Case Details
- Citation: [2025] SGHC 41
- Title: Hayate Partners Pte Ltd v Rajan Sunil Kumar
- Court: High Court (General Division)
- Originating Claim No: 78 of 2022
- Judgment date: 14 March 2025 (judgment reserved; dates of hearing: 3, 4, 9, 10 July and 16 October 2024)
- Judge: Dedar Singh Gill J
- Plaintiff/Applicant: Hayate Partners Pte Ltd
- Defendant/Respondent: Rajan Sunil Kumar
- Legal areas: Contract (breach); Intellectual property (law of confidence; breach of confidence); Remedies
- Statutes referenced: Security and Futures Act 2001 (context: licensing status of claimant)
- Judgment length: 71 pages; 19,748 words
Summary
In Hayate Partners Pte Ltd v Rajan Sunil Kumar ([2025] SGHC 41), the High Court considered whether an employee breached contractual confidentiality obligations and equitable obligations of confidence by accessing, downloading, and retaining large quantities of documents from his employer’s cloud storage shortly before tendering his resignation. The dispute arose in the context of a fund management business that stored confidential information on Google Drive and imposed IT security restrictions on the use of personal devices.
The court allowed the claim in part. While the judgment recognises that employment relationships typically involve the disclosure of confidential information to employees for work purposes, it also emphasises that contractual and equitable duties of confidence operate to prevent employees from using or retaining such information beyond the scope of their employment. The court’s analysis focused on (i) the proper construction of the relevant contractual clauses, (ii) whether the information possessed the necessary quality of confidence, (iii) whether the defendant’s conscience was affected when he accessed, downloaded, and retained the information, and (iv) the adequacy of pleadings and the appropriate remedies.
What Were the Facts of This Case?
The claimant, Hayate Partners Pte Ltd (“Hayate”), is a Singapore-incorporated company registered with the Monetary Authority of Singapore as a financial institution. It held a Capital Markets Services Licence under the Security and Futures Act 2001 and managed the Hayate Japan Equity Long-Short Fund. Hayate’s Chief Executive Officer and a director was Mr Yukihiro Sugihara. The defendant, Mr Rajan Sunil Kumar, was employed as the “Head of Investor Relations” from 9 December 2019 to 22 December 2021. His primary role was to engage prospective investors and raise funds for the Fund.
During his employment, the defendant used both personal devices (a MacBook and an iPhone 12 Pro Max) and a laptop issued by Hayate to perform his work. Hayate used Google Workspace, with confidential information stored in Google Drive. The claimant’s case was that the confidential information at issue was accessed and downloaded by the defendant in circumstances that went beyond work-related use, and that the defendant retained copies after his employment ended.
The contractual framework included a Letter of Appointment dated 7 November 2019. The court highlighted clause 6, which required delivery up of books, documents, papers, materials, and “other computer material” and “information relating to the business” of Hayate or related companies upon termination. Clause 6 also required the employee to keep secret and not, during or after termination, use for personal advantage or reveal to others any trade secrets, business methods, or confidential information known or reasonably to be known to be confidential concerning the business or affairs of Hayate or related companies.
In addition, Hayate implemented IT security guidelines after the defendant commenced employment. These guidelines prohibited employees from forwarding and downloading Hayate’s information to personal accounts and devices, and limited access to Hayate’s information to personal computers provided by Hayate and pre-registered and approved personal mobile devices. The defendant, however, used his personal devices to access and download documents from Hayate’s Google Drive. He denied that he had been made aware of the IT Security Guidelines, and he asserted that Hayate knew of and did not object to his use of personal devices for accessing and/or downloading work-related documents.
What Were the Key Legal Issues?
The first key issue was whether the defendant breached his contractual obligations of confidentiality. This required the court to interpret the relevant clauses in the Letter of Appointment and determine what obligations they actually imposed. In particular, the court examined the interplay between clause 6 (including delivery up and secrecy obligations) and clause 3 of Appendix 2 (which, on the claimant’s case, was said to restrict access and downloading for non-work-related purposes).
The second key issue was whether the defendant breached equitable obligations of confidence. This required the court to apply the established elements of breach of confidence: whether the information had the necessary quality of confidence, whether the defendant obtained or used it in circumstances importing an obligation of confidence (often expressed as whether his conscience was affected), and whether there was unauthorised use or retention.
Finally, the court had to consider remedies and pleading deficiencies. The judgment indicates that the court scrutinised the sequence of claims pleaded, the specificity of pleadings, and the extent to which the claimant’s pleaded case supported the relief sought.
How Did the Court Analyse the Issues?
The court began by clarifying the contractual architecture. Although the claimant relied on both clause 6(a) and clause 3 of Appendix 2, the judge concluded that only clause 6 was relevant to the contractual claim. The court reasoned that clause 3 of Appendix 2, on its face, restricted misuse and disclosure of confidential information rather than access and downloading per se. In other words, the court did not accept that clause 3 could be read as imposing an express contractual prohibition on accessing or downloading confidential information for non-work-related purposes. This interpretive approach is significant: it reflects a reluctance to expand contractual obligations beyond their text, even where equitable duties of confidence might be broader.
On the claimant’s attempt to rely on the implied duty of good faith, loyalty and fidelity in employment to support a contractual confidentiality obligation, the court rejected that approach as misconceived. The judge explained that the duty of confidentiality in equity is a distinct cause of action and that equity’s willingness to impose additional or more extensive obligations does not automatically enlarge the scope of contractual obligations beyond what is expressly stated. The court therefore treated the contractual claim as bounded by the express terms of the Letter of Appointment, rather than by general employment-law duties.
Turning to the equitable claim, the court addressed the “interplay between contractual and equitable duties of confidence”. While the court used the term “confidential information” for ease of reference, it acknowledged that clause 6 did not expressly use the phrase “confidential information” in clause 6(a). Nonetheless, the judge accepted that parties can agree on what information is to be treated as confidential and protected as such, citing the principle that contractual agreement can define the scope of protected information. The practical effect was that the same information could be analysed under both contractual and equitable frameworks, even if the contractual clause did not mirror the equitable terminology exactly.
A central part of the reasoning concerned the specific downloads. The judgment, as reflected in the extract, analysed three sets of downloads: those on 8 December 2021, those on 20 December 2021, and those on 21 December 2021. The court examined the evidence and the parties’ arguments for each set, including whether the information possessed the necessary quality of confidence and whether the defendant’s conscience was affected when he accessed, downloaded and retained the documents. Although the extract provided is truncated, the structure of the judgment indicates that the court treated each download event as a separate factual inquiry, rather than assuming that all downloads were equally wrongful.
In assessing “quality of confidence”, the court would have considered whether the information was not public, whether it was confidential in nature, and whether it was imparted in circumstances that would reasonably lead to an obligation of confidence. In assessing “conscience”, the court would have considered what the defendant knew or ought to have known about the confidential character of the information and the limits on its use and retention. The defendant’s position—that he was not aware of the IT Security Guidelines and that Hayate did not object to his use of personal devices for work-related downloading—would have been relevant to whether his conscience was affected. The court’s approach suggests that it did not treat awareness of the IT Security Guidelines as the only determinant; rather, it likely considered the broader context of employment, the nature of the information, and the contractual delivery up and secrecy obligations.
The court also addressed “deficiencies in pleadings”. This is important for practitioners: even where a claimant may have evidence of wrongdoing, the court may limit relief if the pleaded case does not properly identify the information, the relevant breaches, and the causal link to the relief sought. The judgment’s emphasis on “specificity of pleadings” and the “sequence of claims pleaded” indicates that the court was attentive to procedural fairness and the need for the defendant to know the case he had to meet.
What Was the Outcome?
The court allowed the claim in part. The practical effect is that the defendant was found liable for some, but not all, of the alleged breaches of contractual confidentiality and equitable obligations of confidence. The judgment’s partial allowance reflects the court’s event-by-event analysis of the downloads and its careful construction of the contractual clauses, as well as its assessment of whether the equitable elements were made out for the relevant information and conduct.
In addition, the court proceeded to address remedies, implying that the relief granted would have been tailored to the breaches that were established. The judgment’s discussion of pleading deficiencies suggests that certain categories of relief or certain alleged breaches may have been rejected or limited because the claimant’s pleadings did not sufficiently support them.
Why Does This Case Matter?
This decision is a useful authority for lawyers dealing with confidentiality disputes in employment contexts, particularly where the employee used personal devices and accessed cloud-stored information shortly before resignation. The judgment reinforces two recurring themes in Singapore law of confidence: first, contractual confidentiality obligations will be interpreted according to their text and cannot be expanded by implication from general employment duties; second, equitable duties of confidence require a structured inquiry into the quality of confidence and whether the defendant’s conscience was affected.
From a pleading and remedies perspective, the case also highlights that courts may scrutinise the specificity and sequencing of claims. Practitioners should ensure that the pleaded case clearly identifies the confidential information, the relevant acts (access, download, retention), the timeframes, and how each act satisfies the elements of the contractual and equitable causes of action. Where the claimant seeks remedies, it should align the relief sought with the pleaded breaches and the evidence for each category of information.
Finally, the case illustrates the practical importance of IT security guidelines and device-access policies, but also suggests that the absence of proof of awareness may not be determinative if the circumstances otherwise show that the defendant knew or ought to have known that the information was confidential and subject to restrictions. Employers seeking enforcement should therefore consider both contractual drafting (including delivery up and secrecy provisions) and evidence of communication and enforcement of security policies.
Legislation Referenced
- Security and Futures Act 2001
Cases Cited
- Adinop Co Ltd v Rovithai Ltd and another [2019] 2 SLR 808
- Asia Petworld Pte Ltd v Sivabalan s/o Ramasami and another [2022] 5 SLR 805
Source Documents
This article analyses [2025] SGHC 41 for legal research and educational purposes. It does not constitute legal advice. Readers should consult the full judgment for the Court's complete reasoning.