Cayman Islands: Trust Disputes In The Digital Age - Part 1

Last Updated: 18 October 2006
Article by Ingrid Pierce

Most Read Contributor in Cayman Islands, November 2017

Living In The E-World

More than 1 billion people - representing about 15.7% of the world's population - regularly use the internet. This is an increase from 45 million in 1995 and 420 million in 2000. It is predicted that at least 2 billion users will be online by the year 20111.

It has been estimated that more than 60 billion emails are being sent around the world every day.2 In the commercial world, 93% of all corporate documents are created, viewed and stored electronically although 70% of this electronic data is never produced to hard copy.3 This is an astonishing statistic, considering that businesses only seriously started taking notice of the internet less than 15 years ago.4

Although the use of electronic messaging and documents has been embraced by the commercial world, the issue of storing messages and documents for future reference has been relatively overlooked. A surprising number of businesses remain unaware of the potential for using (and misusing) the tools of modern technology.

For trustees, directors and other fiduciaries operating in a contentious environment, the importance of retaining and retrieving electronic data cannot be underestimated. One of the fundamental reasons for doing so is to assist in disaster preparedness and recovery, which is especially important for those living in jurisdictions prone to hurricanes and other natural disasters. Fairly basic methods can be employed (e.g. scanning and storing electronic documents offsite) to facilitate the continuation of business and enable service providers to be up and running within a very short period of time after a natural disaster.

It is well known that litigation triggers obligations and requests for discovery of documents. "Documents" are no longer confined to paper copies: they are electronic messages, data stored on servers, information displayed on ever-changing websites and data stored on personal data assistants. As a general proposition, if the information is relevant to the matters in dispute, it may be discoverable, whether it is contained in hard copy or electronic form. In most common law jurisdictions, the court will no longer accept a lack of electronic storage facilities as a defence to an order for production of electronic documents. There are, of course, limits that are frequently placed upon the nature and scope of discoverable material, since what may be reasonable and proportionate to disclose in one case may not be so in another. Notwithstanding well established procedural rules on discovery, applications for specific discovery continue to be made. Courts' decisions are invariably made on a case by case basis, so you can never be too prepared!

Trustees' Use Of Electronic Communications

Many trust companies, even those that have fairly sophisticated electronic document management systems, do not necessarily adopt a logical approach to storing data. The way in which emails are handled is largely left to the individuals' deletion habits and storage choices. Emphasis is often placed upon the type of information and data that employees can access or download onto a company's computer network rather than the way in which work-related material is stored.

Trust companies may need to rethink the way in which certain types of electronic information is retained and stored. Different methods may be appropriate for different organisations, but it is worth considering the nature of the information and the level of internal and external confidentiality that should be preserved. Policies may be developed based upon whether the information relates to the trust and its investments, or to communications between the settlor, beneficiaries, third party service providers or attorneys.

Record-keeping and File Maintenance

All trust documents should be safely stored but readily accessible for discovery and potential deployment in evidence should litigation arise in relation to any aspect of the trust. Electronic communications are no exception.

Records relating to the establishment of the settlement

The files and records of the settlement are obviously key documents. If trustees are ever required to defend the validity of the settlement, it will be helpful if there is some evidence of the reasons behind the establishment of the trust and any professional advice that was sought in relation to it.5 When a trust is established offshore it is even more important to keep records of the identity of and advice given by professional advisors who advised on the structure of the trust.

Any procedural manuals or similar documents containing a trust company's internal procedures relating to the administration of trusts generally should be retained. These procedural manuals are not, on the whole, required to be produced to a beneficiary enquiring about disclosure of trust documents. However, if litigation ensues in relation to the trust, they may become highly relevant documents to be considered along with the trustees' own evidence of internal practices at the relevant time.

Advice given to trustees

Once the trust has been established, records of any professional advice taken from time to time should be retained, even if the advice was sought or given on an "informal" basis. If the advice was given orally, a contemporaneous note should be made and filed. Hard copies of documents and attendance notes should, if resources permit, be scanned and stored electronically as a matter of course.


Draft records include preliminary and subsequent drafts of trust documents, notes or annotations on documents, internal mark-ups or comments and other supporting materials. As a general matter, there is no legal requirement to retain drafts of trust documents (unless they are relevant to contemplated or actual litigation). Moreover, on a day-to-day basis, drafts of most documents may be of very limited value. As a practical matter, physical storage is always a challenge and for this reason, drafts are often shredded or archived in a warehouse, never to be seen again. However, draft documents may become relevant in a dispute about the trust or the trustees' decisions and should therefore be retained. If, as is often the case, the draft material has been sent in electronic form, it can be electronically archived or saved onto a CD. If sent in paper form, it can, very easily be scanned and saved in electronic form for easy storage and retrieval at a later date.

Trustee decisions

All of the factual matters taken into account by trustees when exercising their discretion should be recorded. Internal exchanges by email may be as valuable as (or certainly more revealing than) the actual trustee minutes recording the stated reasons for a decision. In this connection, communications with beneficiaries are frequently the subject of scrutiny and cross-examination in trust disputes. Care should be taken to record such communications and if sent electronically, they should form part of the file, whether the file is retained in paper or electronic form.

Communications with the settlor

Unlike communications between a client and his legal adviser, trustees' communications with the settlor are not usually privileged from production.

Letters of wishes or indeed informal requests made by the settlor in respect of the trust (which may be communicated by email or even a text message) are not immune from discovery even though they were made and communicated by the settlor in confidence. Although a beneficiary has no "right" as such to sight of the documents evidencing the request, the court may override the expectation of confidence if the documents contain relevant information and if the benefits of disclosure outweigh the detriment of nondisclosure in the particular case. Thus, communications with the settlor, if relevant to the trust dispute, may be the subject of an order for production, whether sent or stored in electronic form.

Taking and slavishly following "instructions" or directions from the settlor after the trust has been established without any real exercise of discretion is at best, embarrassing for the trustee when used in evidence, and could be a breach of trust. However, trustees need not refuse to comply with a settlor's letter of wishes for the sole purpose of demonstrating independence in their decision-making, provided that they apply their minds to the proper exercise of their discretion.6 Although there is no requirement for these types of communication or the trustees' deliberations to be recorded in writing, the best evidence to demonstrate that the trustees have considered a request and properly exercised their discretion will usually be to show that they have questioned or probed requests from beneficiaries and/or the settlor and if necessary, have taken legal or other expert advice. A written record of these steps is often far more powerful than the parties' oral evidence.

Document retention (and destruction)

Not all electronic records must always be retained: the systematic destruction of electronic material may be justifiable in an individual case depending on the size of the organisation and the amount of data produced. It is generally accepted that in order to properly manage and maintain information, organisations do need to create document retention policies. Such policies, of necessity, involve the destruction of certain material. Provided the policy is adopted and implemented in good faith, this may be consistent with a proper and reasonable approach to managing and maintaining information.

Instructions by email

As a general matter, valid instructions may be given by any means, including email or other forms of electronic messaging. However, the internal policies of an organisation may dictate that certain types of instructions cannot be given in this way, or cannot be given solely by email. Agreements will frequently stipulate the method by which instructions may be given. For example, many banks and trust companies will only accept email instructions if confirmed by a telephone call or fax, in order to help verify the identification of the person giving instructions. Electronic signatures or other methods of encryption may also be employed (see below). In the absence of such constraints, it is possible to accept instructions solely by email but this may expose a trustee to the risk that such instructions can be manipulated by third parties with relative ease.

Use of e-signatures

The use of an electronic signature (either used alone or with encryption) is one method of reducing the risk of interference with electronic communications, on the basis that the recipient will be aware that the email is in fact from the desired sender. If attached to all emails and recipients are trained to expect the signature, not only does the signature add to the security of the email, but in most cases allows recipients to recognise if spam or an email infected with a virus has been sent from that sender's email because it is missing the electronic signature.

Many jurisdictions have introduced legislation to regulate the use of electronic signatures and wholly electronic documents in place of originally signed documents. Such legislation provides that any electronic signature or related certificate will be permitted as evidence of the integrity or authenticity of the document. See for example, the Electronics Communications (Jersey) Law 2000, which was introduced in an effort to promote Jersey as a beneficial base for electronic business. Similar legislation has also been created in many other jurisdictions, including Australia7, Bermuda8, the Bahamas9, the Cayman Islands10 and the United Kingdom11. The introduction of legislation regulating documents that have been created and executed entirely in electronic form is one step closer to the development of a paperless legal system.


Email encryption is another tool that can help to prevent unintentional disclosure of confidential communications. Email encryption involves the use of a public and a private key. The private key is used by the author of the email to encrypt the email and the public key is given to those who will receive the emails. Any external party who intercepts the encrypted email will not be able to read the email without the public key and it will appear as gibberish. Encryption can also be used on word-processed documents to protect the content of the document when attached to an email. This allows confidential documents to be sent by email and assures both the sender and recipient that they are the only people with immediate access to the document.

However, it is also important to use the right encryption tools, as not all of them are created equal. The U.S. military in Iraq found that out the hard way when the media found secret information had been hidden in an adobe document given to them. Someone in the military reportedly redacted a document by blacking out the secret text. However, when the document was opened in Adobe Acrobat, the original text could be readily viewed. Using the right tools could have removed information selected for redaction. Such a tool would parse the document, physically delete the selected information, and generate a new redacted document. The deleted information could not then be recovered, because the redacted file would have been created without it.12

Privileged communications (Emails to third parties)

Confidential communications passing between a client and its legal advisers for the purposes of giving or obtaining legal advice and, communications that come into existence in preparation of legal proceedings, are prima facie exempt from disclosure on the grounds of privilege. Privilege may be lost or waived and with so much privileged information being sent electronically, it is easy to send information to the wrong person or to attach privileged information by mistake.

Generally speaking, a communication cannot be confidential if made in the presence of a stranger unless it was made in its presence because of necessity.13 Emails may pass through one or more servers owned and controlled by parties outside of the privileged relationship. Those monitoring the servers (including IT administrators with unlimited access to a network) have the ability to access and alter the confidential information in the email before passing it along. Does this mean that emails cannot be deemed confidential because they pass through a public domain? How is this different from a letter passing through a number of people before being delivered to the intended recipient?14

The basic position is that the mere transmission of information through one or more servers does not, of itself, cause the communication to lose its confidentiality (or if privileged, to lose privilege). However, because of the risk with electronic communications that confidentiality and privilege may be more easily lost, it is important to take steps to minimise this risk.

First, it is important to ensure that emails are not circulated too widely. This will help counteract arguments that any expectation of confidentiality has been waived. Second, everyone needs to understand the risk of using electronic messaging and emails for certain types of discussions. For example, work colleagues who used to have face to face chats now choose to communicate by email. Discussions that were intended to be internal, informal or "just between us" are now recorded in a permanent document trail that could be required for disclosure in future litigation.

Documents which can become discoverable in litigation will include all computers, discs, back-up tapes or archived documents. It is almost impossible to completely delete an electronic file so any email sent will almost always be able to be recovered after deletion.15 It has been said that: "According to every expert in the field, it is virtually impossible to destroy a virtual document. Like the vampire of legend, it will always return."16

In the U.S., where applications and orders for electronic discovery are frequently made, the courts have required parties to take reasonable steps to ensure that they disclose back-up copies of files and archival tapes that would provide information about any deleted electronic data.17 In one case it was held that computer records that had been deleted were discoverable documents and the court ordered the examination of the hard drive in question to recover deleted files.18

Statements about confidentiality / privilege

The status of an email as a privileged communication can be supported and more easily identified if a confidentiality statement is attached to the document stipulating the attached privilege. A confidentiality statement made clearly in the header or at the beginning of an email may be a more effective protection tool than a short statement in tiny font at the end.19 However, these confidentiality statements are not required in order to claim privilege.20

One practical suggestion to maintain privilege, particularly for in-house counsel, is to give restricted or limited access to sensitive materials. IT systems can be set so that emails named 'private' cannot be read by third parties with access to the user's inbox. This will not only demonstrate an intention to maintain confidentiality but may also help to avoid inadvertent waiver by disclosure to a third party.21

In Haynes v. Kline22 the plaintiff, a former employee of the Kansas State Attorney General, moved for a preliminary injunction prohibiting the Attorney General’s office from further accessing his private files on his former work computer. As part of the employee orientation, a distinction was made between "public" and "private" files and employees were warned that access to any other employee’s files without permission was forbidden. Passwords were issued to each employee to prevent unauthorised access, and prior to the litigation there had been no evidence that any other employee’s personal computer files had been monitored or viewed by supervisors. The court granted the injunction, holding that given the totality of the circumstances, the plaintiff's expectation of privacy was both subjectively and objectively reasonable.

In summary, emails and other forms of electronic messaging are capable of attracting privilege. Given the current dearth of case law in many offshore jurisdictions, every effort should be made to protect electronic messages from being inadvertently disclosed to third parties. There are a number of different tools widely available to do this, such as encryption and electronic signatures. Provided that the sender can demonstrate that sufficient measures have been taken to avoid disclosure of the information, it is strongly arguable that privilege should be maintained.

Trust Disputes And Preparation For Litigation

It is now established that where a request for disclosure of documents relating to the trust has been made, the court has complete discretion as to which documents may be disclosed either to a beneficiary, or indeed any other person with an adequate interest in the trust.23 Disclosure is no longer limited to "trust documents", being those documents dealing directly with the management and administration of the trust. All documents that are relevant to the trust and the decisions made by the trustees may be subject to an order for disclosure at the discretion of the court.24 This includes confidential documents, such as letters of wishes from the settlor and legal opinions relied upon by the trustees in their decision-making.25 The question in each instance is whether, in the circumstances of the particular case, the requirement for disclosure to an applicant outbalances the competing interests and objections of the trustees, other beneficiaries or third parties.

In view of the courts' wide discretion trustees would be well advised to carefully maintain all records26 relating to the trust, whether in paper or electronic form.

Discovery of electronic documents

The courts have recognised that there are differences between electronic and paper discovery. One US court noted that:

"Many informal messages that were previously relayed by telephone or at the water cooler are now sent by e-mail. Additionally, computers have the ability to capture several copies (or drafts) of the same e-mail, thus multiplying the volume of documents. All of these e-mails must be scanned for both relevance and privilege. Also, unlike most paper-based discovery, archived emails typically lack a coherent filing system. Moreover, dated archival systems commonly store information on magnetic tapes which have become obsolete. Thus, parties incur additional costs in translating the data from the tapes into useable form."27

Other differences include the widely differing electronic retention policies each organisation may employ, the fact that electronic documents contain information which is ordinarily concealed on paper documents and perhaps ironically, the fact that electronic documents are much more difficult to destroy than paper documents.28

It is generally accepted that "documents" that must now be preserved and produced in litigation include all forms of electronic documents. In accordance with the 2005 Practice Direction relating to electronic disclosure in England and Wales, the definition of a document has been broadened to include email and other electronic messaging, word-processed documents and databases. This extends to less accessible documents such as those stored on servers and back-up systems and electronic documents which have been 'deleted' from the computer. Discovery can extend to any electronic device or media on which relevant documents may be held including mobile phones, blackberries, PDAs, laptops and even iPods.

Orders for disclosure may also be made in relation to the additional information that is attached to electronic documents called metadata. This information reveals not only email data regarding the "to", "from", "bcc", etc but also shows the "who" and "when" related to the creation of the documents and information about printing, editing and accessing the document.29 Word-processed documents also have electronic information attached to them, such as who has worked on the document, changes and deletions that have been made and what previous versions looked like. This information is hidden from ordinary view but can be easily displayed through the use of specialised software.30

Although the English Civil Procedure Rules have not been adopted wholesale by all offshore jurisdictions,31 it is a question of time before similar procedural requirements become the norm. This makes it vital for staff to become familiar with their own IT systems and processes for electronic document management and to ensure this information is communicated to their attorneys.

It should be noted however that these new rules do not have any impact on matters such as "proportionality, materiality, reasonableness, relevance or privilege", which all apply to discovery of electronic documents as they do to traditional documents.32 It follows that the disclosure of electronic material must still be proportionate to other factors.

Costs and Other Factors

A review of the procedural rules and authorities in a number of jurisdictions provides some indication as to the issues the courts will take into account when deciding what is a reasonable search for the purpose of electronic disclosure. These issues include:

  • the number of documents required to be searched;
  • the nature and complexity of the proceedings;
  • the significance of any documents likely to be found during the search; and
  • the ease and expense of the search and retrieval of the documents.

With the cost, time-consumption and volume of documents related to electronic disclosure, parties are encouraged (or in some cases required) to discuss their document retention policies and attempt to agree on the scope of electronic disclosure they will undertake.33

Applications for specific discovery are focussing more than ever on electronic material. In the US case of Zubulake v UBS,34 UBS who implemented an electronic storage system, were caught out when Ms Zubulake required the disclosure of emails which had been sent internally. UBS' storage system did not include emails and the discovery cost was estimated to be close to US$300,000, including the vendor charges and paralegal fees, for recovery of the emails requested. Although in this case the Judge ordered the plaintiff to pay 25% of the costs of discovery, she also ordered that UBS pay costs incurred by the plaintiff for the amount of time (2 years) it had taken for them to retrieve and produce the requested documents.35 The Judge stated that "All parties and their counsel are fully on notice of their responsibility to preserve and produce electronically stored information".36 She also said that any organisations facing anticipated or impending litigation should maintain their back-up tapes, especially those relating to "key players" and should have an effective way to retrieve and produce the emails contained therein.37

The Judge in that case introduced a modified seven-factor test for shifting costs of discovery which is applicable in district courts of the U.S. but may also be applied in other jurisdictions:

  1. The extent to which the request is specifically tailored to discover relevant information;
  2. The availability of such information from other sources;
  3. The total cost of production, compared to the amount in controversy;
  4. The total cost of production, compared to the resources available to each party;
  5. The relative ability of each party to control costs and its incentive to do so;
  6. The importance of the issue at stake in the litigation; and
  7. The relative benefits to the parties of obtaining the information.38

It has been estimated that traditional electronic discovery methods used to recover emails can cost approximately US$2 per message, including the attorney review costs.39 In 2004, one in five US companies had an employee's emails subpoenaed in the course of a lawsuit or regulatory investigation.40 In September 2004, Phillip Morris USA was required to pay US$2.75 million in sanctions because it had failed to maintain court-required emails for just 11 employees.41

Email correspondence must be disclosed in legal proceedings, and the authorities show that a lack of adequate storage technology will no longer be accepted as an excuse for non-disclosure. Moreover, where the storage systems utilised allow employees to delete emails entirely, adverse inferences are likely to follow42,43

To view part 2 of this article click on 'next page' below:

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

To print this article, all you need is to be registered on

Click to Login as an existing user or Register so you can print this article.

This article is part of a series: Click Trust Disputes In The Digital Age - Part 2 for the next article.
Some comments from our readers…
“The articles are extremely timely and highly applicable”
“I often find critical information not available elsewhere”
“As in-house counsel, Mondaq’s service is of great value”

Related Video
Up-coming Events Search
Font Size:
Mondaq on Twitter
Register for Access and our Free Biweekly Alert for
This service is completely free. Access 250,000 archived articles from 100+ countries and get a personalised email twice a week covering developments (and yes, our lawyers like to think you’ve read our Disclaimer).
Email Address
Company Name
Confirm Password
Mondaq Topics -- Select your Interests
 Law Performance
 Law Practice
 Media & IT
 Real Estate
 Wealth Mgt
Asia Pacific
European Union
Latin America
Middle East
United States
Worldwide Updates
Mondaq Ltd requires you to register and provide information that personally identifies you, including what sort of information you are interested in, for three primary purposes:
  • To allow you to personalize the Mondaq websites you are visiting.
  • To enable features such as password reminder, newsletter alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our information providers who provide information free for your use.
  • Mondaq (and its affiliate sites) do not sell or provide your details to third parties other than information providers. The reason we provide our information providers with this information is so that they can measure the response their articles are receiving and provide you with information about their products and services.
    If you do not want us to provide your name and email address you may opt out by clicking here
    If you do not wish to receive any future announcements of products and services offered by Mondaq you may opt out by clicking here

    Terms & Conditions and Privacy Statement (the Website) is owned and managed by Mondaq Ltd and as a user you are granted a non-exclusive, revocable license to access the Website under its terms and conditions of use. Your use of the Website constitutes your agreement to the following terms and conditions of use. Mondaq Ltd may terminate your use of the Website if you are in breach of these terms and conditions or if Mondaq Ltd decides to terminate your license of use for whatever reason.

    Use of

    You may use the Website but are required to register as a user if you wish to read the full text of the content and articles available (the Content). You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these terms & conditions or with the prior written consent of Mondaq Ltd. You may not use electronic or other means to extract details or information about’s content, users or contributors in order to offer them any services or products which compete directly or indirectly with Mondaq Ltd’s services and products.


    Mondaq Ltd and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published on this server for any purpose. All such documents and related graphics are provided "as is" without warranty of any kind. Mondaq Ltd and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Mondaq Ltd and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from this server.

    The documents and related graphics published on this server could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Mondaq Ltd and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time.


    Mondaq Ltd requires you to register and provide information that personally identifies you, including what sort of information you are interested in, for three primary purposes:

    • To allow you to personalize the Mondaq websites you are visiting.
    • To enable features such as password reminder, newsletter alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
    • To produce demographic feedback for our information providers who provide information free for your use.

    Mondaq (and its affiliate sites) do not sell or provide your details to third parties other than information providers. The reason we provide our information providers with this information is so that they can measure the response their articles are receiving and provide you with information about their products and services.

    Information Collection and Use

    We require site users to register with Mondaq (and its affiliate sites) to view the free information on the site. We also collect information from our users at several different points on the websites: this is so that we can customise the sites according to individual usage, provide 'session-aware' functionality, and ensure that content is acquired and developed appropriately. This gives us an overall picture of our user profiles, which in turn shows to our Editorial Contributors the type of person they are reaching by posting articles on Mondaq (and its affiliate sites) – meaning more free content for registered users.

    We are only able to provide the material on the Mondaq (and its affiliate sites) site free to site visitors because we can pass on information about the pages that users are viewing and the personal information users provide to us (e.g. email addresses) to reputable contributing firms such as law firms who author those pages. We do not sell or rent information to anyone else other than the authors of those pages, who may change from time to time. Should you wish us not to disclose your details to any of these parties, please tick the box above or tick the box marked "Opt out of Registration Information Disclosure" on the Your Profile page. We and our author organisations may only contact you via email or other means if you allow us to do so. Users can opt out of contact when they register on the site, or send an email to with “no disclosure” in the subject heading

    Mondaq News Alerts

    In order to receive Mondaq News Alerts, users have to complete a separate registration form. This is a personalised service where users choose regions and topics of interest and we send it only to those users who have requested it. Users can stop receiving these Alerts by going to the Mondaq News Alerts page and deselecting all interest areas. In the same way users can amend their personal preferences to add or remove subject areas.


    A cookie is a small text file written to a user’s hard drive that contains an identifying user number. The cookies do not contain any personal information about users. We use the cookie so users do not have to log in every time they use the service and the cookie will automatically expire if you do not visit the Mondaq website (or its affiliate sites) for 12 months. We also use the cookie to personalise a user's experience of the site (for example to show information specific to a user's region). As the Mondaq sites are fully personalised and cookies are essential to its core technology the site will function unpredictably with browsers that do not support cookies - or where cookies are disabled (in these circumstances we advise you to attempt to locate the information you require elsewhere on the web). However if you are concerned about the presence of a Mondaq cookie on your machine you can also choose to expire the cookie immediately (remove it) by selecting the 'Log Off' menu option as the last thing you do when you use the site.

    Some of our business partners may use cookies on our site (for example, advertisers). However, we have no access to or control over these cookies and we are not aware of any at present that do so.

    Log Files

    We use IP addresses to analyse trends, administer the site, track movement, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information.


    This web site contains links to other sites. Please be aware that Mondaq (or its affiliate sites) are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of these third party sites. This privacy statement applies solely to information collected by this Web site.

    Surveys & Contests

    From time-to-time our site requests information from users via surveys or contests. Participation in these surveys or contests is completely voluntary and the user therefore has a choice whether or not to disclose any information requested. Information requested may include contact information (such as name and delivery address), and demographic information (such as postcode, age level). Contact information will be used to notify the winners and award prizes. Survey information will be used for purposes of monitoring or improving the functionality of the site.


    If a user elects to use our referral service for informing a friend about our site, we ask them for the friend’s name and email address. Mondaq stores this information and may contact the friend to invite them to register with Mondaq, but they will not be contacted more than once. The friend may contact Mondaq to request the removal of this information from our database.


    From time to time Mondaq may send you emails promoting Mondaq services including new services. You may opt out of receiving such emails by clicking below.

    *** If you do not wish to receive any future announcements of services offered by Mondaq you may opt out by clicking here .


    This website takes every reasonable precaution to protect our users’ information. When users submit sensitive information via the website, your information is protected using firewalls and other security technology. If you have any questions about the security at our website, you can send an email to

    Correcting/Updating Personal Information

    If a user’s personally identifiable information changes (such as postcode), or if a user no longer desires our service, we will endeavour to provide a way to correct, update or remove that user’s personal data provided to us. This can usually be done at the “Your Profile” page or by sending an email to

    Notification of Changes

    If we decide to change our Terms & Conditions or Privacy Policy, we will post those changes on our site so our users are always aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it. If at any point we decide to use personally identifiable information in a manner different from that stated at the time it was collected, we will notify users by way of an email. Users will have a choice as to whether or not we use their information in this different manner. We will use information in accordance with the privacy policy under which the information was collected.

    How to contact Mondaq

    You can contact us with comments or queries at

    If for some reason you believe Mondaq Ltd. has not adhered to these principles, please notify us by e-mail at and we will use commercially reasonable efforts to determine and correct the problem promptly.

    By clicking Register you state you have read and agree to our Terms and Conditions