and care should be taken to protect these assets. In the event of any misuse, the law has developed flexible remedies whereby the business can obtain redress. A business should have policies in place to identify and limit access to its confidential information and to ensure that any disclosure of the information is under a duty of confidence. By having safeguards in place to protect its information, a business can also enhance its position in seeking legal redress should any misuse arise.


1 R.S.O. 1990, c. F.31.

2 S.C. 2000, c. 5.

3 See M.D. Manson, "What are trade secrets, and how are they different from confidential information and intellectual property?" in R.A. Fashler et al., eds., Trade Secrets and Confidential Information (Vancouver: The Continuing Legal Education Society of British Columbia, 2002) 1.1 at 1.1.02 [Manson].

4 Note also the English case of Faccenda Chicken Ltd. v. Fowler, [1986] 1 All E.R. 617 (C.A.) [Faccenda Chicken], in which the Court drew a distinction between the terms "trade secrets" and "confidential information." However, in this case the Court appears to have described confidential information more as "trade knowledge," as discussed later in this paper.

5 See Cadbury Schweppes Inc. v. FBI Foods Ltd., [1999] 1 S.C.R. 142 [Cadbury Schweppes].

6 [1949] O.R. 303 (H.C.J.) [R.I. Crain]. See also Reliable Toy Co. v. Collins, [1950] O.R. 360 (H.C.J.).

7 R.I. Crain, ibid. at para. 19.

8 Institute of Law Research and Reform (Edmonton, Alberta) and A Federal Provincial Working Party, Trade Secrets, Report No. 46, July 1986.

9 Manson, supra note 3 at 1.1.03.

10 (1991), 37 C.P.R. (3d) 288 at 316 (Alta. Q.B.) [Pharand Ski], citing with approval Ansell Rubber Co. Pty Ltd. v. Allied Rubber Industries Pty Ltd., [1967] V.R. 37 (S.C.) and Deta Nominees Pty. Ltd. v. Viscount Plastic Products Ltd., [1979] V.R. 167 (S.C.).

11 Ibid. at 316. See also Ebco Industries Ltd. v. Kaltech Manufacturing Ltd., [1999] B.C.J. No. 2350 (S.C.).

12 See Pizza Pizza Ltd. v. Gillespie (1990), 75 O.R. (2d) 225 (Gen. Div.); Genesta Manufacturing Ltd. v. Babey (1984), 48 O.R. (2d) 94 (H.C.J.) [Genesta].

13 Maguire v. Northland Drug Co., [1935] S.C.R. 412 [Maguire].

14 See Berkey Photo (Canada) Ltd. v. Ohlig (1983), 76 C.P.R. (2d) 121 (H.C.J.); Herbert Morris Ltd. v. Saxelby, [1916] 1 AC 688 (H.L.), cited with approval in Apotex Fermentation Inc. v. Novopharm Ltd. (1995), 63 C.P.R. (3d) at 146 (Man. Q.B.) [Apotex Fermentation].

15 Faccenda Chicken, supra note 4.

16 Cadbury Schweppes, supra note 5.

17 R.S.C. 1985, c. C-46, s.322.

18 R. v. Stewart, [1988] 1 S.C.R. 963.

19 Triplex Safety Glass Company v. Scorah, [1937] 4 All E.R. 693 (Ch. D.), cited with approval in R.I. Crain, supra note 6 at para. 7.

20 See Lac Minerals Ltd. v. International Corona Resources Ltd., [1989] 2 S.C.R. 574 [Lac Minerals] Note that Lac Minerals was a split decision in which the Court was unanimous only on the issue of breach of confidence; Coco v A.N. Clark (Engineers) Limited, [1969] R.P.C. 41 (Ch. D.) [Coco].

21 See Saltman Engineering Co. Ltd. and others v. Campbell Engineering Co., Ltd., [1963] 3 All E.R. 413 (C.A.) [Saltman]; Lac Minerals, ibid.

22 See Lac Minerals, ibid.; Cadbury Schweppes, supra note 5.

23 Coco, supra note 20.

24 Ibid.

25 Lac Minerals, supra note 20. See also Ken Graham Consumer Products Ltd. v. Sunbeam Corp. (Canada) Ltd. (1989), 25 C.P.R. (3d) 52 (Ont. H.C.J.) [Ken Graham].

26 Lac Minerals, ibid.

27 Ken Graham, supra note 24.

28 Cadbury Schweppes, supra note 5. See also Breeze Corporation v. Hamilton Clamp and Stamping Ltd. (1961), 37 C.P.R. 153 (Ont. H.C.).

29 Ken Graham, supra note 25.

30 R.T. Investment Counsel Inc. v. Werry (1999), 46 B.L.R. (2d) 66 (B.C.S.C.).

31 Saltman, supra note 21.

32 Seager v. Copydex Ltd., [1967] 1 W.L.R. 923 (C.A.) [Seager].

33 Coco, supra note 20.

34 Sweet Factory Inc. v. Hudson's Bay Co. (1988),85 C.P.R. (3d) 417 (Ont. Ct. Gen. Div.) [Sweet Factory].

35 Supra note 20.

36 Seager, supra note 31.

37 Lac Minerals, supra note 20.

38 Ibid.

39 See Apotex Fermentation, supra note 14; Cadbury Schweppes, supra note 5.

40 See C.L. Slusarchuk and D. Crane, "When Will Confidentiality Obligations Be Imposed by the Common Law?" in R.A. Fashler et al., eds., Trade Secrets and Confidential Information (Vancouver: The Continuing Legal Education Society of British Columbia, 2002) 2.1 at 2.1.17 [Slusarchuk].

41 S D & A Marketing v. Horn Abbot Ltd. (1989), 26 C.P.R. (3d) 168 (Ont. H.C.J.).

42 Abode Properties Ltd. v. Schickendanz Bros. Ltd., [1999] A.J. No. 1407 (Alta. Q.B.).

43 Cope Allman (Marrickville) Ltd. v. Farrow (1984), 3 I.P.R. 567 (N.S.W.S.C.).

44 Bryndon Ventures Inc. v. Bragg (1989), 31 C.P.R. (3d) 452 (B.C.S.C.) aff'd (1991), 37 C.P.R. (3d) 489 (B.C.C.A.).

45 Hollinsworth v. BCTV, a division of Westcom TV Group Ltd. (1999), 59 B.C.L.R. (3d) 121 (C.A.).

46 A.-G. v. Guardian Newspapers Ltd. (No. 2), [1990] 1 A.C. 109 (H.L.).

47 Glaxo Canada Inc. v. Canada (Minister of Health and Welfare) (1992), 41 C.P.R. (3d) 176 (F.C.T.D.).

48 Terrapin Ltd. v. Builders' Supply Co. (Hayes) Ltd., [1960] R.P.C. 128 (C.A.) [Terrapin].

49 Cadbury Schweppes, supra note 5. See also Saltman, supra note 21.

50 Terrapin, supra note 47.

51 Ibid. See also Manson, supra note 3 at 1.1.09.

52 Cadbury Schweppes, supra note 5.

53 Lac Minerals, supra note 20.

54 Ibid.

55 Ibid.

56 Canadian Aero Services Ltd. v. O'Malley (1973), 40 D.L.R. (3d) 371 (S.C.C.) [Canadian Aero].

57 Ibid.

58 Slusarchuk, supra note 39 at 2.1.09.

59 Lac Minerals, supra note 20.

60 Ibid. See also Cadbury Schweppes, supra note 5.

61 Cadbury Schweppes, supra note 5 at 165.

62 Visagie v. TVX Gold Inc. (2000), 49 O.R. (3d) 198 (C.A.).

63 Cadbury Schweppes, supra note 5 at 163-5.

64 Sweet Factory, supra note 34.

65 Lac Minerals, supra note 20 at para. 42, La Forest J. La Forest J. was in the minority on the Court's finding that a fiduciary duty did not exist in this case but his statements regarding the criteria for breach were not in dispute.

66 Slusarchuk, supra note 39 at 2.1.07.

67 Ibid. See also Cadbury Schweppes, supra note 5.

68 Sweet Factory, supra note 34.

69 Lac Minerals, supra note 20.

70 Cadbury Schweppes, supra note 5. See also Francis Gurry, Breach of Confidence (Oxford: Clarendon Press, 1984) [Gurry].

71 Cadbury Schweppes, ibid.

72 M. B. Gehlen, "Remedies for Misuse of Confidential Information" in R.A. Fashler et al., eds., Trade Secrets and Confidential Information, (Vancouver: The Continuing Legal Education Society of British Columbia, 2002) 3.1 at 3.1.05. See also Gurry, supra note 70.

73 RJR-MacDonald Inc. v. Canada (A.G.), [1994] 1 S.C.R. 311.

74 Vapor Canada Ltd. v. MacDonald (1972), C.P.R. (2d) 204 (F.C.T.D.), rev'd on other grounds [1977] 2 S.C.R. 134.

75 Cadbury Schweppes, supra note 5. See also Fibron Machine Corp. v. Sawley (1999), 86 C.P.R. (3d) 448 (B.C.S.C.).

76 United Technologies Corp. v. Platform Computing Corp. (1998), 83 C.P.R. (3d) 350 (Ont. Ct. J. Gen. Div.).

77 R.L. Crain Limited v. Ashton and Ashton Press Manufacturing Company Limited, [1950] O.R. 62 (C.A.).

78 Cadbury Schweppes, supra note 5.

79 Bee Chemical Co. v. Plastic Paint & Finish Specialities Ltd. (1979), 47 C.P.R. (2d) 133 (Ont. C.A.).

80 A & W Games Ltd. v. Le Blanc (1990), 31 C.P.R. (3d) 471 (Ont. D.C.).

81 Miss Milly House Cleaning Services Ltd. v. Church (1997), 77 C.P.R. (3d) 203 at 206 (B.C.S.C.), citing with approval Busnex Business Exchange Ltd. v. Reimer, [1996] B.C.J. No. 815 (Van. Reg. No. C961495, April 16, 1996).

82 International Tools Ltd. v. Kollar, [1968] 1 O.R. 669 (C.A.).

83 Cadbury Schweppes, supra note 5.

84 Ibid.

85 ICAM Technologies v. EBCO Industries (1991), 36 C.P.R. (3d) 504 (B.C.S.C.).

86 Cadbury Schweppes, supra note 5.

87 Wil-Can Electronics Can Ltd. v. Ontario (Ministry of the Solicitor-General), [1992] O.J. No. 2537 (Gen. Div.).

88 Ibid.

89 Lac Minerals, supra note 20.

90 Ibid. at para. 76-78.

91 Ibid. at para. 78.

92 Ibid.

93 Cadbury Schweppes, supra note 5 referred to in Manson, supra note 3.

94 See Gurry, supra note 70 at 411-6.

95 Apotex Fermentation v. Novopharm Ltd. (1998), 80 C.P.R. (3d) 449 (Man. C.A.).

96 Maguire, supra note 13.

97 Drake International Ltd. v. Mille, (1975), 61 D.L.R. (3d) 420 (Ont. H.C.J.).

98 Genesta, supra note 12.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

To print this article, all you need is to be registered on

Click to Login as an existing user or Register so you can print this article.

In association with
Related Video
Up-coming Events Search
Font Size:
Mondaq on Twitter
Register for Access and our Free Biweekly Alert for
This service is completely free. Access 250,000 archived articles from 100+ countries and get a personalised email twice a week covering developments (and yes, our lawyers like to think you’ve read our Disclaimer).
Email Address
Company Name
Confirm Password
Mondaq Topics -- Select your Interests
 Law Performance
 Law Practice
 Media & IT
 Real Estate
 Wealth Mgt
Asia Pacific
European Union
Latin America
Middle East
United States
Worldwide Updates
Mondaq Ltd requires you to register and provide information that personally identifies you, including what sort of information you are interested in, for three primary purposes:
  • To allow you to personalize the Mondaq websites you are visiting.
  • To enable features such as password reminder, newsletter alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our information providers who provide information free for your use.
  • Mondaq (and its affiliate sites) do not sell or provide your details to third parties other than information providers. The reason we provide our information providers with this information is so that they can measure the response their articles are receiving and provide you with information about their products and services.
    If you do not want us to provide your name and email address you may opt out by clicking here
    If you do not wish to receive any future announcements of products and services offered by Mondaq you may opt out by clicking here

    Terms & Conditions and Privacy Statement (the Website) is owned and managed by Mondaq Ltd and as a user you are granted a non-exclusive, revocable license to access the Website under its terms and conditions of use. Your use of the Website constitutes your agreement to the following terms and conditions of use. Mondaq Ltd may terminate your use of the Website if you are in breach of these terms and conditions or if Mondaq Ltd decides to terminate your license of use for whatever reason.

    Use of

    You may use the Website but are required to register as a user if you wish to read the full text of the content and articles available (the Content). You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these terms & conditions or with the prior written consent of Mondaq Ltd. You may not use electronic or other means to extract details or information about’s content, users or contributors in order to offer them any services or products which compete directly or indirectly with Mondaq Ltd’s services and products.


    Mondaq Ltd and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published on this server for any purpose. All such documents and related graphics are provided "as is" without warranty of any kind. Mondaq Ltd and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Mondaq Ltd and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from this server.

    The documents and related graphics published on this server could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Mondaq Ltd and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time.


    Mondaq Ltd requires you to register and provide information that personally identifies you, including what sort of information you are interested in, for three primary purposes:

    • To allow you to personalize the Mondaq websites you are visiting.
    • To enable features such as password reminder, newsletter alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
    • To produce demographic feedback for our information providers who provide information free for your use.

    Mondaq (and its affiliate sites) do not sell or provide your details to third parties other than information providers. The reason we provide our information providers with this information is so that they can measure the response their articles are receiving and provide you with information about their products and services.

    Information Collection and Use

    We require site users to register with Mondaq (and its affiliate sites) to view the free information on the site. We also collect information from our users at several different points on the websites: this is so that we can customise the sites according to individual usage, provide 'session-aware' functionality, and ensure that content is acquired and developed appropriately. This gives us an overall picture of our user profiles, which in turn shows to our Editorial Contributors the type of person they are reaching by posting articles on Mondaq (and its affiliate sites) – meaning more free content for registered users.

    We are only able to provide the material on the Mondaq (and its affiliate sites) site free to site visitors because we can pass on information about the pages that users are viewing and the personal information users provide to us (e.g. email addresses) to reputable contributing firms such as law firms who author those pages. We do not sell or rent information to anyone else other than the authors of those pages, who may change from time to time. Should you wish us not to disclose your details to any of these parties, please tick the box above or tick the box marked "Opt out of Registration Information Disclosure" on the Your Profile page. We and our author organisations may only contact you via email or other means if you allow us to do so. Users can opt out of contact when they register on the site, or send an email to with “no disclosure” in the subject heading

    Mondaq News Alerts

    In order to receive Mondaq News Alerts, users have to complete a separate registration form. This is a personalised service where users choose regions and topics of interest and we send it only to those users who have requested it. Users can stop receiving these Alerts by going to the Mondaq News Alerts page and deselecting all interest areas. In the same way users can amend their personal preferences to add or remove subject areas.


    A cookie is a small text file written to a user’s hard drive that contains an identifying user number. The cookies do not contain any personal information about users. We use the cookie so users do not have to log in every time they use the service and the cookie will automatically expire if you do not visit the Mondaq website (or its affiliate sites) for 12 months. We also use the cookie to personalise a user's experience of the site (for example to show information specific to a user's region). As the Mondaq sites are fully personalised and cookies are essential to its core technology the site will function unpredictably with browsers that do not support cookies - or where cookies are disabled (in these circumstances we advise you to attempt to locate the information you require elsewhere on the web). However if you are concerned about the presence of a Mondaq cookie on your machine you can also choose to expire the cookie immediately (remove it) by selecting the 'Log Off' menu option as the last thing you do when you use the site.

    Some of our business partners may use cookies on our site (for example, advertisers). However, we have no access to or control over these cookies and we are not aware of any at present that do so.

    Log Files

    We use IP addresses to analyse trends, administer the site, track movement, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information.


    This web site contains links to other sites. Please be aware that Mondaq (or its affiliate sites) are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of these third party sites. This privacy statement applies solely to information collected by this Web site.

    Surveys & Contests

    From time-to-time our site requests information from users via surveys or contests. Participation in these surveys or contests is completely voluntary and the user therefore has a choice whether or not to disclose any information requested. Information requested may include contact information (such as name and delivery address), and demographic information (such as postcode, age level). Contact information will be used to notify the winners and award prizes. Survey information will be used for purposes of monitoring or improving the functionality of the site.


    If a user elects to use our referral service for informing a friend about our site, we ask them for the friend’s name and email address. Mondaq stores this information and may contact the friend to invite them to register with Mondaq, but they will not be contacted more than once. The friend may contact Mondaq to request the removal of this information from our database.


    From time to time Mondaq may send you emails promoting Mondaq services including new services. You may opt out of receiving such emails by clicking below.

    *** If you do not wish to receive any future announcements of services offered by Mondaq you may opt out by clicking here .


    This website takes every reasonable precaution to protect our users’ information. When users submit sensitive information via the website, your information is protected using firewalls and other security technology. If you have any questions about the security at our website, you can send an email to

    Correcting/Updating Personal Information

    If a user’s personally identifiable information changes (such as postcode), or if a user no longer desires our service, we will endeavour to provide a way to correct, update or remove that user’s personal data provided to us. This can usually be done at the “Your Profile” page or by sending an email to

    Notification of Changes

    If we decide to change our Terms & Conditions or Privacy Policy, we will post those changes on our site so our users are always aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it. If at any point we decide to use personally identifiable information in a manner different from that stated at the time it was collected, we will notify users by way of an email. Users will have a choice as to whether or not we use their information in this different manner. We will use information in accordance with the privacy policy under which the information was collected.

    How to contact Mondaq

    You can contact us with comments or queries at

    If for some reason you believe Mondaq Ltd. has not adhered to these principles, please notify us by e-mail at and we will use commercially reasonable efforts to determine and correct the problem promptly.

    By clicking Register you state you have read and agree to our Terms and Conditions