Document Fragment View

Matching Fragments

20. It is asserted that one of the most critical components necessary for the functioning of the plaintiff's boom barrier system is its 'PCB' and the proprietary software source code for the operation of the same.

21. It is asserted that the defendant no. 1 joined the plaintiff's employment on 25.05.2020 as a Firmware Engineer, and was later promoted to Senior Firmware Engineer on 03.07.2022. His responsibilities in the plaintiff's company included but were not limited to research and development, developing circuit designing of PCBs, outsourcing fabrication and manufacture of PCBs, software development and vendor empanelment for any hardware manufacturing or assembly. In the course of his employment, the defendant no. 1 had access to the copyrighted software source code, other confidential information, and also trade secrets of the plaintiff, details whereof are given in paragraph 13 of the plaint.

22. On 25.08.2022, Mr. Akshay Goel from Hatch N Hack Solutions Pvt Ltd (Hatch N Hack), who is one of the vendors responsible for manufacturing PCBs for the plaintiff as also assembling its complete control panels, informed the plaintiff about an e-mail received by him from the defendant no. 1 seeking quotes for manufacturing sensors and modules which are critical components of the plaintiff's system. It was found that the follow up communications were marked to various employees of the defendant no. 2, which indicated that the said orders were for on-going projects of the defendant no. 2. When confronted, the defendant no. 1 accepted that he had done work with the defendant no. 2, however, claimed that he had not shared any confidential information or trade secrets with them. On a forensic analysis of the laptop and mobile phone of the defendant no. 1, it was found that the defendant no. 1 had indeed shared substantial confidential information and documents of the plaintiff- company, including the copyrighted software source code with the defendant no. 2. The learned counsel for the plaintiff has drawn my attention to various documents filed with the plaint in support of this assertion.

24. The defendant no. 4 is stated to be a software consultant who is helping the defendant nos. 1 to 3 to use the proprietary information of the plaintiff's design for nefarious purposes.

25. Having considered the contents of the plaint, the documents filed therewith, as also having heard the learned counsel for the plaintiff, in my opinion, that the plaintiff has been able to make out a good prima facie case in its favour. The documents prima facie show that while being in employment with the plaintiff, the defendant no. 1 has shared information to which the plaintiff claims proprietary rights with the defendant no. 2, including its software source code and proprietary data base. The defendant no. 2 is a competitor of the plaintiff.

b. Specifically check the computer systems of Vijay Garg, Ashish Saini, Vishal Mohan, Alok Kumar, Rajpal Rawat, Aditi Kharbanda and Kavita Rawat to identify the presence of the plaintiff's software source code, firmware and other confidential information, trade secrets and to make mirror images, if the same are found. Pursuant to the same, the Local Commissioner shall delete/ format all of the said data from the systems of the abovementioned individuals. c. Obtain access to the local and/or cloud server in which the defendant no. 2 stores its data and to identify the presence of the the plaintiff's software source code, firmware and other confidential information, trade secrets and to make mirror images, if the same are found. Pursuant to the same, the Local Commissioner shall delete/ format all of the said data from the defendant no.2's systems. d. Check the computer systems and network servers of the defendant no. 2 to find out the host having the IP addresses - 192.168.0.104 and 192.168.0.105.