{"id":6848,"date":"2026-02-23T09:19:47","date_gmt":"2026-02-23T09:19:47","guid":{"rendered":"https:\/\/somia.com.au\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/"},"modified":"2026-02-23T09:19:47","modified_gmt":"2026-02-23T09:19:47","slug":"former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement","status":"publish","type":"post","link":"https:\/\/somia.com.au\/zh\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/","title":{"rendered":"Former employee downloaded core design templates and developed highly similar products: How to determine &#8216;substantial reproduction&#8217; and copyright infringement?"},"content":{"rendered":"<h3>Employee Downloading CAD Template Files for a Competing Product Line: When Do Near-Identical Dimensions Cross the Line into Substantial Reproduction and Misuse of Confidential Information?<\/h3>\n<p>Based on the authentic Australian judicial case C21 Pty Ltd (Trustee) v Hou (No 5) [2025] FedCFamC2G 479, this article disassembles the Court&#8217;s judgment process regarding evidence and law. It transforms complex judicial reasoning into clear, understandable key point analyses, helping readers identify the core of the dispute, understand the judgment logic, make more rational litigation choices, and providing case resources for practical research to readers of all backgrounds.<\/p>\n<hr \/>\n<h4><strong>Chapter 1: Case Overview and Core Disputes<\/strong><\/h4>\n<h6><strong>Basic Information<\/strong><\/h6>\n<p>Court of Hearing: Federal Circuit and Family Court of Australia (Division 2)<br \/>\nPresiding Judge: Judge Manousaridis<br \/>\nCause of Action: Copyright infringement; breach of confidence; breach of employment contract; breach of fiduciary duty; contraventions of ss 182(1) and 183(1) of the Corporations Act 2001 (Cth); accessory liability and involvement findings against the corporate respondent<br \/>\nJudgment Date: 4 April 2025<br \/>\nCore Keywords:<br \/>\nKeyword 1: Authentic Judgment Case<br \/>\nKeyword 2: Copyright Act 1968 (Cth)<br \/>\nKeyword 3: Substantial part and reproduction<br \/>\nKeyword 4: CAD files and template-based manufacturing<br \/>\nKeyword 5: Breach of confidence and misuse of trade secrets<br \/>\nKeyword 6: Employee duties and corporate statutory duties<\/p>\n<h6><strong>Background<\/strong><\/h6>\n<p>At the centre of this dispute was a modern kind of \u201ctoolkit\u201d: digital design template files used to manufacture physical products. The Applicant operated a niche but commercially significant business designing and selling artisan keycaps for mechanical keyboards. The business relied on a production workflow where CAD template files\u2014built in a professional parametric design program\u2014generated precise 2D and 3D representations and enabled manufacturing.<\/p>\n<p>The First Respondent was a senior employee who, while still employed and while preparing to launch a competing venture, downloaded a large volume of information from the Applicant\u2019s systems to devices under her control. That dataset allegedly included the core template files used to create the Applicant\u2019s keycap products, along with other business records and operational materials.<\/p>\n<p>The dispute then became a forensic contest: whether the downloaded materials included the Applicant\u2019s protected template files; whether those files were protected by copyright; whether the First Respondent\u2019s later competing templates were independently created or instead derived by reproducing a substantial part of the Applicant\u2019s templates; whether the downloaded information was confidential; and whether the First Respondent and the Second Respondent misused it to compete. :contentReference[oaicite:0]{index=0}<\/p>\n<h6><strong>Core Disputes and Claims<\/strong><\/h6>\n<p>The legal focus turned on three tightly linked questions the Court was required to determine:<\/p>\n<ol>\n<li>Copyright: Did copyright subsist in the Applicant\u2019s CAD template files, did the Applicant own it, and were acts done by the Respondents that were comprised in that copyright, including reproduction of a substantial part?<\/p>\n<\/li>\n<li>\n<p>Confidentiality: Did the downloaded material contain information that was confidential to the Applicant, was it properly identified and proven as confidential, and did the Respondents misuse it?<\/p>\n<\/li>\n<li>\n<p>Employment and corporate duties: While still employed, did the First Respondent take steps to establish a competing business and use the Applicant\u2019s information in breach of contractual duties, fiduciary duties, and the statutory duties under ss 182 and 183 of the Corporations Act, and was the Second Respondent involved in or knowingly assisting that wrongdoing?<\/p>\n<\/li>\n<\/ol>\n<hr \/>\n<h4><strong>Chapter 2: Origin of the Case<\/strong><\/h4>\n<p>The narrative began with a specialised manufacturing business whose products depended on repeatable precision. The Applicant\u2019s artisan keycaps were not improvised sculptures. They were engineered objects: each keycap was manufactured to CAD specifications. The Applicant\u2019s production pipeline followed a disciplined pattern:<\/p>\n<ul>\n<li>baseline design templates were built in parametric CAD software;<\/li>\n<li>collaboration templates were produced by imprinting a collaborator\u2019s motif into a relevant design template;<\/li>\n<li>production files were exported in formats used for manufacturing and rendering; and<\/li>\n<li>manufacturers received the production files under non-disclosure conditions.<\/li>\n<\/ul>\n<p>The First Respondent started as an assistant, then became a paid senior designer with responsibility for core collaboration work, including creating production-ready files. That role gave access to the Applicant\u2019s most commercially sensitive files: the \u201cfoundation\u201d templates and their derivative collaboration templates.<\/p>\n<p>In the months preceding her departure, the First Respondent\u2019s relationship with the Applicant\u2019s key decision-maker ended. After that personal rupture, her professional position remained, but the evidence described a workplace environment where work and personal history were intertwined, including shared systems containing work and personal materials. That background mattered because it became part of the First Respondent\u2019s justification for the downloading: she asserted she was retrieving personal material, not preparing to compete.<\/p>\n<p>However, the Applicant\u2019s case was that the decisive moment occurred when intent and action aligned: while still employed and having resolved to launch a competing business, the First Respondent downloaded a large body of material from controlled systems, later took steps to set up a competing brand, and ultimately sold competing products through a company she controlled.<\/p>\n<p>From the Court\u2019s perspective, the story was not framed as a mere workplace exit with a messy handover. It was framed as a contest about whether an employee took the employer\u2019s \u201cengine room\u201d files\u2014the very templates that converted creative concepts into manufacturable geometry\u2014and then used them as the blueprint for a competing business.<\/p>\n<hr \/>\n<h4><strong>Chapter 3: Key Evidence and Core Disputes<\/strong><\/h4>\n<h6><strong>Applicant\u2019s Main Evidence and Arguments<\/strong><\/h6>\n<ol>\n<li>System and download evidence<br \/>\nThe Applicant relied on evidence of downloads from its NAS servers and cloud systems to devices controlled by the First Respondent. The evidence was aimed at proving:<\/li>\n<\/ol>\n<p>&#8211; the fact of downloading;<br \/>\n&#8211; the timing of downloading (while employed, after an intention to compete had formed); and<br \/>\n&#8211; the content categories likely included in the dataset.<\/p>\n<ol>\n<li>CAD workflow evidence<br \/>\nThe Applicant led evidence explaining how:<\/li>\n<\/ol>\n<p>&#8211; a design template file in a parametric CAD program is not merely a static picture, but a structured sequence of modelling steps;<br \/>\n&#8211; those steps form a reproducible design history, including dimensions and relationships; and<br \/>\n&#8211; the templates were \u201ccore files\u201d used to build collaboration files and production outputs.<\/p>\n<ol>\n<li>Expert evidence on CAD similarity and derivation<br \/>\nExperts addressed:<\/li>\n<\/ol>\n<p>&#8211; what information a CAD file contains (geometry plus feature history);<br \/>\n&#8211; how stable, manufacturable CAD models are built; and<br \/>\n&#8211; whether the competing templates exhibited identical or near-identical dimensions and modelling features consistent with copying rather than independent creation.<\/p>\n<ol>\n<li>Evidence of communications and business preparation<br \/>\nThe Applicant relied on evidence of communications with vendors and collaborators, and conduct while still employed, to support findings that the First Respondent was preparing to compete and to appropriate the Applicant\u2019s collaboration pipeline.<\/li>\n<\/ol>\n<h6><strong>Respondent\u2019s Main Evidence and Arguments<\/strong><\/h6>\n<ol>\n<li>\u201cPersonal retrieval\u201d explanation<br \/>\nThe First Respondent admitted some downloading but asserted it was to retrieve personal documents stored within shared systems and to obtain material necessary to perform work duties.<\/p>\n<\/li>\n<li>\n<p>Denial of downloading the \u201ccore templates\u201d<br \/>\nThe Respondents disputed that the Applicant could prove the downloaded dataset included the template files at the heart of the case.<\/p>\n<\/li>\n<li>\n<p>Independent creation defence<br \/>\nThe Respondents asserted that competing templates and products were created by the First Respondent\u2019s own work, not by reproducing the Applicant\u2019s templates.<\/p>\n<\/li>\n<li>\n<p>Confidentiality challenge<br \/>\nThe Respondents argued the Applicant had not adequately identified the confidential information claimed, and in any event had not proved the information was confidential.<\/p>\n<\/li>\n<\/ol>\n<h6><strong>Core Dispute Points<\/strong><\/h6>\n<ul>\n<li>Identification: Can the Applicant prove which specific CAD template files were downloaded, rather than merely that \u201clots of files\u201d were downloaded?<\/li>\n<li>Protectable subject matter: Is data in CAD template files protected as a copyright work under the Copyright Act?<\/li>\n<li>Substantial part: Even if there is no literal file duplication, did the competing templates reproduce a substantial part of the Applicant\u2019s templates?<\/li>\n<li>Inference from missing evidence: Where key details are within the First Respondent\u2019s power to explain\u2014such as the source of exact dimensions\u2014can the Court draw stronger inferences against her if those details are not provided?<\/li>\n<\/ul>\n<hr \/>\n<h4><strong>Chapter 4: Statements in Affidavits<\/strong><\/h4>\n<p>Affidavit evidence did two jobs at once: it told a story and it built a forensic platform for inference.<\/p>\n<p>The Applicant\u2019s affidavits worked like a guided tour through a workshop, but the workshop was digital. They described:<br \/>\n&#8211; the structure of the business workflow,<br \/>\n&#8211; the purpose and sensitivity of particular folders and file classes,<br \/>\n&#8211; how CAD templates and production outputs were created,<br \/>\n&#8211; who had access and why, and<br \/>\n&#8211; why the templates were commercially valuable.<\/p>\n<p>By contrast, the First Respondent\u2019s affidavit position attempted to reframe the same digital environment as a mixed personal-professional ecosystem: shared storage, personal documents mixed with work materials, and downloading as a self-help step to recover personal property.<\/p>\n<p>The Court\u2019s approach required more than broad assertions. Where one party says \u201cI downloaded for personal reasons\u201d and the other says \u201cyou downloaded our core templates\u201d, the contest becomes: identify what was downloaded, what happened to it, and how later competing outputs were created.<\/p>\n<p>That is why the boundary between truth and untruth often appears not in grand claims, but in the absence of detail. In this case, the Court focused on whether the First Respondent identified, in concrete terms, what files she meant to retrieve and what files she actually retrieved\u2014and, critically, where her later design dimensions came from.<\/p>\n<h6><strong>Strategic Intent Behind the Court\u2019s Procedural Focus on Affidavits<\/strong><\/h6>\n<p>In modern commercial litigation involving digital evidence, affidavits are not merely narrative. They are a map of what issues can be proved and what issues will be resisted.<\/p>\n<p>Where a party\u2019s explanation depends on matters uniquely within their knowledge\u2014such as the decision-making process in creating a CAD model\u2014the affidavit must provide a sufficiently detailed account to enable testing. If it does not, the Court may treat the omission as significant, especially where the party later seeks to rely on a \u201cclean hands\u201d independent creation narrative.<\/p>\n<hr \/>\n<h4><strong>Chapter 5: Court Orders<\/strong><\/h4>\n<p>Before final relief was determined, the Court made procedural arrangements reflecting the sensitivity of the evidence and the need for orders that protect the administration of justice.<\/p>\n<p>Key directions included:<\/p>\n<ul>\n<li>confidentiality arrangements limiting publication of the reasons to legal representatives until further order or agreement;<\/li>\n<li>liberty to apply for further orders, including for redaction or anonymisation before public release; and<\/li>\n<li>listing for submissions on the orders required to give effect to the reasons, and any necessary redactions.<\/li>\n<\/ul>\n<p>These directions reflect a common tension in intellectual property and commercial misuse disputes: public reasons are vital for open justice, but evidence often includes commercially sensitive material that cannot be safely aired without safeguards.<\/p>\n<hr \/>\n<h4><strong>Chapter 6: Hearing Scene: Ultimate Showdown of Evidence and Logic<\/strong><\/h4>\n<h6><strong>Process Reconstruction: Live Restoration<\/strong><\/h6>\n<p>The hearing unfolded like a controlled demolition of competing narratives.<\/p>\n<p>The Applicant\u2019s case depended on building a chain:<br \/>\n&#8211; access and downloading while employed,<br \/>\n&#8211; intent to compete while still employed,<br \/>\n&#8211; subsequent competing product launch,<br \/>\n&#8211; CAD similarities that were not incidental but structurally meaningful, and<br \/>\n&#8211; gaps in the First Respondent\u2019s explanation about how those similarities arose.<\/p>\n<p>Cross-examination in such cases often follows a predictable rhythm:<\/p>\n<ol>\n<li>Lock in admissions<br \/>\nThe First Respondent admitted downloading at least some materials. That admission became the \u201cdoorway fact\u201d through which the Court could then assess the competing explanations about purpose and content.<\/p>\n<\/li>\n<li>\n<p>Narrow the \u201cpersonal retrieval\u201d narrative<br \/>\nThe question becomes: if it was personal retrieval, what exactly was personal, where was it, what was downloaded to retrieve it, and why were business-critical templates not segregated?<\/p>\n<\/li>\n<li>\n<p>Confront the CAD \u201ccoincidence\u201d<br \/>\nWhen two parametric models share identical or near-identical dimensions, the legal question is not whether similarity exists, but how it exists. Independent creation is possible in theory, but the Court examines whether the explanation is complete, coherent, and supported.<\/p>\n<\/li>\n<li>\n<p>Test the missing-source problem<br \/>\nA designer can often explain the origin of dimensions: public specifications, industry standards, reverse engineering from physical objects, or original measurement. If the First Respondent cannot identify the source of key dimensions, and if those dimensions align with the Applicant\u2019s templates, the Court can treat the absence as telling.<\/p>\n<\/li>\n<\/ol>\n<h6><strong>Core Evidence Confrontation<\/strong><\/h6>\n<p>The decisive confrontation was not merely \u201cdid you download files?\u201d It was \u201cdid you reproduce the Applicant\u2019s templates in substance?\u201d<\/p>\n<p>In CAD-based disputes, the critical evidence is often:<\/p>\n<ul>\n<li>feature tree logic: the modelling history and sequence of operations;<\/li>\n<li>stable modelling choices: design decisions made to ensure manufacturability and tolerance control; and<\/li>\n<li>dimension identity: precise values and relationships that are unlikely to match by chance across complex models.<\/li>\n<\/ul>\n<p>The Applicant framed the CAD templates as the product of skilled labour and iterative refinement, not generic shapes. The Respondents framed the outcome as independently constructed in a domain where many specifications may be publicly known. The Court\u2019s task was to identify where standardisation ends and original expression begins\u2014and whether the Respondents crossed that line.<\/p>\n<h6><strong>Judicial Reasoning: How Facts Drove Result<\/strong><\/h6>\n<p>The Court\u2019s reasoning used a classic evidentiary lever in civil litigation: where a party does not adduce evidence that is within their power to adduce and which would elucidate key matters, the Court may weigh the available evidence accordingly.<\/p>\n<blockquote><p>\n  \u201cAll evidence is to be weighed according to the proof which it was in the power of one side to have produced, and in the power of the other to have contradicted.\u201d\n<\/p><\/blockquote>\n<p>This principle mattered because the First Respondent\u2019s case required detailed explanation of matters uniquely within her knowledge: what she downloaded, and how she arrived at the exact dimensions and design decisions embedded in the competing CAD templates. Where those explanations were not given in a concrete, testable form, the Court could more confidently accept inferences drawn from the Applicant\u2019s evidence about downloading, similarity, and subsequent competitive conduct.<\/p>\n<p>Determinatively, the hearing became less about a single \u201csmoking gun\u201d file transfer and more about whether the total evidence formed a coherent inference of copying and misuse that the Respondents failed to rebut with the detail that would reasonably be expected.<\/p>\n<hr \/>\n<h4><strong>Chapter 7: Final Judgment of the Court<\/strong><\/h4>\n<p>The Court determined that:<\/p>\n<ul>\n<li>copyright subsisted in the Applicant\u2019s relevant CAD template files and the Applicant owned that copyright;<\/li>\n<li>the First Respondent\u2019s downloading included the relevant template files;<\/li>\n<li>the First Respondent infringed copyright by downloading the template files;<\/li>\n<li>the First Respondent and the Second Respondent reproduced a substantial part of the Applicant\u2019s design templates and thereby infringed the Applicant\u2019s copyright;<\/li>\n<li>the downloaded information included confidential information of the Applicant, and the Respondents misused that information, including by using the template files to compete;<\/li>\n<li>the First Respondent breached contractual duties and fiduciary duties; and<\/li>\n<li>the First Respondent contravened ss 182 and 183 of the Corporations Act, with the Second Respondent knowingly assisting and being involved in those contraventions.<\/li>\n<\/ul>\n<p>The proceeding also involved questions about remedies including profits, damages (including additional damages under s 115(4) of the Copyright Act), compensation orders under s 1317H of the Corporations Act, and non-pecuniary remedies such as declarations, injunctions, and delivery up or destruction.<\/p>\n<hr \/>\n<h4><strong>Chapter 8: In-depth Analysis of the Judgment: How Law and Evidence Lay the Foundation for Victory<\/strong><\/h4>\n<h6><strong>Special Analysis<\/strong><\/h6>\n<p>This case is jurisprudentially valuable because it shows how Australian courts handle IP disputes where the \u201cthing copied\u201d is neither a painting nor a literal document, but a parametric CAD template whose value lies in the embedded design history, precision, and manufacturability.<\/p>\n<p>It also demonstrates the Court\u2019s willingness to treat:<br \/>\n&#8211; the act of downloading as an infringing act where the downloaded file embodies a copyright work, and<br \/>\n&#8211; \u201csubstantial reproduction\u201d as capable of being proved through expert evidence showing near-identical dimensions and structural features consistent with derivation.<\/p>\n<p>Most importantly, it shows how evidentiary reasoning principles\u2014often discussed in abstract\u2014become decisive in digital disputes. When the alleged copier is the very person who could best explain the origin of the competing geometry, silence or conclusory statements can become the weight that tips the scale.<\/p>\n<h6><strong>Judgment Points<\/strong><\/h6>\n<ol>\n<li>CAD template files can be \u201cworks\u201d for copyright purposes<br \/>\nThe Court treated the data in the template files\u2014when accessed through software to generate 2D and 3D representations\u2014as capable of subsisting as copyright subject matter. The critical move is recognising that the protected \u201cwork\u201d is not merely a final rendered image, but the structured expression embodied in the file.<\/p>\n<\/li>\n<li>\n<p>Downloading is not a neutral act when the file embodies a protected work<br \/>\nIf a protected CAD file is copied from an employer\u2019s system to a personal device, that can be an act comprised in copyright, even before any competing product is sold.<\/p>\n<\/li>\n<li>\n<p>Substantial part is qualitative, not merely quantitative<br \/>\nIn CAD contexts, a \u201csubstantial part\u201d may be reproduced by taking the core geometry and dimensional relationships that make the model manufacturable and stable. The question is not how much of the file is copied, but whether what is taken is essential to the author\u2019s skill and labour.<\/p>\n<\/li>\n<li>\n<p>Near-identical dimensions are legally meaningful when the origin is unexplained<br \/>\nWhere dimensions match in complex models, the Court expects a coherent explanation. If the alleged copier cannot identify the source\u2014public specifications, measurement, or original design\u2014then the Court may treat that absence as strengthening the inference of copying.<\/p>\n<\/li>\n<li>\n<p>The Court will integrate copyright, confidence, and duties into a single factual matrix<br \/>\nThis was not treated as a set of disconnected claims. The same facts\u2014download timing, access, intent to compete, later product launch, and CAD similarity\u2014supported multiple legal consequences: infringement, breach of confidence, breach of duty, and corporate duty contraventions.<\/p>\n<\/li>\n<li>\n<p>The \u201cindependent creation\u201d defence rises or falls on detail<br \/>\nIndependent creation is possible, but it must be proven in a way that can be tested: design logs, step-by-step modelling history, measurement sources, and credible explanations for identical decisions. Conclusory denials are not enough when the evidence points the other way.<\/p>\n<\/li>\n<li>\n<p>Corporate respondent liability can arise through involvement and knowing assistance<br \/>\nA controlled company can be liable where it participates in, benefits from, or knowingly assists breaches of fiduciary duty and statutory duty, even if the core acts were performed by the individual controller.<\/p>\n<\/li>\n<li>\n<p>Remedies respond to the commercial reality of competition built on misappropriated templates<br \/>\nWhere the wrongdoing enables a competing business, the Court\u2019s remedial focus naturally extends beyond nominal relief toward profits, damages, additional damages, injunctions, and delivery up or destruction.<\/p>\n<\/li>\n<\/ol>\n<h6><strong>Legal Basis<\/strong><\/h6>\n<p>Key statutory provisions applied included:<\/p>\n<ul>\n<li>Copyright Act 1968 (Cth), including the concepts of \u201cwork\u201d, \u201ccopyright\u201d, ownership, infringement, and remedies including additional damages under s 115(4).<\/li>\n<li>Corporations Act 2001 (Cth) ss 182(1) and 183(1), addressing improper use of position and improper use of information by officers or employees, and related liability pathways including involvement.<\/li>\n<li>Evidence Act 1995 (Cth) s 140(1) (civil standard of proof), applied together with the Briginshaw v Briginshaw approach to actual persuasion on serious allegations.<\/li>\n<li>Procedural powers and confidentiality-related considerations under the Federal Circuit and Family Court of Australia Act 2021 (Cth).<\/li>\n<\/ul>\n<h6><strong>Evidence Chain<\/strong><\/h6>\n<p>A practical way to see the Court\u2019s logic is to track the \u201cfive-link\u201d structure in each victory point: statutory provision; evidence; inference; credibility evaluation; conclusion.<\/p>\n<p><strong>Victory Point 1: Proving the download and its timing as the gateway fact<\/strong><br \/>\n&#8211; Evidence: system logs and surrounding communications established downloads while still employed and after intent to compete had formed.<br \/>\n&#8211; Legal effect: copying a protected work onto a device can constitute infringement; the timing also supported findings about purpose and misuse.<\/p>\n<p><strong>Victory Point 2: Treating template files as protectable expression, not mere ideas or standards<\/strong><br \/>\n&#8211; Evidence: the template files embodied skilled modelling steps, stability choices, and manufacturing constraints.<br \/>\n&#8211; Legal effect: copyright protects original expression fixed in material form, and a CAD file can embody that expression.<\/p>\n<p><strong>Victory Point 3: Using expert CAD analysis to move from \u201csimilarity\u201d to \u201cderivation\u201d<\/strong><br \/>\n&#8211; Evidence: expert analysis explained how parametric CAD models store geometry and design history, and why certain features and identical dimensions are unlikely to align absent derivation.<br \/>\n&#8211; Legal effect: reproduction can be inferred where the competing model bears the fingerprint of the original author\u2019s labour.<\/p>\n<p><strong>Victory Point 4: Deploying Blatch v Archer and Jones v Dunkel reasoning against missing explanations<\/strong><br \/>\n&#8211; Evidence: gaps in the First Respondent\u2019s account about what was downloaded and where key dimensions came from.<br \/>\n&#8211; Legal effect: the Court could more readily accept the Applicant\u2019s inferences and reject conclusory denials.<\/p>\n<p><strong>Victory Point 5: Establishing breach of confidence through identification, confidentiality, and misuse<\/strong><br \/>\n&#8211; Evidence: the Applicant identified specific file classes and the commercial sensitivity of templates and related business information; the Respondents\u2019 competing product launch supported misuse findings.<br \/>\n&#8211; Legal effect: equitable protection of confidential information restrains misuse even where the information is not \u201cproperty\u201d in the strict sense.<\/p>\n<p><strong>Victory Point 6: Converting the same facts into breach of fiduciary and statutory duties<\/strong><br \/>\n&#8211; Evidence: senior role, access, preparatory steps to compete, downloading, and competitive use.<br \/>\n&#8211; Legal effect: senior employees can owe fiduciary obligations; statutory duties prevent misuse of position and information for advantage or detriment.<\/p>\n<p><strong>Victory Point 7: Linking the Second Respondent to the wrongdoing<\/strong><br \/>\n&#8211; Evidence: control and benefit, and corporate participation in the competing business.<br \/>\n&#8211; Legal effect: involvement and knowing assistance attach liability where the company is the vehicle for misuse.<\/p>\n<p><strong>Victory Point 8: Remedy framing as deterrence and commercial correction<\/strong><br \/>\n&#8211; Evidence: the wrongdoing enabled a competing business and commercial gain.<br \/>\n&#8211; Legal effect: account of profits, damages, additional damages, injunctions, and delivery up\/destruction can be justified to strip gain and prevent recurrence.<\/p>\n<h6><strong>Judicial Original Quotation<\/strong><\/h6>\n<p>The Court\u2019s determinative reasoning was anchored in the evidentiary maxim that missing evidence can change the weight of the scales:<\/p>\n<blockquote><p>\n  \u201cWhen a court is deciding whether a party on whom rests the burden of proving an issue on the balance of probabilities has discharged that burden, regard must be had to that party\u2019s ability to adduce evidence relevant to the issue and any failure on the part of the other party to adduce available evidence in response.\u201d\n<\/p><\/blockquote>\n<p>This matters because the Respondents\u2019 narrative required positive, specific explanation: not only \u201cI did not copy\u201d, but \u201chere is how I built these exact dimensions and modelling choices independently\u201d. Where that explanation was missing, the Court was entitled to draw inferences with greater confidence from the Applicant\u2019s expert and factual evidence.<\/p>\n<h6><strong>Analysis of the Losing Party\u2019s Failure<\/strong><\/h6>\n<p>The Respondents\u2019 case failed at the points where courts expect detail, not generalities:<\/p>\n<ol>\n<li>Identification failure in defence posture<br \/>\nA denial that the Applicant proved the presence of particular files in the download dataset is weak where the First Respondent is uniquely placed to identify what she downloaded but does not do so concretely.<\/p>\n<\/li>\n<li>\n<p>Independent creation without an origin story<br \/>\nIndependent creation of CAD templates requires an evidentiary narrative: measurements, publicly available specifications, modelling logs, and credible explanation for identical dimensions. Without that, the defence reads like an assertion rather than proof.<\/p>\n<\/li>\n<li>\n<p>Underestimating the power of inference principles in digital disputes<br \/>\nIn cases of alleged misappropriation, the Court often decides between two stories by asking: who could explain this best, and did they? Failure to do so tends to magnify the strength of the opposing case.<\/p>\n<\/li>\n<li>\n<p>Compounding conduct and credibility<br \/>\nWhere downloading, business preparation, and competitive rollout form a coherent timeline, the Court is more likely to interpret disputed design similarity as derived copying rather than coincidence.<\/p>\n<\/li>\n<\/ol>\n<hr \/>\n<h4><strong>Implications<\/strong><\/h4>\n<ol>\n<li>\n<p>Your \u201cdigital workshop\u201d is as protectable as your physical workshop<br \/>\nIf your business runs on templates, treat them like machinery: access controls, audit logs, and clear policies matter because they are often the first evidence the Court will rely on.<\/p>\n<\/li>\n<li>\n<p>If you leave an employer, take your skill\u2014do not take their templates<br \/>\nAustralian law distinguishes between what is in your head and what is in their system. Your experience travels with you; their confidential files and protected works do not.<\/p>\n<\/li>\n<li>\n<p>Independent creation is not a slogan, it is a story you must prove<br \/>\nIf you truly created something independently, keep the trail: drafts, measurement sources, modelling steps, and dated work files. Without that, similarity can become liability.<\/p>\n<\/li>\n<li>\n<p>For employers, clarity beats hope<br \/>\nIf your key assets are digital templates, invest early in written contracts, clear IP clauses, confidentiality regimes, and practical security. Litigation is a poor substitute for systems.<\/p>\n<\/li>\n<li>\n<p>Litigation choices should be evidence-led, not anger-led<br \/>\nWhen disputes arise, the side that wins is often the side that can present a clean chain: who had access, what moved, what was built, and why the evidence points in one direction.<\/p>\n<\/li>\n<\/ol>\n<hr \/>\n<h4><strong>Q&amp;A Session<\/strong><\/h4>\n<ol>\n<li>\n<p>If the competing product looks similar, is that automatically copyright infringement?<br \/>\nNot automatically. Similarity alone is not enough. The Court examines whether the competing work reproduces a substantial part of the original, focusing on the quality of what was taken. In CAD disputes, identical dimensions and structural modelling features can support an inference of reproduction, especially where the origin is unexplained.<\/p>\n<\/li>\n<li>\n<p>If some dimensions are public standards, can a person still be liable for copying?<br \/>\nYes, if what is reproduced goes beyond public standards and reflects the original author\u2019s skill and labour in the template\u2019s expression and implementation. A product can incorporate public constraints yet still infringe if it reproduces the original combination of choices that makes the template function as a manufacturable model.<\/p>\n<\/li>\n<li>\n<p>Why do courts care so much about missing explanations?<br \/>\nBecause fairness and accuracy in fact-finding depend on parties adducing evidence that is within their control. If a party could explain the origin of key facts\u2014like where exact dimensions came from\u2014but does not, the Court may weigh the available evidence more strongly against them.<\/p>\n<\/li>\n<\/ol>\n<hr \/>\n<h2>Appendix: Reference for Comparable Case Judgments and Practical Guidelines<\/h2>\n<h3>1. Practical Positioning of This Case<\/h3>\n<p>Case Subtype: Commercial Intellectual Property and Employee Competition Dispute involving CAD template misappropriation<br \/>\nJudgment Nature Definition: Final Judgment<\/p>\n<h3>2. Self-examination of Core Statutory Elements<\/h3>\n<p>This case most closely aligns with Category \u2463 Commercial Law and Corporate Law for the purpose of practical testing, with necessary adaptation to intellectual property and confidentiality contexts. The following standards are for reference only and tend to be determined by the specific evidence in each case.<\/p>\n<p><strong>Core Test: Contract Formation<\/strong><br \/>\nOffer: Was a clear promise or proposal made that could be accepted?<br \/>\nAcceptance: Was there an unqualified assent to that offer?<br \/>\nConsideration: Was something of value exchanged, including work performed for remuneration?<br \/>\nIntention to create legal relations: In an employment or commercial setting, intention tends to be determined where the arrangement is structured, remunerated, and operationally integrated.<\/p>\n<p><strong>Core Test: Misleading or Deceptive Conduct (s 18 of the Australian Consumer Law)<\/strong><br \/>\nTrade or commerce: Was the conduct in a business context?<br \/>\nConduct: Was there a representation or course of conduct?<br \/>\nMisleading tendency: Would ordinary members of the relevant class likely be misled?<br \/>\nCausation and loss: Is there a causal connection between the conduct and claimed loss?<br \/>\nPractical note: While not central to this judgment, similar fact patterns can sometimes generate ancillary consumer law issues in marketing or origin representations.<\/p>\n<p><strong>Core Test: Unconscionable Conduct<\/strong><br \/>\nSpecial disadvantage: Was one party at a meaningful disadvantage, such as dependence, vulnerability, or lack of ability to protect interests?<br \/>\nKnowledge and exploitation: Did the other party know and take advantage in a way against conscience?<br \/>\nCommercial context: In employee competition disputes, unconscionability arguments tend to be relatively high risk unless there is clear evidence of exploitation beyond ordinary bargaining power dynamics.<\/p>\n<h3>3. Equitable Remedies and Alternative Claims<\/h3>\n<p>Where statutory law is contested or incomplete, Equity and common law doctrines can provide alternative pathways. The following are options that may be viable depending on evidence.<\/p>\n<p><strong>Promissory or Proprietary Estoppel<\/strong><br \/>\nClear promise or representation: Did one party make a definite assurance about ownership, future entitlement, or permitted use of assets or information?<br \/>\nDetrimental reliance: Did the other party act to their detriment in reliance, such as investing labour or money?<br \/>\nUnconscionability: Would it be against conscience to allow the promisor to depart from the assurance?<br \/>\nResult reference: Equity may restrain resiling from the promise and may grant relief calibrated to avoid detriment.<\/p>\n<p><strong>Unjust Enrichment and Constructive Trust<\/strong><br \/>\nBenefit: Did one party receive a benefit at the other\u2019s expense, such as labour embedded in a valuable template or a business built on misused assets?<br \/>\nAgainst conscience: Is retention of that benefit unjust in the circumstances?<br \/>\nResult reference: The Court may order restitutionary relief or declare beneficial interests where justice requires it, though such outcomes tend to be determined by the precision of evidence and the framing of relief.<\/p>\n<p><strong>Procedural Fairness in Related Contexts<\/strong><br \/>\nIf the dispute intersects with regulatory decisions, disciplinary processes, or internal investigations, procedural fairness issues may arise: opportunity to be heard, absence of bias, and reasoned decision-making. These matters can affect admissibility, credibility, and remedies.<\/p>\n<h3>4. Access Thresholds and Exceptional Circumstances<\/h3>\n<p><strong>Regular Thresholds<\/strong><br \/>\nLimitation periods: Claims in contract, confidence, and related causes are subject to limitation rules that vary by jurisdiction and cause of action; delay tends to increase risk.<br \/>\nJurisdiction: Correct forum selection is critical, especially where claims include federal IP statutes and corporate duties.<br \/>\nDiscovery and disclosure: Parties must comply with discovery obligations; failures tend to be determined adversely in costs and inference reasoning.<br \/>\nEmployment exit timing: Conduct before resignation often attracts heightened scrutiny because duties of loyalty and confidence tend to remain strongest during employment.<\/p>\n<p><strong>Exceptional Channels<\/strong><br \/>\nIf limitation is in issue, extension pathways may exist in narrow circumstances, but relief tends to be relatively high risk and fact-specific.<br \/>\nIf evidence has been lost through reformatting or deletion, courts may rely more heavily on forensic reconstruction and may draw stronger inferences where loss is unexplained.<\/p>\n<p><strong>Suggestion<\/strong><br \/>\nDo not abandon a potential claim simply because one standard element appears difficult. Carefully compare your facts to exceptional pathways, because in digital evidence disputes, the \u201cexception\u201d can be the difference between inference and uncertainty.<\/p>\n<h3>5. Guidelines for Judicial and Legal Citation<\/h3>\n<p><strong>Citation Angle<\/strong><br \/>\nIt is recommended to cite this case in submissions involving:<br \/>\n&#8211; whether CAD and template-based digital files can attract copyright protection;<br \/>\n&#8211; how courts assess substantial reproduction in technical design contexts;<br \/>\n&#8211; how breach of confidence is proved where information is embedded in production workflows; and<br \/>\n&#8211; how inference principles operate where key explanatory evidence is uniquely within a party\u2019s knowledge.<\/p>\n<p><strong>Citation Method<\/strong><br \/>\nAs positive support: Where your matter involves employee downloading, template-based manufacturing, expert evidence of structural similarity, and an unexplained origin of identical dimensions, citing this authority can strengthen arguments on infringement, misuse, and inference.<br \/>\nAs a distinguishing reference: If the opposing party cites this case, you should emphasise differences such as robust independent creation records, clearly segregated personal files, absence of competitive rollout, or transparent measurement sources that explain similarity without derivation.<\/p>\n<p><strong>Anonymisation Rule<\/strong><br \/>\nIn narrative and submissions, refer to the parties by procedural titles (Applicant, First Respondent, Second Respondent) and avoid real names except where required for formal citation of the case name and number.<\/p>\n<hr \/>\n<h2>Conclusion<\/h2>\n<p>This case illustrates a simple but powerful truth: in a template-driven manufacturing business, the template is not a mere convenience\u2014it is the business advantage.<\/p>\n<p>Golden Sentence: Everyone needs to understand the law and see the world through the lens of law. The in-depth analysis of this authentic judgment is intended to help everyone gradually establish a new legal mindset: True self-protection stems from the early understanding and mastery of legal rules.<\/p>\n<hr \/>\n<h2>Disclaimer<\/h2>\n<p>This article is based on the study and analysis of the public judgment of the Federal Circuit and Family Court of Australia (C21 Pty Ltd (Trustee) v Hou (No 5) [2025] FedCFamC2G 479), aimed at promoting legal research and public understanding. The citation of relevant judgment content is limited to the scope of fair dealing for the purposes of legal research, comment, and information sharing.<\/p>\n<p>The analysis, structural arrangement, and expression of views contained in this article are the original content of the author, and the copyright belongs to the author and this platform. This article does not constitute legal advice, nor should it be regarded as legal advice for any specific situation.<\/p>\n<p><\/p>\n<hr>\n<p><\/p>\n<h3>Original Case File:<\/h3>\n<div style=\"border: 1px solid #ccc; padding: 5px;\">\n    <iframe loading=\"lazy\" \n        src=\"https:\/\/drive.google.com\/file\/d\/1bcmuFrwzSmsArCwErlbyXGkDjhRV9i2E\/preview\" \n        width=\"100%\" \n        height=\"600px\" \n        style=\"border: none;\"><br \/>\n    <\/iframe>\n<\/div>\n<p style=\"text-align: right; font-size: 14px; margin-top: 10px;\">\n    \ud83d\udc49 <strong>Can&#8217;t see the full document?<\/strong><br \/>\n    <a href=\"https:\/\/drive.google.com\/file\/d\/1bcmuFrwzSmsArCwErlbyXGkDjhRV9i2E\/view\" target=\"_blank\" rel=\"noopener\">Click here to download the original judgment document.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Employee Downloading CAD Template Files for a Competing Product Line: When Do Near-Identical Dimensions Cross [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[939],"tags":[],"class_list":["post-6848","post","type-post","status-publish","format-standard","hentry","category-intellectual-property"],"acf":{"raw_judgment_text":"","presiding_judge":"","case_outcome":"","judgment_date":"","original_case_name":"","executive_summary":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Former employee downloaded core design templates and developed highly similar products: How to determine &#039;substantial reproduction&#039; and copyright infringement? - Somia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/somia.com.au\/zh\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Former employee downloaded core design templates and developed highly similar products: How to determine &#039;substantial reproduction&#039; and copyright infringement? - Somia\" \/>\n<meta property=\"og:description\" content=\"Employee Downloading CAD Template Files for a Competing Product Line: When Do Near-Identical Dimensions Cross [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/somia.com.au\/zh\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/\" \/>\n<meta property=\"og:site_name\" content=\"Somia\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-23T09:19:47+00:00\" \/>\n<meta name=\"author\" content=\"\u7d22\u7c73\u4e9a\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u7d22\u7c73\u4e9a\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data2\" content=\"26 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/somia.com.au\\\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/somia.com.au\\\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\\\/\"},\"author\":{\"name\":\"\u7d22\u7c73\u4e9a\",\"@id\":\"https:\\\/\\\/somia.com.au\\\/#\\\/schema\\\/person\\\/ec78184addb3f3dfd4c9909cb17a10d7\"},\"headline\":\"Former employee downloaded core design templates and developed highly similar products: How to determine &#8216;substantial reproduction&#8217; and copyright infringement?\",\"datePublished\":\"2026-02-23T09:19:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/somia.com.au\\\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\\\/\"},\"wordCount\":5280,\"publisher\":{\"@id\":\"https:\\\/\\\/somia.com.au\\\/#organization\"},\"articleSection\":[\"Intellectual Property (IP)\"],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/somia.com.au\\\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\\\/\",\"url\":\"https:\\\/\\\/somia.com.au\\\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\\\/\",\"name\":\"Former employee downloaded core design templates and developed highly similar products: How to determine 'substantial reproduction' and copyright infringement? - Somia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/somia.com.au\\\/#website\"},\"datePublished\":\"2026-02-23T09:19:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/somia.com.au\\\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\\\/#breadcrumb\"},\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/somia.com.au\\\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/somia.com.au\\\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9875\",\"item\":\"https:\\\/\\\/somia.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Former employee downloaded core design templates and developed highly similar products: How to determine &#8216;substantial reproduction&#8217; and copyright infringement?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/somia.com.au\\\/#website\",\"url\":\"https:\\\/\\\/somia.com.au\\\/\",\"name\":\"Somia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/somia.com.au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/somia.com.au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/somia.com.au\\\/#organization\",\"name\":\"Somia\",\"url\":\"https:\\\/\\\/somia.com.au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/somia.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/somia.com.au\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/\u7ea2_\u753b\u677f-1-1-1-edited-2.png\",\"contentUrl\":\"https:\\\/\\\/somia.com.au\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/\u7ea2_\u753b\u677f-1-1-1-edited-2.png\",\"width\":1588,\"height\":1059,\"caption\":\"Somia\"},\"image\":{\"@id\":\"https:\\\/\\\/somia.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/somia.com.au\\\/#\\\/schema\\\/person\\\/ec78184addb3f3dfd4c9909cb17a10d7\",\"name\":\"\u7d22\u7c73\u4e9a\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/63c92643362392138a6c25f1472f44c224ab0612e23fb616bb8d54d49216b839?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/63c92643362392138a6c25f1472f44c224ab0612e23fb616bb8d54d49216b839?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/63c92643362392138a6c25f1472f44c224ab0612e23fb616bb8d54d49216b839?s=96&d=mm&r=g\",\"caption\":\"\u7d22\u7c73\u4e9a\"},\"sameAs\":[\"http:\\\/\\\/somia.com.au\"],\"url\":\"https:\\\/\\\/somia.com.au\\\/zh\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Former employee downloaded core design templates and developed highly similar products: How to determine 'substantial reproduction' and copyright infringement? - Somia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/somia.com.au\/zh\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/","og_locale":"zh_CN","og_type":"article","og_title":"Former employee downloaded core design templates and developed highly similar products: How to determine 'substantial reproduction' and copyright infringement? - Somia","og_description":"Employee Downloading CAD Template Files for a Competing Product Line: When Do Near-Identical Dimensions Cross [&hellip;]","og_url":"https:\/\/somia.com.au\/zh\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/","og_site_name":"Somia","article_published_time":"2026-02-23T09:19:47+00:00","author":"\u7d22\u7c73\u4e9a","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"\u7d22\u7c73\u4e9a","\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"26 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/somia.com.au\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/#article","isPartOf":{"@id":"https:\/\/somia.com.au\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/"},"author":{"name":"\u7d22\u7c73\u4e9a","@id":"https:\/\/somia.com.au\/#\/schema\/person\/ec78184addb3f3dfd4c9909cb17a10d7"},"headline":"Former employee downloaded core design templates and developed highly similar products: How to determine &#8216;substantial reproduction&#8217; and copyright infringement?","datePublished":"2026-02-23T09:19:47+00:00","mainEntityOfPage":{"@id":"https:\/\/somia.com.au\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/"},"wordCount":5280,"publisher":{"@id":"https:\/\/somia.com.au\/#organization"},"articleSection":["Intellectual Property (IP)"],"inLanguage":"zh-Hans"},{"@type":"WebPage","@id":"https:\/\/somia.com.au\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/","url":"https:\/\/somia.com.au\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/","name":"Former employee downloaded core design templates and developed highly similar products: How to determine 'substantial reproduction' and copyright infringement? - Somia","isPartOf":{"@id":"https:\/\/somia.com.au\/#website"},"datePublished":"2026-02-23T09:19:47+00:00","breadcrumb":{"@id":"https:\/\/somia.com.au\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/#breadcrumb"},"inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["https:\/\/somia.com.au\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/somia.com.au\/former-employee-downloaded-core-design-templates-and-developed-highly-similar-products-how-to-determine-substantial-reproduction-and-copyright-infringement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9875","item":"https:\/\/somia.com.au\/"},{"@type":"ListItem","position":2,"name":"Former employee downloaded core design templates and developed highly similar products: How to determine &#8216;substantial reproduction&#8217; and copyright infringement?"}]},{"@type":"WebSite","@id":"https:\/\/somia.com.au\/#website","url":"https:\/\/somia.com.au\/","name":"Somia","description":"","publisher":{"@id":"https:\/\/somia.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/somia.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-Hans"},{"@type":"Organization","@id":"https:\/\/somia.com.au\/#organization","name":"Somia","url":"https:\/\/somia.com.au\/","logo":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/somia.com.au\/#\/schema\/logo\/image\/","url":"https:\/\/somia.com.au\/wp-content\/uploads\/2024\/09\/\u7ea2_\u753b\u677f-1-1-1-edited-2.png","contentUrl":"https:\/\/somia.com.au\/wp-content\/uploads\/2024\/09\/\u7ea2_\u753b\u677f-1-1-1-edited-2.png","width":1588,"height":1059,"caption":"Somia"},"image":{"@id":"https:\/\/somia.com.au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/somia.com.au\/#\/schema\/person\/ec78184addb3f3dfd4c9909cb17a10d7","name":"\u7d22\u7c73\u4e9a","image":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/secure.gravatar.com\/avatar\/63c92643362392138a6c25f1472f44c224ab0612e23fb616bb8d54d49216b839?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/63c92643362392138a6c25f1472f44c224ab0612e23fb616bb8d54d49216b839?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/63c92643362392138a6c25f1472f44c224ab0612e23fb616bb8d54d49216b839?s=96&d=mm&r=g","caption":"\u7d22\u7c73\u4e9a"},"sameAs":["http:\/\/somia.com.au"],"url":"https:\/\/somia.com.au\/zh\/author\/admin\/"}]}},"jetpack_featured_media_url":"","uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"\u7d22\u7c73\u4e9a","author_link":"https:\/\/somia.com.au\/zh\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Employee Downloading CAD Template Files for a Competing Product Line: When Do Near-Identical Dimensions Cross [&hellip;]","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/somia.com.au\/zh\/wp-json\/wp\/v2\/posts\/6848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/somia.com.au\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/somia.com.au\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/somia.com.au\/zh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/somia.com.au\/zh\/wp-json\/wp\/v2\/comments?post=6848"}],"version-history":[{"count":0,"href":"https:\/\/somia.com.au\/zh\/wp-json\/wp\/v2\/posts\/6848\/revisions"}],"wp:attachment":[{"href":"https:\/\/somia.com.au\/zh\/wp-json\/wp\/v2\/media?parent=6848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/somia.com.au\/zh\/wp-json\/wp\/v2\/categories?post=6848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/somia.com.au\/zh\/wp-json\/wp\/v2\/tags?post=6848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}