Case Details
- Citation: [2025] SGHC 13
- Court: High Court (General Division)
- Suit No: Suit No 447 of 2021
- Date of Judgment: 23 January 2025
- Judges: Aidan Xu @ Aedit Abdullah J
- Hearing Dates: 11, 12, 18–20, 25–28 July, 1–3 August, 2 October 2023, 16 January, 13 August 2024
- Plaintiffs/Applicants: ATT Systems (S’pore) Pte Ltd; ATT Infosoft Pte Ltd
- Defendants/Respondents: Centricore (S) Pte Ltd; Faruk Bin Abdul Kather; Toh Shenglong Louis; Kyaw Htun Win; Danesh s/o Sudinthan Pillai; Kyaw Khaing; Aung Thiha Aung; IdGates Pte Ltd
- Legal Areas: Breach of confidence; Contract; Equity (fiduciary duties); Tort (conspiracy; inducement of breach of contract)
- Core Themes: Departure of employees; misuse of confidential information; breach of employment obligations (loyalty, non-competition, ISO, confidentiality); fiduciary duties; inducement of breach; conspiracy by unlawful means; damages and counterclaims
- Judgment Length: 62 pages; 16,570 words
Summary
ATT Systems (S’pore) Pte Ltd and ATT Infosoft Pte Ltd sued Centricore (S) Pte Ltd and seven individuals (together with IdGates Pte Ltd) arising from a coordinated departure of key employees and the subsequent establishment of a competing business. The dispute centred on alleged breaches of confidence and contractual and equitable obligations, including the handling of business secrets and the destruction or removal of information from the plaintiffs’ systems. The High Court’s decision, delivered by Aidan Xu @ Aedit Abdullah J on 23 January 2025, addressed multiple causes of action: breach of confidence, breach of employment contracts, breach of fiduciary duties, inducement of breach of contract, and conspiracy by unlawful means.
The court found that the plaintiffs’ claims—particularly those relating to confidentiality—were supported by the evidence. The judgment analysed, defendant-by-defendant, whether confidential obligations were owed, what categories of information were covered, whether the defendants had accessed or used the information without consent, and whether the plaintiffs had treated the information as confidential. The court also considered the employment-based obligations (including loyalty, ISO-related obligations, non-competition, and confidentiality) and the circumstances in which fiduciary duties could arise for employees and directors. Ultimately, the court’s findings supported liability against the defendants in respect of the pleaded wrongs, with practical consequences for how employers in technology and systems-integration businesses should structure and enforce confidentiality protections when employees leave.
What Were the Facts of This Case?
The plaintiffs were ATT Systems (S’pore) Pte Ltd (“ATT Systems”) and its wholly-owned subsidiary, ATT Infosoft Pte Ltd (“ATT Infosoft”). ATT Systems provided systems integration services. ATT Infosoft, spun off in or around November 2013, specialised in intelligent electronic queue management systems (“EQMS”), visitor management systems, and payment services solutions. These solutions were used by businesses and, importantly, by government departments and statutory bodies. The commercial value of the plaintiffs’ work lay not only in the hardware and software components, but also in the know-how, proposals, maintenance approaches, and pipeline of contracts and tenders—information that could be exploited by competitors.
The defendants comprised Centricore (S) Pte Ltd (“Centricore”), IdGates Pte Ltd (“IdGates”), and six individual defendants who were formerly employees of ATT Systems/ATT Infosoft. The individuals—Mr Faruk, Mr Toh, Mr Kyaw Htun Win (“Mr Kyaw HW”), Mr Danesh, Mr Kyaw Khaing (“Mr Kyaw K”), and Mr Aung Thiha Aung (“Mr Aung”)—had employment contracts that were novated to ATT Infosoft in or around 2014. Within ATT Infosoft, their roles were senior and operational: Mr Faruk was Deputy Chief Technology Officer and a statutory director leading business operations; Mr Toh led sales as Business Development Director; Mr Kyaw HW headed the Projects department; Mr Danesh was deputy head of Maintenance; and Mr Kyaw K and Mr Aung were software engineers in Software/Research departments. These positions placed them in contact with technical and commercial materials relevant to visitor management and automated systems.
Centricore and IdGates were companies where the individual defendants later held positions. Centricore’s business included digital IT infrastructure services, customised software solutions, gantry/visitor management solutions, customised security solutions, and media management solutions. The parties did not dispute that Centricore was a competitor of ATT Infosoft in IT systems integration for automated visitor management systems (“AVMS”), EQMS, and payment kiosk systems (“PKS”) used by government departments and statutory bodies. IdGates provided installation of building automated systems such as automated turnstiles and side-gates. The plaintiffs’ case was that Centricore and IdGates were used as vehicles to facilitate competitive activity, including by “fronting” as an employer “on paper” while the defendants worked in concert to further Centricore’s business.
The background unfolded in stages. As early as March 2019, Mr Faruk and Mr Toh planned to leave ATT Infosoft. They discussed starting their own business and signed a tenancy agreement for office space on 3 May 2019, in premises where Centricore operated. Mr Toh gave Mr Faruk a sum for rental deposit and start-up costs. Mr Faruk also drafted detailed business cards for himself and the other key individuals. Mr Faruk resigned on 29 July 2019, followed by mass resignations: Mr Kyaw HW and Mr Danesh resigned on 16 August 2019. While serving notice, Centricore was incorporated on 19 August 2019, and the individuals became its directors and sole shareholders. Mr Faruk also drafted a letter of recommendation for Mr Kyaw HW’s work pass application using Centricore’s letterhead.
After these resignations, the plaintiffs alleged that competitive activity became apparent. On 28 September 2019, a client claimed that “Faruk new company” had sent client quotations for a gantry maintenance project. In the last of the mass resignations, Mr Aung resigned on 30 September 2019 after IdGates submitted a work pass application for him. Mr Faruk assisted with that work pass application. On 3 October 2019, Mr Kyaw HW sent documents in a WhatsApp group chat with the plaintiffs’ clients, which he deleted immediately; the documents indicated that he and Mr Danesh were appointed as Centricore directors and that Centricore expected its first service contract and pipeline of contracts. The plaintiffs then terminated the employment of the relevant individuals in October and November 2019.
Forensic analysis of the ex-employees’ devices formed a critical evidential component. The court heard that information belonging to the plaintiffs was stored in Mr Faruk’s personal Dropbox folder, and that external storage devices belonging to Mr Faruk, Mr Toh, and Mr Danesh were not returned to ATT Infosoft. There was also evidence of mass deletion activity on company-issued desktops and laptops in multiple months in 2019, including the use of data wiping tools by Mr Kyaw HW. The plaintiffs further found that, while employed by ATT Infosoft, Mr Faruk prepared maintenance proposals under IdGates’ name for maintenance of existing AVMS installed by ATT Infosoft for various hospitals and institutions. The plaintiffs also pointed to competitive tender activity, including a Health Promotion Board tender for EQMS maintenance where Centricore bid slightly less than ATT Infosoft.
What Were the Key Legal Issues?
The High Court had to determine whether the defendants breached obligations of confidence owed to the plaintiffs. This required the court to examine the scope of the plaintiffs’ claims: to whom the confidentiality obligations were owed, which materials were covered by those obligations, and whether the plaintiffs had consented to the defendants’ acquisition or possession of the relevant materials. The court also had to consider whether each file or document had to be shown to be confidential, or whether confidentiality could be established at a broader level for categories of information, and whether the plaintiffs treated the information as confidential in practice.
In addition, the court had to assess whether the defendants breached employment contract obligations. The plaintiffs relied on multiple contractual duties, including a loyalty obligation, an ISO obligation (reflecting compliance with internal standards and processes), a non-competition obligation, and a confidentiality obligation. These issues required the court to interpret the contractual terms and apply them to the defendants’ conduct, including their access to information, use of information, and any competitive activities undertaken during and after employment.
The court further addressed equitable and tortious claims. The plaintiffs alleged breach of fiduciary duties, which in employment and corporate contexts depends on whether the relationship and circumstances gave rise to fiduciary obligations. The plaintiffs also pleaded inducement of breach of contract and conspiracy by unlawful means, requiring the court to consider whether the defendants intentionally procured breaches and whether there was a combination or agreement to do unlawful acts, and whether those acts caused loss.
How Did the Court Analyse the Issues?
The court’s analysis of breach of confidence proceeded in a structured manner. First, it considered the scope of the plaintiffs’ claims and the confidentiality framework. The court examined whether the confidentiality obligations were owed to the plaintiffs by the relevant defendants, which typically turns on the employment relationship and the contractual or equitable duties arising from it. The judgment then addressed the more granular question of what information was covered. In technology solutions and systems-integration businesses, confidentiality often extends beyond source code to include business secrets such as maintenance proposals, tender strategies, contract pipelines, and technical know-how embedded in documents and operational processes.
Next, the court analysed whether each defendant had accessed or used the confidential materials. The evidence described in the judgment—Dropbox storage, non-returned external storage devices, mass deletion and data wiping, and the sending of documents in WhatsApp to clients—was treated as relevant to both access and use. The court also considered whether the plaintiffs had consented to the defendants’ acquisition or possession of the materials. Consent, where pleaded, would undermine a breach of confidence; accordingly, the court scrutinised the timing and circumstances of the defendants’ conduct, including whether the defendants’ possession was consistent with legitimate post-employment activities or with improper retention and exploitation.
The court also addressed whether the plaintiffs had treated the information as confidential. This is often established by evidence of marking, internal policies, restricted access, and the practical steps taken to prevent disclosure. In this case, the plaintiffs’ focus on business secrets and the defendants’ conduct—particularly deletion and wiping—supported an inference that the information was not intended for general circulation. The court’s approach indicates that confidentiality can be established by the totality of evidence, not merely by the existence of a label on a document, though the judgment also considered the question of whether each file needed to be shown to be confidential.
On breach of employment contracts, the court analysed the non-competition obligation, loyalty obligation, ISO obligation, and confidentiality obligation. The loyalty obligation typically restrains employees from acting against the employer’s interests during employment, while non-competition clauses restrict competitive activity for a defined period and within defined scope. The ISO obligation, as pleaded, reflected compliance with internal standards and processes, which may be relevant where employees use or divert systems, documentation, or operational methods in a manner that undermines the employer’s compliance regime. The confidentiality obligation was assessed in parallel with the breach of confidence analysis, but with contractual interpretation playing a more prominent role.
The court then considered breach of fiduciary duties. Fiduciary duties are not automatic in every employment relationship; they arise where the employee’s role and the circumstances create a duty to act in the employer’s interests and not to profit from position or misuse information. The judgment’s emphasis on senior roles—such as Mr Faruk’s leadership and statutory director position and Mr Toh’s sales leadership—suggests the court examined whether these defendants occupied positions of trust and influence that attracted fiduciary obligations. The court’s reasoning also connected fiduciary breach to the alleged concerted conduct and the use of information to compete.
Finally, the court addressed inducement of breach of contract and conspiracy by unlawful means. Inducement requires proof that a defendant intentionally procured or encouraged another to breach contractual duties. Conspiracy by unlawful means requires a combination or agreement to do unlawful acts, with the unlawful acts being the means of achieving the conspiratorial objective. The plaintiffs’ narrative—that Centricore and IdGates were used as vehicles and that the defendants acted in concert—was therefore central. The court’s findings on access, use, and the breach of confidentiality and employment obligations supported the inference that the defendants’ actions were not isolated, but coordinated in a manner consistent with inducement and conspiracy.
What Was the Outcome?
The High Court’s decision upheld the plaintiffs’ claims in substance, with liability established for breaches of confidence and related wrongs. The court’s detailed, defendant-specific analysis indicates that it did not treat the case as a blanket allegation against all defendants; rather, it assessed the evidence for each individual and for the corporate defendants, including whether each defendant accessed or used confidential materials and whether the relevant obligations were breached.
In practical terms, the outcome meant that the defendants faced adverse findings and exposure to remedies for misuse of confidential business information and breaches of contractual and equitable duties. The judgment also addressed counterclaims and losses claimed by the plaintiffs, reflecting the court’s engagement with causation and quantification issues, although the excerpt provided does not reproduce the final orders in full.
Why Does This Case Matter?
This case is significant for employers and practitioners dealing with employee departures in technology and systems-integration industries. It illustrates how confidentiality claims can succeed where the evidence shows not only that confidential information was accessed or retained, but also that the defendants engaged in conduct consistent with concealment—such as deletion, wiping, and use of information in competitive contexts. For lawyers, the judgment demonstrates the importance of forensic evidence and documentary trails in establishing breach of confidence and related causes of action.
From a doctrinal perspective, the decision reinforces that confidentiality obligations can be analysed through both contractual and equitable lenses, and that courts will scrutinise whether information was treated as confidential and whether consent existed. It also shows that courts may infer improper intent and misuse from circumstantial evidence, particularly where the timing of competitive activity aligns with the departure and where the defendants’ conduct suggests an effort to prevent detection.
For litigation strategy, the case also highlights the value of pleading multiple causes of action—breach of confidence, breach of employment contract, fiduciary breach, inducement, and conspiracy—because different causes of action may capture different aspects of the same factual matrix. Practitioners should note that the court’s structured approach to “scope,” “confidentiality,” “access/use,” and “consent” provides a useful template for both claimants and defendants when preparing submissions and evidence.
Legislation Referenced
- No specific statutory provisions were identified in the provided judgment extract.
Cases Cited
- No specific cases were identified in the provided judgment extract.
Source Documents
This article analyses [2025] SGHC 13 for legal research and educational purposes. It does not constitute legal advice. Readers should consult the full judgment for the Court's complete reasoning.