StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Breach of Confidentiality - Essay Example

Cite this document
Summary
"The Breach of Confidentiality" paper argues that the principal remedy for breach of confidence is an injunction restraining the confidant from using the confidential information. Damages, assessed on the basis of the equal market value of the information wrongly acquired, are also available. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
The Breach of Confidentiality
Read Text Preview

Extract of sample "The Breach of Confidentiality"

Running Head: BREACH OF CONFEDENTIALITY Breach of Confidentiality of the of the Breach of Confidentiality When information is categorised as confidential, its disclosure or use by a confidant is regulated by certain principles. The law of confidentiality provides a remedy for the unauthorised disclosure or use of information which is confidential in nature and which has been entrusted to a person in circumstances which either expressly or implicitly impose an obligation of confidence. Before an action can be commenced for breach of confidence three criteria must be satisfied: the information must be confidential the disclosure of the information must have been in circumstances which give rise to an obligation of confidence, and there must be an actual or anticipated unauthorised use or disclosure of the information (Megarry J in Coco v A N Clark [Engineers] Ltd [1969] RPC 41) An action for breach of confidence is based on the law of confidentiality. The purpose of such an action is to prevent the use of information which is confidential. It is intended to make sure that a person in possession of confidential information only uses it for purposes for which it was transmitted to him in the first place. The law of confidence can - as opposed to copyright, which is only concerned with the protection of the form in which information, idea or thought is expressed - protect the content of the information, idea or thought. However, there are practical limitations: can you afford to take necessary legal action your opponent may be a major corporation that could use its huge resources to fund lengthy, costly court battles The Function of Confidence The main function of the law of confidentiality, or an action for breach of confidence, is the prevention of the illegitimate use of confidential information by a recipient of information. A good conceptual springboard to the understanding of the justification for the protection extended to those items which fall within the ambit of confidence, is the notion that something which people are prepared to pay for must be worth protecting and therefore ought to be protected. However, the courts will only enforce properly identified rights that fall within recognised categories known to law. Some of the items that are protected under the law of confidence are those which do not consist of any specific intellectual property rights under patent, design and copyright or even trade marks law. Traditionally, this has been classified into personal information, governmental secrets and trade secrets. (Catherine Colston and Kirsty Middleton Modern Intellectual Proprty Law 2nd Edition) Obviously, the information, in order to receive the protection of the law, must be confidential. To be such, it must not be something which is public property or knowledge. Therefore, information which is in the public domain cannot be confidential. However confidential the circumstances of communication, there can be no breach of confidence in revealing to others something which is already common knowledge. For example, an employer cannot restrain his ex-employee from revealing a secret process to his new employer if that secret process has already been patented by the employer prior to the revelation by the ex-employee, for it is by then already in the public domain (Mustad v Dosen [1963] RPC 41). All that is required, however, is relative, and not absolute (as in the case of a patent specification, where novelty is required) secrecy. The information must be information the release of which the owner believes would be injurious to him or of advantage to his rivals and others. The owner must believe the information is confidential or secret, i.e. not already in the public domain. The owner's believe must be reasonable. The information must be judged in the light of the usage and practices of the particular industry concerned. On the other hand, it is equally clear that the mere fact of the publication of information does not detract from its confidential, if it is only circulated among a limited number of persons. As to what quantum of disclosure would render the information no longer confidential, it must be a question of degree depending on the particular case, but if relative secrecy remains, it could still be confidential information. Coco V Clarke {1969] RPC 41. Simplicity of an idea does not disqualify it from being confidential information. However, it must transcend what can legitimately be classified as 'trivial tittle tattle". Confidential information is sometimes referred to as know how or trade secrets, although confidentiality is a broader concept. The Obligation of Confidentiality In order to be actionable, it is necessary that the information be communicated to a confidant in circumstances which impose an obligation of confidence. Such circumstances arise, for example, when information is divulged for limited purposes like employment. Further, where discussions expressly require one or both parties to treat information as confidential, the obligation of confidentiality is clearly imposed. However, such an obligation can arise by implication alone. That would be the case if an appropriate business character can be establish in circumstances of the disclosure. However, it would be wise to establish this expressly in writing by way of a confidentiality agreement and the limited purpose for which the confidential information was disclosed. Furthermore, any written, electronic or other physical form of confidential information or verbal statement should be preceded by an appropriate confidentiality warning where possible. The obligation of confidentiality will arise whenever confidential information is imparted by a confider to a confidant for a limited purpose. Often in these situations it becomes abundantly clear that the information is expected to be treated as confidential. It arises whenever the confidant either knew or ought to have known that confidential information was disclosed to him for a limited purpose. The duty not to disclose confidential information may be imposed by "equity" (i.e. by the courts in the interest of fairness) or under the terms of an express contractual relationship or by law as a result of the parties being in fiduciary relationship (e.g. employer-employee or consultant-client). Employer & Employee Farwell J put it well in Triplex Safety Glass Co v Scorah (1938) 55 RPC 21 when he observed: 'Whether bound by express contract or not, no employee is entitled to filch his employer's property, in whatever form that property may be, whether it is in the form of a secret process or goodwill or in some other form. Whatever is the property of the employer must not be wrongfully used by the employee in any way, but remains the property of the employer.' (Campbell V Mirror Group 2004 2 AC 457 av B& C.) This is because an employee's obligation in relation to information which he receives in the course of his employment arises from the indisputable proposition that an employee owes a duty of confidentiality to his employer. However, this does not mean that an employer can prevent his employee from using the skill or knowledge in his trade or profession which he has learnt in the course of his employment by means of direction or instruction from the employer. He is entitled to use that skill and knowledge which he acquired as a result of having such admirable instruction for his benefit and the benefit of others. In other words, an employee is entitled to use his normal skills and knowledge in any future employment and can only be restrained from using special knowledge and secrets of his former employer. The duty of an employee comes to an end when the contract of employment ends unless the terms of employment expressly provide otherwise. Illegitimate Disclosure Confidence is breached by the unauthorised use or disclosure of confidential information. The anticipation of such breach is itself sufficient to found an action in breach of confidence. Once a confidant has obtained confidential information which was communicated to him in circumstances that import a duty of confidentiality, he is under an obligation not to disclose it or use it without the consent of the person who provided that information. It involves proof that the confidant of the information has disclosed (or is about to disclose) it illegitimately. Once there has been such disclosure, it is immaterial that it was done unconsciously, foolishly, inadvertently, without malice or without a view of financial gain. If information is used without further disclosure it can, under certain circumstances, nevertheless be restrained. Thus, if, for example, an employee gathers certain trade secrets from his employer and uses it for his own unauthorised purposes, the employer may - not only prevent the employee from using it in such a manner whilst that information remains a secret - also prevent the employee from using his information as a "springboard" for obtaining an otherwise early benefit once that information goes into the public domain and ceases to be a secret. In one case an employee was an inventor for his employers in respect of their business of manufacturing above-ground swimming pools. Prior to ending his employment, he was informed, in the course of his employment, of a newly patented design of a swimming pool. He did not inform his employers. He left and set up a business in competition and bought the patent. He used the patent together with the features of his ex-employers' pools. The ex-employers sought an injunction to prevent him from doing so. It was held by the court that an injunction would be granted on the basis that, although the patent was already in the public domain, his position had placed him at an unfair advantage. The information acquired as an employee meant that he could "springboard" when setting up his own business. Accordingly, a 'person who has obtained information in confidence is not allowed to use it as a springboard for activities detrimental to the person who made the confidential communication, and springboard it remains even when all the features have been published or can be ascertained by actual inspection by any member of the public'. This is a type of common law "insider dealing" law. Actions against Third Parties Because confidence is an equitable doctrine, it can only provide limited protection against third parties who deal with confidential information, without notice of it. Where the third party who deals with confidential information is wholly innocent and is a purchaser for value (paid money for it), nothing can be done. However, even if the third party comes by the confidential information innocently, nevertheless once he gets to know that it was originally given in confidence, he can be restrained from breaching that confidence. Defences Available to Third Parties There are at least two defences available to third party defendants to breach of confidence actions. First, there is the rule of disclosures in the public interest. Second, there is the de mininis rule (i.e. de minimis non curat lex : the law is not concerned with trivialities) which, as mentioned before, excludes "trivial tittle tattle". In other words, if the disclosure is not substantial it will not be actionable and restrained. Conclusion The principle remedy for breach of confidence is an injunction restraining the confidant from disclosing or using the confidential information. Damages, assessed on the basis of the equal market value of the confidential information wrongly acquired or disclosed, are also available. In appropriate circumstances, orders to account of profits and delivery up may also be granted. Usually such an order would also provide for reimbursement of the claimant's legal costs. Bibliography Campbell V Mirror Group 2004 2 AC 457 av B& C. Catherine Colston and Kirsty Middleton Modern Intellectual Proprty Law 2nd Edition. Coco V Clark (1969) Rpc 41 Coco V Clarke {1969] RPC 41. Cole, G. G. (1991). Counselors and administrators: A comparison of roles. NASSP Bulletin, 75, 5-13. Mustad v Dosen [1963] RPC 41). Douglous V. Hello Ltd. No.6 2003. 03 Douglous V. Hello! Ltd No.8 2004 . [ EMLR 2] Megarry J in Coco v A N Clark [Engineers] Ltd [1969] RPC 41 Farwell J put it well in Triplex Safety Glass Co v Scorah (1938) 55 RPC 21 Gross, D. R., & Capuzzi, D. (1992). Group counseling: Stages and Issues. In D. Capuzzi & D. R. Gross (Eds.), Introduction to group counseling (pp. 25-38). Denver, CO: Love. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Breach of Confidentiality Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.org/law/1532026-breach-of-confidentiality
(Breach of Confidentiality Essay Example | Topics and Well Written Essays - 2000 Words)
https://studentshare.org/law/1532026-breach-of-confidentiality.
“Breach of Confidentiality Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/law/1532026-breach-of-confidentiality.
  • Cited: 1 times

CHECK THESE SAMPLES OF The Breach of Confidentiality

Confidentiality as a Nurse

breach of confidentiality in the nursing practice leads to an encounter with ethical dilemmas, however, different circumstances call for unique decisions.... The case represents a complicated situation faced by the nurse where ethics of confidentiality have to be questioned or compromised for a better good.... confidentiality as a Nurse Name University confidentiality as a Nurse Nursing ethics is considered as a domain of bioethics and there are several controversies about whether nursing owns its separate and unique professional practice-based problems or not....
3 Pages (750 words) Essay

The concept of a contract

However, the company can ask the legal body to charge monetary fines pertaining to The Breach of Confidentiality as a legal implication.... In a contractual agreement, ‘breach of Confidence' plays a vital role in assuring both the parties to undertake ethical measures within this particular contractual relationship.... Critically, observing, it can be ascertained from the case study that two of the contractors of DB have violated the legal implications of ‘breach of Confidence'....
4 Pages (1000 words) Case Study

Provider-Patient Relationship: Privacy and Confidentiality

The trust and the confidentiality between the patient and the nurse not only help in proper diagnosis but also enhances the.... However, in cases where the patient is involved in the criminal activity, keeping the information of the patient confidential proves dangerous to the lives of other people and in these cases, the nurses have to face Patient confidentiality: A Matter Of Judgment Introduction In the world of health care, a relationship between a patient and a heath care provider is considered very important....
2 Pages (500 words) Essay

Breach of Confidentiality

The Breach of Confidentiality occurred in the sense that the hospital was supposed to safeguard the chart containing the surgeon's diagnosis information.... o prevent The Breach of Confidentiality, the hospital could have stored the chart containing the diagnosis information in a well secured place where no one could access it, rather than placing it on the floor of the nurses' post where most people could access it (McHale, 1993).... This paper will examine a real case of breach of confidentiality, focusing on the facts involved, and how it could have been prevented. ...
2 Pages (500 words) Essay

Medical Imaging and Liability and Litigation

The Breach of Confidentiality insinuates to a situation whereby a person violates the laws that have been set to govern the privacy of another person's information.... One of the measures that can be undertaken to protect a patient's computerized record of information is through formulation and proper implementation of confidentiality rules in a manner that they protect the privacy of this information....
1 Pages (250 words) Essay

Employment Law: Employment Relations Act

"Employment Law: Employment Relations Act" paper examines trade union acts that are carried out at appropriate times.... Employers who prohibit their workers from joining legal actions and activities conducted by the trade union shall be considered to be violating the rights of the workers.... .... ...
12 Pages (3000 words) Assignment

Managing Information System in Healthcare Institutions

The advents of new information technologies have compounded the problem and expose the healthcare givers to a breach of privacy rules as dictated by HIPAA.... This case study "Managing Information System in Healthcare Institutions" focuses on some recommendations of the problems facing the health service organization management information systems that have resulted in the severe information security breach.... Confidential information can, therefore, leak through hacking, breach, security breaches, malware, human error, or natural accidents....
10 Pages (2500 words) Case Study

Personally Identifiable Information

Moderate impact level is experienced when The Breach of Confidentiality results in serious adverse effects.... Individuals need to be protected against breach of confidentiality leading to negative effects.... Also, organizations face similar threats resulting from a breach of confidentiality.... There are three impact levels associated with the loss of confidentiality with respect to the use of personally identifiable information by agencies....
3 Pages (750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us