Follow us

It is a common story that an ex-employee or ex-business partner starts a new business, using a computer program which is alleged to be copied from the former business.

The recent decision of EIFY Systems v 3D Safety Services1 is a reminder to businesses about the importance of taking pre-emptory steps to protect such intellectual property.

EIFY Systems (EIFY) provides web-based services, including an online safety induction program. 3D Safety Services (3D) provides web-based management systems. EIFY and 3D entered into a joint venture to integrate their offerings but this did not progress and 3D instead created their own online safety induction system. Although 3D had not accessed the source code of EIFY’s program, EIFY alleged that 3D had copied the overall arrangement and look of its program. The Court found no copyright infringement, no breach of confidence and no breach of contract.

Four key points which arise from this decision are:

  1. It can be difficult to protect computer programs and webpages through copyright, when only the structure or ‘feel’ has been taken. Copyright will not protect against someone taking the functionality or behaviour of a program.
  2. Businesses should maximise their ability to protect computer programs and webpages through confidential information and contract. For example, consider:
    1. Who has access to bespoke computer programs?
    2. Do the employment contracts of these people contain appropriate clauses on confidential information and IP? Do joint venture or other commercial contracts address confidential information and IP? Are there any important programs, or types of confidential information, which should be identified with precision?
    3. Do the programs contain notices or terms of use about confidentiality? Do these notices sufficiently identify the confidential information?
    4. Is the ownership position of confidential information and IP clear, especially where contractors or third parties have contributed to the program?
    5. Is training provided which addresses confidential information?
  3. It is not possible to prohibit a person from using information which is simply his or her accumulated knowledge, skill and experience in a field.
  4. Running IP infringement litigation is technical, and pleading and evidential problems can result in a lost case. In this case, for example, improper instructions to an expert witness led to the exclusion of his evidence, and failing to adequately plead the case meant that a key argument could not be run.


  1. EIFY Systems Pty Ltd v 3D Safety Services Pty Ltd [2017] NSWSC 1310 (28 September 2017).

Key contacts

Sue Gilchrist photo

Sue Gilchrist

Partner and Head of Intellectual Property, Australia, Sydney

Sue Gilchrist
Kristin Stammer photo

Kristin Stammer

Executive Partner, East, Sydney

Kristin Stammer
Miles Bastick photo

Miles Bastick

Partner, Sydney

Miles Bastick