Submit Article
Legal Analysis. Regulatory Intelligence. Jurisprudence.
Singapore

Jethanand Harkishindas Bhojwani v Lakshmi Prataprai Bhojwani (alias Mrs Lakshmi Jethanand Bhojwani) and others [2021] SGHC 256

In Jethanand Harkishindas Bhojwani v Lakshmi Prataprai Bhojwani (alias Mrs Lakshmi Jethanand Bhojwani) and others, the High Court of the Republic of Singapore addressed issues of Intellectual Property — Law of confidence.

Case Details

  • Citation: [2021] SGHC 256
  • Title: Jethanand Harkishindas Bhojwani v Lakshmi Prataprai Bhojwani (alias Mrs Lakshmi Jethanand Bhojwani) and others
  • Court: High Court of the Republic of Singapore (General Division)
  • Case Number: Suit No 1242 of 2019
  • Decision Date: 16 November 2021
  • Judgment Reserved: Yes
  • Coram: Kwek Mean Luck JC
  • Plaintiff/Applicant: Jethanand Harkishindas Bhojwani
  • Defendants/Respondents: Lakshmi Prataprai Bhojwani (alias Mrs Lakshmi Jethanand Bhojwani) and others
  • Parties (as reflected in metadata): Jethanand Harkishindas Bhojwani; Lakshmi Prataprai Bhojwani (alias Mrs Lakshmi Jethanand Bhojwani); Devin Jethanand Bhojwani; Sandeep Jethanand Bhojwani; WongPartnership LLP (4th defendant law firm)
  • Legal Areas: Intellectual Property — Law of confidence
  • Key Causes of Action: Breach of confidence; Duty of confidence; Remedies — damages and injunctions
  • Judicial Officer: Kwek Mean Luck JC
  • Counsel for Plaintiff: Kanapathi Pillai Nirumalan, Liew Teck Huat, Ow Jiang Meng Benjamin, Bryan Looy Chye Shen and Phang Cunkuang (Niru & Co LLC)
  • Counsel for 1st and 4th Defendants: Alvin Yeo SC, Chang Man Phing, Gavin Neo Jia Cheng and Khoo Kiah Min Jolyn (WongPartnership LLP)
  • Counsel for 2nd and 3rd Defendants: Derek Kang Yu Hsien and Lim Shi Zheng Lucas (Cairnhill Law LLC)
  • Statutes Referenced: Evidence Act
  • Cases Cited: [2014] SGHC 22; [2015] SGHC 108; [2021] SGHC 256
  • Judgment Length: 32 pages, 16,476 words

Summary

In Jethanand Harkishindas Bhojwani v Lakshmi Prataprai Bhojwani and others, the High Court (Kwek Mean Luck JC) addressed whether a father’s surreptitious extraction of a large volume of his personal emails—copied onto a USB stick by his son and then reviewed and used by the mother and her representatives—constituted a breach of confidence. The dispute arose in the context of ongoing matrimonial and trust-related proceedings between the spouses, but the court’s focus was on the law of confidence: whether the information had the necessary quality of confidence, whether it was accessed or acquired in circumstances importing an obligation of confidence, and what remedies were appropriate.

The court held that the defendants (particularly the sons who copied the emails and the mother’s authorised representatives who used documents from the copied material) were liable for breach of confidence. The judgment clarifies how the modified framework from the Court of Appeal decision in I-Admin (Singapore) Pte Ltd v Hong Ying Ting operates in cases of unauthorised access to private digital information. It also confirms that the burden and presumptions in confidence claims can shift once the plaintiff establishes the relevant prerequisites, and that surreptitious acquisition undermines any attempt to characterise the conduct as merely incidental or justified by future litigation obligations.

What Were the Facts of This Case?

The plaintiff, Jethanand Harkishindas Bhojwani, and the first defendant, Lakshmi Prataprai Bhojwani (alias Mrs Lakshmi Jethanand Bhojwani), were formerly husband and wife. The second and third defendants were their children. The fourth defendant was a law firm that represented the first defendant in two sets of proceedings: the matrimonial proceedings (FC/D 4639/2017) and a separate trust-related action (HC/OS 1407/2017). The trust proceedings concerned an accounting claim by the first defendant against the plaintiff as trustee for a trust set up by the plaintiff’s father for the benefit of the first defendant and the three children.

After the marriage deteriorated irretrievably around 2016, the first defendant commenced the matrimonial proceedings on 5 October 2017. An interim judgment dissolving the marriage was obtained on 29 October 2018. Ancillary matters in the matrimonial proceedings remained pending. Around June 2019, the plaintiff moved out of the matrimonial home. These background facts mattered because the defendants attempted to justify their conduct by reference to their roles in the ongoing litigation and their alleged entitlement to certain information as beneficiaries or representatives.

Central to the case was the plaintiff’s personal laptop (“Personal Laptop”), which contained his own work email account from Shankar’s Emporium, where he was a director. The laptop stored a mixture of personal and business materials, including private emails, correspondence, bank statements, personal affairs, business financial records, and other documents. The plaintiff’s case was that this laptop and its contents were private and confidential to him, and that any access to his emails required his knowledge and consent.

Sometime in or around October 2016, the third defendant asked to use the Personal Laptop to watch a movie. The plaintiff agreed. While using the laptop, the third defendant saw the plaintiff’s emails and folders, and then downloaded documents from the email folders onto a USB stick without the plaintiff’s awareness or consent. Forensic evidence (from the plaintiff’s expert, Mr Darren Cerasi) indicated that there were over 50,000 unique files in the “Copied Data”. Each unique file could include an email and its attachments, meaning the volume of extracted material was substantial and not limited to a small number of items.

The third defendant later pleaded that he had told the first defendant and the second defendant about the Copied Data in or around October 2017. The second defendant was said to be authorised to act on behalf of the first defendant in both the matrimonial and trust proceedings. The second defendant reviewed some of the Copied Data and forwarded certain documents to the fourth defendant (the law firm) on behalf of the first defendant. The first defendant then used some of those documents in the matrimonial proceedings. It was undisputed that these uses occurred without the plaintiff’s awareness or consent. The plaintiff also asserted that the first defendant used the Copied Data in the trust proceedings.

The High Court identified three main issues. First, whether there was a breach of confidence (at least as against the second and third defendants, who resisted the action in entirety). Second, what the appropriate terms of a permanent injunction should be. Third, whether the plaintiff was entitled to damages, and if so, against which defendants and on what basis.

Within the first issue, the court had to apply the modern Singapore approach to breach of confidence. The plaintiff relied on the Court of Appeal’s guidance in I-Admin (Singapore) Pte Ltd v Hong Ying Ting, which adopted and modified the classic test in Coco v AN Clark (Engineers) Ltd. The question was whether the Copied Data had the necessary quality of confidence and whether it was imparted in circumstances importing an obligation of confidence—particularly where the information was accessed without the plaintiff’s knowledge or consent.

A further sub-issue concerned the allocation of burdens and the role of presumptions. The plaintiff argued that once unauthorised access was shown, the court should presume an obligation of confidence and shift the burden to the defendants to show that their conscience was unaffected. The defendants argued that the plaintiff still bore the burden of proving that the information was confidential in the first place, and that the plaintiff’s reliance on unauthorised access did not remove the need to establish confidentiality.

How Did the Court Analyse the Issues?

The court began by situating the dispute within the established framework for breach of confidence. It referred to I-Admin, where the Court of Appeal preserved the first two “Coco requirements” and modified the third. Under this approach, the court considers (i) whether the information has the necessary quality of confidence, and (ii) whether it was imparted in circumstances importing an obligation of confidence. The court also recognised that an obligation of confidence may arise where confidential information is accessed or acquired without the plaintiff’s knowledge or consent. Once these prerequisites are satisfied, an action for breach of confidence is presumed, subject to possible displacement where the defendant can show, for example, that the defendant came across the information by accident, was unaware of its confidential nature, or believed there was a strong public interest in disclosure.

On the plaintiff’s argument, the court rejected the proposition that I-Admin eliminated the need to prove the first requirement (quality of confidence) whenever there was unauthorised access. The court emphasised that I-Admin referred to “confidential information” in the relevant passage. In other words, the court was not saying that confidentiality is automatically established merely because the defendant accessed information without consent. Rather, the first requirement still had to be satisfied as a matter of law, and the second requirement could be fulfilled by showing unauthorised access in circumstances importing an obligation of confidence.

The court then clarified the relationship between the first and second requirements. It explained that the second requirement—imparted in circumstances importing an obligation of confidence—was the part that could be satisfied by unauthorised access. Thus, where confidential information is accessed without the plaintiff’s knowledge or consent, this fact can fulfil the second requirement. That is because the circumstances of access themselves import an obligation of confidence. However, the court maintained that the plaintiff must still show that the information possesses the necessary quality of confidence, consistent with the preserved first Coco requirement.

The court also addressed the plaintiff’s reliance on English and Commonwealth authorities, including Imerman v Tchenguiz and Australian decisions such as Ashcoast Pty Ltd v Whillans and Ithaca Ice Work Pty Ltd v Queensland Ice Supplies Pty Ltd. The plaintiff’s submission was that surreptitious acquisition should give rise to a prima facie case that the information is confidential. The court accepted that surreptitious acquisition is a strong indicator of confidentiality, but it did not accept that this automatically dispenses with the need for the plaintiff to establish confidentiality. In Imerman, the court had stressed that breach of confidence involves a defendant who appreciated or ought to have appreciated that the claimant had an expectation of privacy. The High Court therefore treated these authorities as supportive of the inference of confidentiality and the defendant’s state of mind, rather than as authority for an irrebuttable presumption that confidentiality exists regardless of context.

Applying these principles to the facts, the court found that the Copied Data comprised private emails and documents stored on the plaintiff’s personal laptop. The manner of acquisition—downloading a large quantity of files onto a USB stick without consent—was inherently inconsistent with any notion that the defendants could treat the information as freely usable. The court also considered the defendants’ conduct in the litigation context. The defence suggested that the defendants had a right to access the emails because the third defendant was a beneficiary of the trust or because the plaintiff might not comply with future disclosure obligations in court proceedings. The court’s reasoning, as reflected in the introduction, treated this as an attempt to justify unauthorised extraction by reference to speculative future obligations and asserted entitlements.

While the excerpt provided does not reproduce the court’s later detailed discussion of remedies and damages, the structure of the judgment indicates that once breach of confidence was established, the court proceeded to determine the appropriate injunctive relief and the extent of damages. The court also noted that the first and fourth defendants had indicated they were prepared to consent to a permanent injunction on terms similar to an interim injunction order, but they contested liability for damages. This procedural posture suggests that the court’s analysis separated the question of injunctive restraint (which was largely accepted) from the question of monetary compensation (which required a more careful assessment of causation, loss, and the defendants’ culpability).

What Was the Outcome?

The court granted relief to restrain further use, disclosure, or destruction of the Copied Data and ordered delivery up of the copied material and any copies. The practical effect was to prevent the defendants from continuing to exploit the extracted emails and documents, and to require the return of the misappropriated data to the plaintiff.

On damages, the court’s ultimate orders would have turned on whether the plaintiff proved the relevant heads of loss and whether equitable or special damages were warranted against each defendant. The judgment indicates that liability for breach of confidence was established, but the defendants’ contest on damages meant the court would have assessed the evidential basis for quantification and the appropriate measure of compensation.

Why Does This Case Matter?

This decision is significant for practitioners because it applies the I-Admin modification of the Coco test to a modern digital context: unauthorised extraction of emails from a personal laptop. It demonstrates that courts will treat private email data as capable of having the necessary quality of confidence, especially where the defendant’s conduct is surreptitious and involves mass copying. For lawyers, the case underscores that the “quality of confidence” requirement remains alive even where access is unauthorised; however, unauthorised access will often satisfy the second requirement by importing an obligation of confidence.

The judgment also clarifies how presumptions and burdens operate. Once the plaintiff establishes the relevant prerequisites, an action for breach of confidence is presumed, and the defendant bears the burden of showing that their conscience was unaffected. This is particularly relevant in disputes arising from family litigation, where parties may attempt to justify access to private information by reference to alleged entitlements, beneficiary status, or anticipated disclosure obligations. The court’s approach suggests that such justifications will not automatically excuse unauthorised extraction.

Finally, the case is useful for understanding remedies in confidence claims involving digital material. Injunctions and delivery up are central tools to stop ongoing misuse and to secure the return of misappropriated data. The decision also signals that damages may be contested and require careful evidential support, even where liability for breach of confidence is established.

Legislation Referenced

  • Evidence Act

Cases Cited

  • I-Admin (Singapore) Pte Ltd v Hong Ying Ting and others [2020] 1 SLR 1130
  • Coco v AN Clark (Engineers) Ltd [1969] RPC 41
  • Imerman v Tchenguiz [2011] 2 WLR 592
  • Ashcoast Pty Ltd v Whillans [1998] QCA 034
  • Ithaca Ice Work Pty Ltd v Queensland Ice Supplies Pty Ltd & Anor [2002] QSC 222
  • [2014] SGHC 22
  • [2015] SGHC 108
  • [2021] SGHC 256

Source Documents

This article analyses [2021] SGHC 256 for legal research and educational purposes. It does not constitute legal advice. Readers should consult the full judgment for the Court's complete reasoning.

Written by Sushant Shukla

More in

Legal Wires

Legal Wires

Stay ahead of the legal curve. Get expert analysis and regulatory updates natively delivered to your inbox.

Success! Please check your inbox and click the link to confirm your subscription.