BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?

No donation is too small. If every visitor before 31 December gives just £5, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!



BAILII [Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback]

England and Wales High Court (Queen's Bench Division) Decisions


You are here: BAILII >> Databases >> England and Wales High Court (Queen's Bench Division) Decisions >> Imerman v Tchenguiz & Ors [2009] EWHC 2024 (QB) (27 July 2009)
URL: http://www.bailii.org/ew/cases/EWHC/QB/2009/2024.html
Cite as: [2009] EWHC 2024 (QB), [2010] 1 FCR 14, [2009] Fam Law 1135

[New search] [Printable RTF version] [Help]


Neutral Citation Number: [2009] EWHC 2024 (QB)
Case No: HQ09X00805

IN THE HIGH COURT OF JUSTICE
QUEEN'S BENCH DIVISION

Royal Courts of Justice
Strand, London, WC2A 2LL
27 July 2009

B e f o r e :

THE HONOURABLE MR JUSTICE EADY
____________________

Between:
VIVIAN IMERMAN

Claimant
- and -


(1) ROBERT TCHENGUIZ
(2) VINCENT TCHENGUIZ
(3) TIM McCLEAN
(4) NOURI OBAYDA
(5) SAROSH ZAIWALLA




Defendants

____________________

Antony White QC and Lorna Skinner (instructed by Berwin Leighton Paisner LLP) for the Claimant
Stephen Nathan QC, Richard Christie QC and Godwin Busuttil (instructed by Zaiwalla
& Co) for the Defendants
Hearing dates: 8–10 June 2009

____________________

HTML VERSION OF JUDGMENT
____________________

Crown Copyright ©

    Mr Justice Eady :

    The nature of the summary relief now sought

  1. These proceedings were commenced on 26 February 2009 and relate to the taking of what is said to be confidential information from a shared computer system without authorisation and its subsequent misuse. Interim relief was granted by orders of Cox J on 2 March and myself on 20 March.
  2. The Claimant now seeks summary judgment on the basis that " … the First Defendant's taking of the Claimant's private and confidential information was clearly unlawful and none of the Defendants has any lawful right to retain or use the same". The attached draft order makes clear the limited nature of the relief he now seeks. It is not always necessary for a litigant seeking summary judgment to show incontrovertibly that he can succeed on every pleaded issue. It may suffice to establish only those propositions which are essential to justifying the particular relief claimed.
  3. Prohibitory injunctions are claimed against all five Defendants preventing communication or disclosure to any third party (including the Claimant's wife and her solicitors) and copying or in any other way using three categories of documents or information. The first consists of those documents copied to the Claimant's solicitors by his wife's solicitors under cover of a letter dated 18 February 2009 and any information contained in them.
  4. The second category is defined by reference to paragraph 1.19 of the expert report from Mr J E C Davidson dated 12 March 2009 and any information obtained therefrom. This includes documents in what he described as "File 8", comprising financial statements for the period ended 30 September 2008 for various companies and trusts, financial statements for a company called Earlcrown Ltd for the period ended 31 May 2007 and information concerning rent and service charges for a property at Leconfield House, Curzon Street.
  5. The third category is more generally defined in terms of information relating to the Claimant's personal or private life, his financial or business affairs, or the financial or business affairs of his companies or family trusts (specifically identified at considerably greater length).
  6. The factual background

  7. The Claimant, Mr Vivian Imerman, is a businessman who has lived in this jurisdiction since 1993. In November 2001 he married Elizabeth Tchenguiz (who is the sister of the First and Second Defendants). On 30 December 2008 she petitioned for divorce and the proceedings are pending in the Family Division.
  8. The Claimant shared various business interests and dealings with the First and Second Defendants and also shared office space and computer facilities with them from about March 2002.
  9. On or about 19 February of this year the Claimant and his staff were evicted from the premises of the First Defendant. This led to proceedings in the Chancery Division, whereby the Claimant and two of his companies complained of being excluded without notice (HC09C00541).
  10. The Third and Fourth Defendants were employed as IT managers (of companies operated by the Second and First Defendants respectively).
  11. The claim arises out of the circumstances in which vast amounts of material were taken from the computer system by the First Defendant in January and February of this year. It is the Claimant's case that there is now no need for a trial because, taking the Defendants' present case as it currently stands, it is possible already to see that he is entitled to injunctive relief. It is his case that none of the Defendants has any right to retain or use the information taken and that such a conclusion can be reached without the need to resolve contested issues of fact.
  12. Although the Defendants' account has altered considerably as the case has developed, Mr White QC for the Claimant is prepared to base his submissions on the latest version; that is to say, the accounts given in the seventh witness statements of the First and Fourth Defendants, served on 21 May 2009. He is prepared to accept also the allegations of fact contained in the defence, which was served on 27 May. That case was summarised by Mr White in the Claimant's skeleton argument as follows:
  13. "(1) The first occasion on which the First Defendant accessed the Claimant's information was on 6 and 7 January of this year, when he "accessed emails and other documents concerning the Claimant held on the computer system" through a desktop computer and "searched for and browsed through documents of relevance to likely issues in the divorce proceedings" [i.e. the pending matrimonial proceedings between the Claimant and his wife]. What he was looking for was information regarding the Claimant's financial status and the whereabouts of his money.
    (2) On 6 and 7 January, the First Defendant "transferred copies of the Claimant's email data, which included the documents attached to those emails" to two sets of memory sticks (described in the Defence as Sets A and B).
    (3) At some point prior to 2 February, he downloaded the contents of Set A on to his (previously undisclosed) laptop.
    (4) On or about 16 January, using the desktop computer, he "again accessed emails and other documents concerning the Claimant held on the computer system" and "searched the computer system for documents which contained references to the addresses of the five London properties" [i.e. those said to form part of the Claimant's portfolio or in which he had a relevant interest for the purpose of assessing his wealth in the matrimonial proceedings].
    (5) On 2 February 2009 and on subsequent days the First Defendant printed out information downloaded on to the laptop using a (previously undisclosed) memory stick known as "Cleverstuff" borrowed from the Fourth Defendant for the purpose of transferring "emails and documents concerning the Claimant" from the laptop to the desktop hard drive. Thereafter the First Defendant printed out "emails and documents" following searches for emails in the inbox folder which "were, or were likely to be relevant, to the likely issues in the divorce proceedings" including searches against the addresses of London properties believed to belong to the Claimant, the names of trusts and companies he knew to be associated with the Claimant. When the First Defendant came across emails that "appeared to be relevant to the likely issues in the divorce proceedings, he opened any documents attached to such emails and instructed the Fourth Defendant to print them out together with the accompanying emails", amounting to 11 box files. Those documents included documents protected by legal professional privilege.
    (6) Either on 2 February and subsequent days or on 13 February of this year, the First Defendant accessed and printed out a number of financial statements in respect of various named trusts for the period ending 30 September 2008 (referred to in Mr Davidson's expert report).
    (7) At some point between 6 February and 11 February, the First Defendant "copied such of the Claimant's email data, including documents attached to those emails" as remained on the servers on to the USB hard drive. The USB hard drive was retrieved by Zaiwalla & Co, acting on behalf of the First and/or Second Defendant, on 2 March of this year and placed in an office safe. It was subsequently delivered up to the Claimant's solicitors on 24 March and, on 30 March, some forensic examiners called FTI confirmed that it had deleted all copies held on its computer systems.
    (8) On 13 February the First Defendant transferred a number of documents which "may have included certain emails and other documents concerning the Claimant" from the laptop to the hard drive of the desktop using an (previously undisclosed) unknown USB device borrowed from the Fourth Defendant and accessed some of those documents. The First Defendant does not recall whether he printed them out.
    (9) On 24 February, the First Defendant again accessed and printed out 17 pages "of emails and other documents concerning the Claimant", specifically documents related to the Claimant's company Earlcrown Limited. These had been transferred to his profile on the desktop computer on or about 24 February from the laptop using a (previously undisclosed) memory stick known as "Recovery" borrowed from the Fourth Defendant."

    A summary of the rival submissions

  14. Mr White submits that none of the Defendants has any right to retain or use the information taken. The Defendants simply do not accept that and argue that there are so many issues of fact, and mixed law and fact, that it would be wrong for a judge to take a short cut. It is said that Mr White is, in effect, inviting me to conduct a mini-trial and to come to conclusions when the evidence requires closer investigation.
  15. Furthermore, where a claim is based on allegations of breach of confidence and/or infringements of a claimant's privacy rights protected under Article 8 of the European Convention, it is appropriate for the court first to decide in all the circumstances whether the claimant has a reasonable expectation of privacy and/or whether the information in question has about it "the necessary quality of confidence": see Coco v A N Clark (Engineers) Ltd [1969] RPC 41. That first task cannot be done without carrying out an inquiry into all the circumstances and, in particular, at least to some extent the intentions and purpose underlying the accessing and retention of the information. Thus it cannot be accomplished until such matters have been fully investigated at a trial.
  16. If the Claimant were to succeed at stage one, and he were held to have a prima facie right of privacy in relation to the information, it would then become necessary for the court to apply an intense focus to the circumstances and to carry out the "ultimate balancing exercise" in order to see whether there is a countervailing public interest argument which would justify permitting a necessary and proportionate degree of intrusion. That is an exercise which Mr Nathan QC, appearing on behalf of all the Defendants, submits cannot possibly be carried out on a summary basis. All of the Defendants raise a public interest defence, which is identified at paragraph 43.5 of their pleading. However startling that may be as a matter of first impression, Mr Nathan argues that it would be quite wrong in principle to attempt to arrive at a conclusion on matters of that kind without affording the opportunity of a trial. Indeed, he submits that there is no precedent for doing so. Yet Mr White suggests that the facts here are so unusual that "the outcome of the balancing exercise is inevitable". Furthermore, it would not necessarily affect the immediate claim for carefully defined injunctive relief.
  17. The First Defendant's case is that he took the material primarily because he anticipated, on the evidence before him, that the Claimant would seek to hide his assets from his wife in the matrimonial proceedings. The First Defendant, being Mrs Imerman's brother, was concerned to protect her interests and, in particular, her rights under Article 6 of the Convention to have her claims in the matrimonial proceedings fairly resolved and on the basis of equality of arms; that is to say, without her being deprived of relevant information and financial data available to the Claimant. This was despite the fact that the Claimant's divorce solicitors had stated in a letter to Mrs Imerman dated 15 January 2009 that he would set out the position in his Form E in the matrimonial proceedings and that he had no intention of dissipating his assets pending their resolution. When the First Defendant saw this letter on or about 16 January, he claims that he then believed and/or had reason to suspect that the Claimant was attempting to conceal the true ownership of certain properties. This is put forward as justification for his accessing the Claimant's emails and searching the computer system for other documents.
  18. It is admitted that in that process the First Defendant used the services of the Fourth Defendant, who is an in-house IT expert, and those of the Fifth Defendant, a solicitor engaged by him. This is an example of what is sometimes referred to in the matrimonial context as "self-help": see e.g. L v L [2007] 2 FLR 171 at [96]-[97]. But it goes a step further in that it is her brothers who are seeking to "help" Mrs Imerman rather than herself.
  19. The First Defendant had access to the Claimant's data because, as I have said, the two brothers had for a number of years worked closely with the Claimant and shared premises and computer facilities. The First Defendant goes so far as to submit that he was entitled to have access to the Claimant's data and, although the investigations were carried out surreptitiously, he seems to be contending either that he would have had at least implied consent to do so or, alternatively, that he did not even need consent. Mr White invites me to accept, for present purposes, the Defendants' evidence and pleaded case in this respect. Mr Nathan says that the circumstances in which they came to share the server and agreed the terms of access (expressly or impliedly) need to be explored in evidence.
  20. Mr White, on the other hand, argues that the matter is very straightforward since his client's data was protected by a password and the First Defendant had no right to access it; indeed, he suggests that he was committing statutory criminal offences in doing so. Disputes of this kind would not appear to be readily disposable on a summary judgment application.
  21. Mr White emphasises that all the material in respect of which the Claimant seeks his remedies falls within the category of emails and attachments. That is borne out by the contents of paragraphs 17 et seq in the defence. By extension, therefore, the material would fall within the notion of "correspondence", in respect of which the Claimant would be entitled to "respect" in accordance with Article 8(1) of the Convention. That protection is not qualified in the sense that it extends only to correspondence the contents of which can be shown to fall within the concept of having "the necessary quality of confidence" contemplated by Megarry V.-C. in Coco v Clark. Reference was made to the Strasbourg decision in Copland v United Kingdom [2007] BHRC 216, where it was held to be a violation of an employee's Article 8 rights to monitor email and Internet usage.
  22. In any event, the whole objective of the First Defendant was to access information about the Claimant's personal financial position. Data within that category is generally understood to attract prima facie protection: see e.g. the observations of Gleeson CJ in the High Court of Australia in Lenah Game Meats v Australian Broadcasting Corp (2001) 185 ALR 1 at [42] and, in this jurisdiction, those of Henderson J in Revenue and Customs Commissioners v Bannerjee [2009] EWHC 1229 (Ch).
  23. Furthermore, Mr White argues that the very nature of the surreptitious access is a relevant factor in judging whether or not the material taken should be regarded as within the scope of legal protection. In this respect, he drew my attention to the remarks in the latest edition of Toulson & Phipps on Confidentiality at 2-023:
  24. "A person who obtains confidential information by dishonest or discreditable means (such as electronic eavesdropping) should be, and is, in no better legal position than if the information had been imparted to him voluntarily in confidence. Equity acts on the conscience, and the conduct of a person who obtains confidential information improperly is as reprehensible to the conscience as that of a person who violates the confidence in which he received it."
  25. Whereas there is undoubtedly a strong argument that a claimant would ordinarily have a reasonable expectation of privacy in respect of business, financial and family material stored on his computer, it is rather more difficult to assess the true extent to which it may be legitimate (i.e. necessary and proportionate) to access that material with a view to assisting the court to arrive at a proper conclusion in the matrimonial proceedings and, correspondingly, to protect the Article 6 rights of Mrs Imerman. It is true that the Claimant has already consented to the Family Division having the 7 lever-arch files which have been handed over to his wife's solicitors, but it is not accepted by the Defendants that they represent the full extent of the relevant material for the purpose of arriving at a proper assessment of his assets. One might reasonably think, if the Defendants are asserting a legal right to retain or pass on information to assist the administration of justice, that it would be for them at least to identify the scope of the information covered by this unusual claim. But the question is whether Mr White, allowing for modern developments in the law, can demonstrate that there is no argument that can be developed on their behalf.
  26. In any event, Mr White submits that it is plain and obvious that the material downloaded extends beyond anything that could possibly be relevant for the matrimonial proceedings. Furthermore, it is common ground that there is some which may be the subject of legal professional privilege.
  27. On any view the amount of material accessed is vast. There is a debate between the parties as to whether it equates to 250,000 pages (the Defendants' estimate) or 2.5m pages (the Claimant's estimate). What is clear is that when the material was taken there was very little in the way of targeting or discrimination. It was simply lifted wholesale.
  28. Mr White argues that an intrusion of this kind gives rise to a claim for breach of confidence in itself. It is moreover so blatant as to be susceptible to summary judgment. On the other hand, as I have noted, the First Defendant argues that there are issues as to what information contained in the material taken can be properly classified as confidential. He argues, rather unattractively, that it is for the Claimant to identify, among the vast quantities of material taken, exactly what he says is entitled to the protection of the law of confidence (and/or that relating to misuse of private information).
  29. It is true that here there is an argument as to whether there was an absence of authority or consent, which arises from the particular circumstances whereby the computer server was shared. Yet, leaving that aside, the Defendants' argument would presumably be equally valid (or not) for a burglar or hacker who, indisputably, accessed a claimant's computer files. If faced with a claim for the return of the information, he would, on the Defendants' argument, be entitled to raise the point that his victim should not be accorded a remedy unless he was prepared to identify every piece of information that he classifies as confidential (and/or subject to legal professional privilege). That argument is surprising, to say the least.
  30. There are some documents the contents of which are obviously, on their face, confidential in nature. As to others, there may be arguments both ways. Yet there is a powerful case for saying that any information stored on a computer to which access is password-protected may be regarded as confidential, irrespective of its actual content, by virtue of that fact alone.
  31. What are more problematic, on the facts of this case, are the arguments (a) that, by reason of the particular arrangements entered into, the First Defendant was entitled to access all the material and (b) that, in any event, there would be an overriding public interest that the information be retained, even now, and made available for the purposes of the administration of justice and/or the protection of Mrs Imerman's financial interests and Article 6 rights and, in particular, to equality of arms in the conduct of her matrimonial dispute. There may be something of an irony about this argument, of course, in circumstances where there is no way that any of the Defendants could have obtained access to the Claimant's material by means of a court order. As Mr White pointed out, court orders are available in appropriate circumstances for the preservation of evidence and, sometimes, for the carrying out of a search. That being so, it is hard to see how any infringement of the Claimant's Article 8 rights could be categorised as proportionate or necessary when no such steps have been taken on behalf of his wife. As a matter of fact, such orders are far from common and would only be made as a matter of last resort on the basis of strong evidence that a spouse has failed to give truthful disclosure: see e.g. Emanuel v Emanuel [1982] 1 WLR 669; Araghchinchi v Araghchinchi [1997] 2 FLR 142. This circumspect approach on the part of the court serves to underline how inappropriate the First Defendant's efforts at "self-help" were in the present case: see in this context the remarks of Tugendhat J in L v L at [108].
  32. A further argument raised by Mr Nathan is that, at an earlier hearing in March, I indicated that it would be right to accord a degree of priority to the parallel family proceedings, so as to avoid clashes or inconsistency between decisions in different Divisions of the High Court. The parties agreed a timetable with that in mind, embodied in my order of 20 March, but now the Claimant seeks to obtain judgment and findings as to the illegality of the First Defendant's conduct – which might to an extent inhibit the Family Division's discretion or jurisdiction to admit in evidence such of the material as might be thought relevant. This is an argument that can be exaggerated, since it was agreed at an early stage that the Family Division judge should have available the 7 files of material. (I have been shown the transcript of the telephone conversation between the Claimant and the Second Defendant on or about 21 February 2009, in which the Claimant is recorded as having made the following concessions:
  33. "Vivian: I want to leave it and just leave it with Withers. We're happy that it stays with Withers. We don't mind it with Withers because that's a domestic issue, it's a family thing, that's fine, it stays with them and we don't care. Do you understand?
    Vincent: So are you prepared to hand it over to the court for the children's stuff, the matrimony?
    Vivian: That's no problem. The one that Withers have got, you know the Withers stuff?
    Vincent: Yes.
    Vivian: That's what Lisa's lawyer's got, no problem. Very happy for them to keep that and they let them use it whatever they like, but the other 700 files, the rest of my stuff I want back." )

    Obviously, it will be for the Judge in the Family Division to decide questions of admissibility, relevance and the use to which they may be put. As Mr White put it on 20 March, "Mr Imerman is content that the judge in the family proceedings should decide what use, if any, she may make of those documents". Things are grinding more slowly in the Family Division. I am told that there will be a hearing at the end of October to determine the extent to which the Claimant's wife may place reliance on those files. It is obviously right that nothing I do meanwhile in these proceedings should be permitted to cut across the court's discretion in those.

    What issues need to be resolved at a trial?

  34. During the course of the hearing, in the hope of focusing on the central issues, I invited counsel for the Defendants to identify on paper the particular factual issues which they claim require to be resolved at a trial. In due course, a few days after the conclusion of the hearing, I received submissions from the Defendants, to which shortly afterwards the Claimant's advisers responded at considerable length. I shall attempt to summarise the main issues put forward by the Defendants. There is clearly a good deal of overlap between them.
  35. First, there is the fundamental question of whether or not the First Defendant's access to the Claimant's material was lawful in the sense that he genuinely had always been permitted unrestricted access to his files.
  36. Secondly, it was said to be necessary to investigate the effectiveness of the password. Mr White submits that it does not matter whether a password is in fact effective, or whether it can be by-passed. What matters is that the use of a password is of itself prima facie evidence (albeit rebuttable) that the material protected should be regarded as confidential.
  37. Thirdly, there is the factual issue of whether or not in practice the Claimant's material had been treated as distinct from that of the First and Second Defendants before this dispute arose. Yet it is not actually pleaded that the Claimant would have consented to the acquisition of this material had he been asked. It is accepted that there was no express consent (in para 18 of the defence) but the First Defendant does not expressly set up a case on implied consent.
  38. Fourthly, it is said that there is the closely related dispute as to whether or not access to emails and documents received by the Claimant and his staff had been within their sole control. One of the points made on the Defendants' behalf is that "on countless occasions D1 and D2 were authorised and permitted to have access to such emails". This obviously sits uncomfortably with their primary case that no authorisation was required.
  39. Fifthly, there is a dispute as to whether from 6 February 2009 onwards the First to Fourth Defendants were given "express notice" that the Claimant and his staff denied them access to all data generated or received by them. It is, at least, accepted in para 13.1 of the defence that the First Defendant became aware at some point after 6 February. Yet the removal of information appears to have continued beyond that: see the defence at para 17.41 et seq.
  40. These first five points clearly overlap. The rights asserted by the First and Second Defendants are surprising on their face, but the validity of the arguments would not appear to turn exclusively on points of law so much as on establishing a rather unusual (perhaps unique) factual scenario. Is their case in this respect so fanciful as to be dismissed on a summary basis?
  41. The sixth point taken is that there is inadequate particularisation of the material said by the Claimant to be confidential.
  42. Seventh, it is said that there was lawful justification for accessing and downloading the material and, in the alternative, that there was no right to confidentiality in any event. This clearly merges with the sixth point. There would not need to be a trial to determine whether the Claimant is in law required to particularise the allegedly confidential information, but there could, at least in theory, be room for argument as to whether any particular item of information should be regarded as confidential. That might be, depending on the circumstances, an issue of mixed fact and law.
  43. Eighth, it is claimed that there was no common design (as the Claimant pleads) as between the First and Second Defendants' activities. The Second Defendant's case is that he did nothing to access the Claimant's emails or other documents. For the purposes of the summary judgment, the Claimant does not wish to argue the contrary. He says that what matters is that the Second Defendant has no right to retain, copy or use the information, however it came into his possession. The same point is made in relation to the remaining three Defendants.
  44. Ninth, it is denied that the Third and Fourth Defendants accessed the material in any event. Again, however, the application for summary judgment does not depend on showing otherwise.
  45. Tenth, there is an issue as to whether or not the Third and Fourth Defendants transferred the information on to USB memory sticks. Summary judgment does not depend on this either.
  46. The eleventh point is that the Third and Fourth Defendants are said to have played no part in accessing information on other computers located at Leconfield House. Again, not a point requiring resolution for summary judgment purposes.
  47. Twelfth, there is also a dispute as to whether or not the Fifth Defendant was acting on the instructions of the Second Defendant as well as those of the First. His case is that he was acting only on the instructions of the First Defendant. That can be assumed for summary judgment purposes.
  48. Pausing there, it can be seen that the eighth to twelfth points are similarly answered by the Claimant: that is to say, none of these factual disputes needs of itself to stand in the way of summary judgment.
  49. Thirteenth, there is a dispute as to which Defendants may have passed the allegedly confidential information to Mrs Imerman. The First Defendant accepts that he disclosed part of the material to the Second Defendant to a limited extent: see para 17.30 of the defence. On the other hand, it is not accepted that the Fifth Defendant disclosed any part of it to the Second Defendant, as alleged by the Claimant on the basis of the Second Defendant's first witness statement (at para 3). Nor is it accepted that the Second Defendant passed any of it on to Mrs Imerman. Mr White suggests that this contention "lacks reality" and that it is still possible to surmount the hurdle of summary judgment according to the test in Three Rivers DC v Bank of England (No 3) [2003] 2 AC 1, 158. It is necessary for the Defendants to show a case which is better than merely arguable. Reference was made to the Second Defendant's first witness statement in which he accepted that he had indeed discussed some of the allegedly confidential information with Mrs Imerman. Yet again, it may be said, whatever happened in the past, this factual dispute should not affect the issue of whether it is appropriate to grant the relief now sought.
  50. Fourteenth, the Second Defendant challenges the proposition that he had any role in causing memory sticks to be delivered to FTI. The Defendants' case is that the Fifth Defendant did this on the instructions of the First Defendant alone: see the defence at para 30. For summary judgment purposes, however, it is accepted that this was so.
  51. Fifteenth, there is no dispute that Mr Wolanski of counsel attended the offices of Withers LLP in order to access 11 lever-arch files and remove from them any documents which he deemed to be subject to legal professional privilege. There is a dispute, however, as to whether or not he was instructed to do so by the Fifth Defendant on behalf of the Second Defendant as well as the First Defendant (not material, however, for summary judgment). There is also on the pleadings a dispute as to whether a Mr Bartlett was correspondingly instructed to access those files.
  52. Sixteenth, there is a further issue on the pleadings as to whether between 9 and 12 February 2009 the Third and/or Fourth Defendant played any part in accessing or copying confidential information from a computer at Leconfield House and copying part of it on to a USB hard drive. The Defendants' case is that neither the Third nor the Fourth Defendant played any role in this. As I have said, the Claimant is prepared to assume that for the present exercise.
  53. Seventeenth, there is another dispute as to whether Zaiwalla & Co (the Fifth Defendant's firm) acted on behalf of the Second Defendant in causing the hard drive to be handed to FTI, as alleged in para 5.16 of the particulars of claim. The Defendants allege that Zaiwalla & Co did not act on the Second Defendant's behalf (already accepted as being irrelevant for present purposes).
  54. Eighteenth, the Claimant makes an allegation that FTI copied the contents of the memory sticks and hard drives on to their computer systems and sent part of the confidential information to a Mr Gouriet (see para 5.17 of the particulars of claim). The Defendants' case is that the Fifth Defendant did not personally give such instructions: they were given by his firm. The Claimant does not need to gainsay the point to obtain summary judgment.
  55. Nineteenth, there is a dispute as to whether between 24 February and 8 March 2009 the Third and/or Fourth Defendant accessed any confidential information relating to Earlcrown and printed out part of it. Again, the Claimant does not assert the contrary for summary judgment purposes. He merely claims to be entitled to its return.
  56. Twentieth, the Claimant does not accept that all material properly regarded as subject to legal professional privilege has been removed from the hard copy documents. He contends that these continue to contain a mixture of privileged and other material. The Defendants' solicitors have already produced a lever-arch file of material selected by Mr Wolanski as being, in his view, subject to legal professional privilege. The Defendants' case, as I have noted above, is that it is for the Claimant to identify any further material. They add this:
  57. "If, at some point in the future, [the Claimant] elects properly to identify additional documents he contends to attract legal professional privilege, [the Defendants] reserve the right to plead to that case, including, if appropriate, that the relevant communications do not attract privilege, including by reason of illegality or fraud (as foreshadowed in the course of the hearing)."

    This argument appears unattractive in two respects. First, since the First Defendant (at least) took the equivalent of thousands of documents, it is hardly reasonable to expect the Claimant to identify all the material which he says is subject to legal professional privilege. He relies upon first instance authority to support the proposition that the burden lies upon the Defendants to return the "mixed bag": Industrial Furnaces v Reaves [1970] RPC 605, 628 (Graham J). There would on that basis be no need to resolve any factual dispute. Moreover, if the Defendants wish to raise illegality or fraud, it is plainly for them to do so in the clearest terms. It has not been pleaded and was raised at the hearing before me for the first time. There would not, as yet, appear to be any authority for the proposition that an individual, such as the First Defendant, is entitled to access the confidential data of another for the purpose of seeking evidence of fraud. It would not be permitted even in the execution of a search and seizure order.

  58. The Defendants also deny that the First to Fourth Defendants retain any documents containing privileged material. Their suggestion is that only the Fifth Defendant retains hard copies of documents which might fall into this category and that he does so in his capacity as a solicitor (and also in accordance with orders made by the court in these proceedings). If a solicitor holds documents at the behest of a client, it is difficult to see why he should acquire any greater right to retain them (apart from any order of the court) than that of his client merely by virtue of being a solicitor.
  59. The relevance of the statutory offences pleaded on the Claimant's behalf

  60. Further issues are raised in relation to the reliance placed by the Claimant in his pleading on certain statutory provisions. There is something of a mismatch between the parties as to the role which these allegations are supposed to play in the litigation. They have been interpreted on the Defendants' behalf as purportedly giving rise to independent causes of action. Mr White has made clear that this was not the intention. The illegality pleaded is said to be relevant in two ways. First, it is to be taken into account in making the decision whether to grant discretionary equitable relief. Secondly, it needs to be addressed when it comes to considering whether there has been compliance with the data protection principles (a matter raised by the First Defendant in para 51.3 of the defence). In other words, the statutory offences appear to relate to subsidiary arguments rather than representing essential links in the case for the summary relief now claimed.
  61. There is an allegation by the Claimant that at least the First Defendant, and possibly also the Third and Fourth Defendants, committed criminal offences contrary to s.1 of the Computer Misuse Act 1990. The Defendants, in the first place, do not accept that the activities in question (pleaded at paras 5.2, 5.4, 5.7, 5.8, 5.15. and 5.18 of the particulars of claim) were attributable to anyone other than the First Defendant. On the other hand, whether or not the Third and Fourth Defendants were in breach of the statute does not affect the Claimant's case on summary judgment.
  62. Moreover, it is not accepted by the Defendants that any conclusion could be reached on this matter without the underlying facts being fully investigated at trial and, in particular, as to the First Defendant's state of mind. Yet Mr White goes so far as to submit that the court should conclude that there is an "absence of reality" to the First Defendant's case (i.e. that he was unaware that access to the Claimant's financial information was unauthorised).
  63. Mr Christie QC introduced an argument based on the substituted s.17(8) of the 1990 Act, which came into effect on 1 October 2008. The suggestion was that it could provide a defence for the First Defendant, but it is important to note that it appears to be directed at s.3 of the statute rather than affording a defence to s.1.
  64. In para 9 of the particulars of claim the Claimant places reliance upon the provisions of s.55 of the Data Protection Act 1998. The relevant parts are as follows:
  65. "(1) A person must not knowingly or recklessly, without the consent of the data controller –
    (a) obtain or disclose personal data or the information contained in personal data, or
    (b) procure the disclosure to another person of the information contained in personal data.
    (2) Subsection (1) does not apply to a person who shows –
    (a) that the obtaining, disclosing or procuring –
    (i) was necessary for the purpose of preventing or detecting crime, or
    (ii) was required or authorised by or under any enactment, by any rule of law or by the order of a court,
    (b) that he acted in the reasonable belief that he had in law the right to obtain or disclose the data or information or, as the case may be, to procure the disclosure of the information to the other person,
    (c) that he acted in the reasonable belief that he would have had the consent of the data controller if the data controller had known of the obtaining, disclosing or procuring and the circumstances of it,
    (d) that in the particular circumstances the obtaining, disclosing or procuring was justified as being in the public interest.
    (3) A person who contravenes subsection (1) is guilty of an offence."

    Although it is proposed that there will be a new subsection (2)(ca) inserted in the statute, by virtue of the Criminal Justice and Immigration Act 2008, s.78, it does not yet appear to be in force.

  66. Again, it is said that it would not be possible to come to a conclusion on the alleged infringement of this provision without a trial. There is a dispute, in particular, as to "knowingly or recklessly" and "without the consent of the data controller". It is the Defendants' case that the First Defendant is the data controller and that, in any event, the Claimant has effectively given consent by virtue of the arrangements they arrived at when agreeing to share the server. Furthermore, the point is taken that the Claimant has failed to identify what "personal data" he is relying upon. Were that hurdle overcome, the Defendants say that they would wish to raise one or more of the defences contemplated in s.55(2)(a) and (b).
  67. Yet again, Mr White invites the conclusion, from facts which his client is prepared to assume, that the terms of the statute have been infringed.
  68. Reliance has also been placed on s.4 of the Data Protection Act 1998, which identifies the "data protection principles" by reference to Schedules 1, 2 and 3 of the statute. The Claimant's case is that one or more of the Defendants has acted inconsistently with those principles. The Defendants suggest that the claim is inadequately particularised but, nonetheless, they made certain concessions in response to para 13 of the particulars of claim to the effect that (a) the alleged confidential information comprised some "data" within the meaning of the Act, (b) that the First and Second Defendants were "in principle" data controllers, and (c) that if there were any personal data of which the Claimant was the "data subject" they would be in principle subject to the statutory duty imposed by s.4(4) to comply with the data protection principles. None of this, it is said, lends itself to summary disposal. But Mr White, once more, argues that there is no need to find any facts. The matters can be determined as a matter of law assuming the relevant facts in the Defendants' favour.
  69. Furthermore, the First Defendant pleads specific defences. In particular he wishes to argue that:
  70. (a) any such personal data were processed fairly and lawfully (see the defence at para 51.3);

    (b) any disclosure of personal data would have been necessary in connection with legal proceedings and/or for the purposes of establishing, exercising or defending legal rights: see s.35(2);

    (c) any such data was processed by the First Defendant only for the purposes of, in particular, family affairs: see s.36;

    (d) any such processing by the First Defendant was necessary for the administration of justice and/or for the purposes of legitimate interests pursued by him or by the persons to whom the data was (if it was) disclosed: see Schedule 2, para 6(1);

    (e) in so far as there was any processing by the First Defendant of sensitive personal data relating to the Claimant, it was necessary in order to protect his own vital interests or those of another person, necessary for the purpose of, or in connection with, any legal proceedings, or otherwise necessary for the purpose of establishing, exercising or defending legal rights, and/or necessary for the administration of justice: see Schedule 3, para 3(a)(ii), para 6(a), para 6(c) and para 7(1)(a).

    It is again submitted that none of these issues lends itself to summary disposal and that the court cannot take a short route at this stage. It is fair to say that there is little authority so far as to how the statute is intended to work in practice, but there are a number of uncertainties to which commentators have drawn attention. For the time being at least, applications for summary judgment founded solely on the Data Protection Act are unlikely to find favour. Yet Mr White submits that the claims based on the statute are not essential to the present limited application. The court does not need to find the criminal offences proved in order to grant the prohibitory relief.

    Miscellaneous submissions

  71. Additionally, the Defendants rely upon the proposition that the Claimant's proprietary claim (to be found in the particulars of claim at para 14) is simply bad in law. It is based upon the proposition that a claimant may recover hard copy documents, however minimal the value of the paper, in which he can establish a title, irrespective of their admissibility in litigation brought against him: see e.g. Ashburton v Pape [1913] 2 Ch 469 and ITC Film v Video Exchange [1982] 1 Ch. 431. But here I am concerned with information that is electronically stored, rather than conventional hard copy documents. The Defendants submit that it should not, therefore, form any part of the reasoning for the purposes of summary disposal. But it does not.
  72. There is an additional point which applies only to the Fifth Defendant. He argues that the claim has been brought against him for a dominant improper purpose and that it is, accordingly, an abuse of process. He alleges that the proceedings have included him solely because the Claimant wishes to vex or harass him, and thereby his clients, and/or to pursue a personal, racially motivated vendetta against him: see the defence at para 54. I am not in a position to uphold that contention on the material before me. The Fifth Defendant has not launched any abuse of process application. In any event, as I have already suggested, the claim against the solicitor is subsidiary to that of his client(s). I cannot see that he has any independent ground for resisting relief if the Claimant is able to establish his case for summary judgment against his client(s).
  73. So far as the cause of action against him is concerned, it appears to be admitted in the Second Defendant's witness statement (at para 3) that the Fifth Defendant discussed some of the information alleged to be confidential with the Second Defendant, even though it is not accepted that there was between them a solicitor/client relationship. Furthermore, there is an arguable case against him that he advised upon, encouraged or assisted in the disclosure to Mrs Imerman and to FTI Consulting and Baker Tilly. The full extent of his involvement and whether it was lawful may have to be determined later. Meanwhile, he retains possession of the Claimant's information and, says Mr White, he should release it. It is only on that straightforward basis that summary judgment is now sought against him.
  74. Conclusion on the Claimant's application

  75. It is difficult to understand why the Claimant should not simply be entitled to have this information "back", or rather to take it out of circulation and to restrain its use or onward transmission by others. That is irrespective of how it was originally obtained and by whom. Any argument the Defendants may have had as to public interest or protecting Mrs Imerman's Article 6 rights (as at the time of obtaining the information) should not be pre-judged. It can be said, however, that it will not be compromised by the grant of the orders the Claimant seeks, since she already has available the lever-arch files supplied to her solicitors and, if there is solid evidence to justify doing so, preservation orders can be made at her behest in relation to other categories of documents said to be relevant. It may be that the Claimant would offer undertakings to avoid the additional costs of any such application and/or to preserve the position until trial of the present claims. At all events, those considerations do not justify the continued retention of the material by any of the Defendants. There is as yet no other public interest argument pleaded which would justify this – apart from that deployed in relation to the matrimonial proceedings. I see no reason why an order protecting the Claimant's rights in this court need inhibit or impede in any way the steps open to a Family Division judge.
  76. In making this determination, I have not found it necessary to rule on whether there has been any infringement of the statutory provisions considered above or upon any defences that might have been potentially available if they fell to be considered. Nor have I ruled whether there has been any unlawful conduct such as to entitle the Claimant to an award of damages against any of the Defendants. Those issues can, if necessary, be resolved at a later stage. The grant of injunctive relief depends in this instance mainly upon the nature of the information obtained and its source.
  77. In the circumstances I am prepared to grant the limited relief now claimed by way of summary judgment.
  78. The First Defendant's disclosure application

  79. On 9 April the First Defendant issued his own application for disclosure. It relates to what have been called the 17 "Whyte & Mackay" documents. They are said to be relevant to an allegation of fraud which the First Defendant wishes to make. It is based on the proposition that the Claimant was responsible for a charge made by Earlcrown to Whyte & Mackay for accommodation and also for City of Westminster business rates. His case is that this was improper and dishonest, given that Earlcrown itself had not paid, up to the relevant time, any rent, accommodation charges or business rates itself. The Claimant denies that this makes it inappropriate to charge Whyte & Mackay but, be that as it may, what matters for present purposes is whether this justifies the order the First Defendant now seeks.
  80. The Claimant's point is that the First Defendant had seen the Earlcrown accounts prior to any trawl through his confidential information, and those accounts demonstrated the charge made to Whyte & Mackay. Since he also knew that Earlcrown had not itself been charged, he had enough material to formulate his allegation of fraud already, although I say nothing as to its merits. In these circumstances, there is no need to make an order. The application gives the appearance of being simply a retaliatory strike.


BAILII: Copyright Policy | Disclaimers | Privacy Policy | Feedback | Donate to BAILII
URL: http://www.bailii.org/ew/cases/EWHC/QB/2009/2024.html