Quantcast

Tackling Online Scams – Your Problem or Mine?

With increasingly sophisticated online scams employing artificial learning, machine learning and deepfake technology, financial institutions are under pressure to ensure they have sufficiently robust processes to detect and combat scams. This article explores Singapore’s response to tackling this issue and where the responsibility lies in today’s world where digital payments are ubiquitous and seamlessly embedded.

What’s the Problem?

On 30 August 2024, the Ministry of Home Affairs (MHA) announced it will be introducing the Protection from Scams Bill (Scam Bill) in the coming months. This will empower the Singapore Police Force (SPF) to issue Restriction Orders (RO) to the seven Domestic Systemically Important Banks (D-SIBs) in Singapore to temporarily restrict the banking transactions of targets of ongoing scams who refuse to believe that they are being scammed1https://www.mha.gov.sg/mediaroom/press-releases/public-consultation-on-protection-from-scams-bill/#:~:text=Proposed%20Protection%20from%20Scams%20Bill&text=The%20proposed%20Bill%20seeks%20to,money%20transfers%20to%20the%20scammer.. This is the latest of several legislative and enforcement efforts in addressing the proliferation of online scams.

When news broke in December 2021 that at least S$8.5 million was lost to phishing scams involving OCBC Bank2https://www.channelnewsasia.com/singapore/ocbc-phishing-sms-scam-do-not-click-bitly-url-link-2407796 (OCBC Phishing Scam), there was intense media scrutiny and over the following few weeks, we saw that amount climb to a total of S$13.7 million with 790 victims3https://www.ocbc.com/group/media/release/2022/media-statement-30-jan-phishing-scam.page. The reported facts were: victims received unsolicited SMSes claiming that there were issues with their bank accounts; they were asked to click on a link to resolve the issue; upon clicking, they would be redirected to fake bank websites and asked to key in their account login details. They later found out that they had been scammed when they received notifications informing them of unauthorised transactions charged to their bank accounts4https://www.channelnewsasia.com/singapore/ocbc-phishing-sms-scam-do-not-click-bitly-url-link-2407796. Even though OCBC found in its investigations that these victims had provided their online banking log-in credentials and one-time PIN to phishing websites which enabled scammers to take over their accounts, OCBC made full “goodwill payouts” to the victims. At the time, there was little to go on in terms of hard law that would hold OCBC liable to the victims for the full amount lost in such circumstance specifically, where the victims had shared their log-in credentials and “authorised” these transactions. Without any specific legislation or regulatory requirements, we would look to the bank’s terms and conditions and these would typically shift the responsibility to customers to ensure that they secure their log-in credentials or access codes. The bank could certainly still be held liable where victims can demonstrate negligence on the bank’s part, e.g. a lapse in security measures of the bank making vulnerability to such phishing attacks. It is not clear whether there were any lapses but victims reported waiting a long time to reach OCBC’s hotline and by the time they got through, the scammer had already siphoned much of their funds5https://www.straitstimes.com/tech/tech-news/how-sms-phishing-scams-have-affected-ocbc-customers-and-put-text-messaging-security-in-focus. OCBC also noted its “customer service and response fell short” of expectations6https://www.ocbc.com/group/media/release/2022/media-statement-30-jan-phishing-scam.page.

Since then, Singapore has rolled out various anti-scam measures but it remains a growing problem. The SPF cited in its Annual Scams and Cybercrime Brief 2023 that “[t]he number of scam and cybercrime cases increased by 49.6% to 50,376 in 2023, compared to 33,669 cases in 2022. Scams (including malware-enabled scams) accounted for 92.4% of the 2023 cases, with the total number of scam cases increasing by 46.8% to 46,563 in 2023, from 31,728 cases in 2022. Job scams, e-commerce scams, fake friend call scams, phishing scams and investment scams also remain the top five scam types of concern in 20237https://www.police.gov.sg/Media-Room/Police-Life/2024/02/Three-Things-you-Should-Know-About-the-Annual-Scams-and-Cybercrime-Brief-2023#:~:text=The%20number%20of%20scam%20and,from%2031%2C728%20cases%20in%202022. Further, around 13% of scams analysed by the Cyber Security Agency of Singapore (CSA) in 2023 contained AI-assisted/generated content8 and there is increasing use of deepfake messaging using AI to mimic public figures or people personally known to scam targets. The US FBI announced in early October 2024 that losses from cryptocurrency-related frauds and scams increased 45% in 2023 from 2022, totalling more than $5.6 billion, as scammers increasingly took advantage of the speed and irreversibility of digital asset transactions8https://www.channelnewsasia.com/business/losses-crypto-scams-grew-45-2023-fbi-says-4596876. With advancing technologies and evolving scam typologies, we discuss Singapore’s approach to where the responsibilities lies in these online scam cases.

What Are We Doing About It?

Some of the measures taken to address the issue include:

  1. Since 2019, Infocomm Media Development Authority (IMDA) implemented various safeguards against scam calls and SMSes, e,g. blocking calls from scam numbers, spoofed local numbers, robo-calls based on pattern recognition and SMSes containing malicious content and links.
  2. In 2022, SPF established the Anti-Scam Command (ASCom) to consolidate expertise and resources combat scams.
  3. In May 2022, MHA launched the E-commerce Marketplace Transaction Safety Ratings (TSR) which assigns e-commerce platforms an overall safety rating, indicating the extent to which the platforms have implemented safety features which are critical in combating scams, and the effectiveness of the platforms’ efforts in combating scams.9 The recommended user verification measures are reported to be effective, as the platforms which have implemented all the safety features (i.e. Amazon, Lazada and Qoo10) have received a low number of e-commerce scam rewards, and have been awarded the highest ratings under the TSR.9
  4. Since 2023, it is mandatory to register all alphanumeric SMS sender IDs with the Singapore SMS Sender ID Registry (SSIR), and messages from unregistered IDs are labelled as “Likely-SCAM”. From April 2024, post-paid SIM cards will be limited to 10 per subscriber.
  5. Facial recognition is now required for higher risk transactions on Singpass and CPF withdrawals.
  6. To tackle money mules who allow scammers to use their accounts or sell their bank accounts or disclose Singpass credentials, the Computer Misuse Act 1993 (CMA) and Corruption, Drug Trafficking and Other Serious Crimes (Confiscation of Benefits) Act 1992 (CDSA) were amended.

More specifically for FIs that are key in flagging and investigating suspicious transactions and players, as well as restraining the flow of potentially illicit funds, there have been several developments. The Monetary Authority of Singapore (MAS) and Association of Banks in Singapore (ABS) established anti-scam practices for major retail banks in Singapore in 2022, including the following measures:

  1. the removal of clickable links in emails or SMSes sent to retail customers;
  2. threshold for funds transfer transaction notifications to customers to be set by default at S$100 or lower;
  3. delay of at least 12 hours before activation of a new soft token on a mobile device;
  4. notification to existing mobile number or email registered with the bank whenever there is a request to change a customer’s mobile number or email address;
  5. cooling-off period before implementation of requests for key account changes such as in a customer’s key contact details;
  6. default transaction limit for online funds transfers set to S$5,000 or lower;
  7. emergency self-service “kill switch” for customers to suspend their accounts quickly if they suspect their bank accounts have been compromised; and
  8. facilitating rapid account freezing and fund recovery operations by co-locating bank staff at the SPF Anti-Scam Centre, and enhancing fraud surveillance systems to take into account a broader range of scam scenarios.9https://abs.org.sg/docs/library/mas-abs-media-release-on-2-june-2022

The MAS proposes to extend these anti-scam measures to all banks, non-bank credit card issuers, finance companies and relevant payment service providers (responsible FIs) who issue protected accounts10”protected account” means any payment account that (a) is held in the name of one or more persons, all of whom are either individuals or sole proprietors; (b) is capable of having a balance of more than S$500 (or equivalent amount expressed in any other currency) at any one time, or is a credit facility; (c) is capable of being used for electronic payment transactions; and (d) where issued by a relevant payment service provider is a payment account that stores specified e-money. and not just major retail banks11MAS Consultation Paper on Proposed Enhancements to the E-Payments User Protection Guidelines (October 2023), at para 3.1. It will do so by amending the E-Payments User Protection Guidelines (EUPG) which sets out the MAS’ expectations of responsible FIs.

So Who is Liable?

For many online scams, funds are routed through several accounts to evade detection and once funds are transferred out of Singapore, recovery is challenging. The question then is what recourse do victims have and who should bear the loss?

In the OCBC Phishing Scam, the police reportedly froze 121 local bank accounts and recovered S$2 million lost by victims but many of the scam websites were hosted by webhosting companies based overseas12https://www.straitstimes.com/singapore/politics/2m-from-ocbc-scams-recovered-121-local-bank-accounts-frozen-desmond-tan. The MAS took supervisory action against OCBC requiring an independent consultant to review anti-scam systems and processes. The review concluded that there was no cyberattack on its IT systems and the MAS required OCBC to maintain additional regulatory capital amounting to approximately S$330 million in regulatory capital at 31 March 202213https://www.ocbc.com/group/media/release/2022/media-statement-mas-response.page. The MAS also declared that this one-off gesture by the bank was not a general precedent for future cases although it announced the development of a framework to provide clarity on how losses arising from scams should be shared among consumers and financial institutions14https://www.todayonline.com/singapore/ocbcs-goodwill-payouts-scammed-victims-were-one-gesture-do-not-set-general-precedent-future-cases-mas-1809656. In February 2024, a man linked to the OCBC Phishing Scam was sentenced to 15 months’ jail for being part of a money laundering operation and a member of an organised crime group. He admitted that he and his accomplices had sourced and provided control of bank accounts to various unknown people who were believed to be linked to overseas syndicates and these accounts were used to receive and dissipate funds from multiple victims.

Under the EUPG (which is currently in force), a responsible FI is liable for and should credit the customer’s protected account with the total loss arising in from an unauthorised transaction as soon as possible once the responsible FI has completed its investigation and assessed the customer is not liable for any loss arising from the unauthorised transaction unless the customer’s recklessness was the primary cause of the loss (e.g. they failed to protect access codes or failed to report the unauthorised transaction). The EUPG also specifically spells out that not only is the responsible FI liable for the loss resulting from fraud or negligence by the responsible FI, its employee, agent or outsourcing service provided by also any non-compliance by the responsible FI or its employees with any of its MAS regulatory requirements or its duties under the EUPG.

Going back to the facts of the OCBC Phishing Scam, the guidance under the EUPG would appear to support full payouts being provided to all affected customers. Notably, under the EUPG, “unauthorised transaction” is defined in relation to any protected account, as “any payment transaction initiated by any person without the actual or imputed knowledge and implied or express consent of an account user of the protected account” which appears broad enough to cover falling prey to a phishing scam and sharing your access code. That said, the customer would also be expected to have taken certain minimum steps to protect access to the protected account, e.g. updating the device’s browser to the latest version, patching the device’s operating system with regular security updates, etc.

Shared Responsibility Framework – FIs and Telcos

While it makes sense to look to the banks or relevant payment service providers, e.g. Grab or other e-wallet providers, as holders of your funds to block digital transfers, the contact by a scammer is not usually made through your bank or Grab. It is often through a telecommunications network provider (Telco), e.g. via SMS or on a social media platform or online marketplace.

Acknowledging the role of Telcos in tackling scams (e.g. delivering unsolicited SMSes as in the OCBC Phishing Scam), in October 2023, MAS and IMDA issued a consultation paper proposing the Shared Responsibility Framework (SRF) setting out a framework for the sharing of responsibility between responsible FIs (major banks and relevant payment services providers), telecommunications providers which are mobile network operators (Telcos) and consumers for losses arising from unauthorised transactions made through phishing scams. The SRF and EUPG are meant to complement each other with SRF drawing duties from the EUPG.

The SRF utilises a “waterfall” approach where the responsible FI is expected to bear full losses if any of its duties under the SRF are breached. Next, if the responsible FI has fulfilled all its duties but the Telco (and its duties are drawn from some of IMDA’s issued directions to telcos under Singapore’s Telecommunications Act15MAS Consultation Paper on Proposed Shared Responsibility Framework (October 2023), at para 5.10) is assessed to have breached its duties under the SRF, then the Telco is expected to bear the full losses. Lastly, if both the responsible FI and Telco have fulfilled their duties under the SRF, then the consumer will bear the full losses.16MAS Consultation Paper on Proposed Shared Responsibility Framework (October 2023), at para 6.1

The SRF has yet to come into force although this is expected by the end of this year. Again, going back to the OCBC Phishing Scam, the SRF certainly addresses learnings from the incident. However, the SRF is designed to cover phishing scams with a digital nexus (where a consumer is deceived into clicking on a phishing link and entering his credentials on a fake digital platform thereby allowing the scammer to steal such credentials) and with a clear Singapore nexus (which means the impersonated entities must either be Singapore-based or based overseas but offer their services to Singapore residents). While phishing scams are one of the top types of scams in 2023, they only account for 12.8% of all scam types reported in 2023,17https://www.police.gov.sg/-/media/C0363F7D6965423B94454A98A6FB67B6.ashx, at para 8 and do not fall under the top five scam types in terms of amount lost in 2023.18https://www.police.gov.sg/-/media/C0363F7D6965423B94454A98A6FB67B6.ashx, at para 9 The SRF explicitly excludes scams where victims authorise payments to the scammer (e.g. investment scams and love scams) (authorised scams), scams where victims were deceived into giving away credentials to the scammer directly through text messages or by non-digital means, and unauthorised transaction scam variants that do not involve phishing (e.g. hacking, identity theft, and malware-enabled variants).19MAS Consultation Paper on Proposed Shared Responsibility Framework (October 2023), at para 4.4 Malware scams are not included either given their evolving nature and the SRF is intended to deal with common and known scam typologies. That said, the MAS noted that Government agencies and banks are working closely to tackle malware scams and banks have announced that they will take more forward-leaning approach towards assessing goodwill payments for customers affected by malware scams.

For scams not in scope, existing avenues for recourse remain open and these include requesting their FIs to assess their case for goodwill payments or filing a dispute with the Financial Industry Disputes Resolution Centre (FIDREC)20MAS Consultation Paper on Proposed Shared Responsibility Framework (October 2023), at para 4.6.

Social Media Platforms

But does the SRF do enough to address the evolving nature of scams facing Singapore?

For authorised scams, where the victims wish to or in some cases, insist on, authorising transfers to scammers even after concern having been raised by their banks, the powers under the proposed Scams Bill for ROs to be issued to stop payments are welcomed. In such cases, we agree FIs and Telcos should not be made to bear the losses of victims – rather the focus should be on education of the public and individual vigilance.

However, with the proliferation of fake videos on social media platforms, e.g. the deepfake video of Senior Minister Lee Hsien Loong promoting investment products, one wonders whether we are missing a vital player in the whole scam chain – the social media platforms and online market places. SPF expressed concern relating to three Meta products – Facebook, WhatsApp and Instagram – which continue to be over-represented amongst the platforms exploited by scammers to contact potential victims and conduct their scams.21 Of the scam cases where scammers contacted victims through social media, the cases that involved Facebook and Instagram constitute about 90.2% of all such cases.21

Various legislative measures affecting social media platforms and online marketplaces include:

  1. A new Online Criminal Harms Act (OCHA) was passed on July 2023 setting out requirements that online platforms must adopt. Effective 1 February 2024, the authorities are empowered to order swift blocking of fraudulent accounts or content on direct online services to prevent suspected scam accounts from interacting with or reaching Singapore users.21https://www.mddi.gov.sg/media-centre/press-releases/measures-to-protect-singaporeans-against-online-scams/ New measures to criminalise abuse of SIM cards are also expected.
  2. Two new Code of Practices (COP) have been issued under OCHA. From 26 June 2024, failure to comply with these requirements may lead to issuance of a rectification notice. Failing to comply with a rectification notice is a criminal offence which can result in fines of up to S$1 million.22https://www.straitstimes.com/singapore/new-codes-of-practice-require-carousell-facebook-to-verify-risky-sellers-advertisers-to-curb-scams
    1. Under the COP for Online Communication Services, platforms like Facebook, WhatsApp, Instagram, Telegram and WeChat are required to proactively detect and fake action against suspected scam and malicious cyberactivities by creating a fast-track channel to receive and act on reports from authorities. By end of 2024, they must implement reasonable verification safeguards to root-out fake accounts by scammers or bots for malicious activities and they must submit an annual report to the authorities.
    2. Under the COP for eCommerce Services, Carousell and Facebook Marketplace will need to verify “risky” sellers for a start and if the number of scams reported on Carousell, Facebook Marketplace and Facebook advertisements do not drop significantly, MHA will require the two companies to verify the identities of all sellers and advertisers by early 2025.

However, to date, we are not aware of requirement for these players to compensate victims should their scam detection and prevention measures fall short.

Individual Vigilance and Collective Responsibility

What the EUPG and SRF also make clear is the role and duties of the customer in scam prevention and detection. There is an emphasis on individual vigilance and responsibility to practice proper cyber hygiene as the view is that full restitution without due consideration of culpability is neither fair nor desirable, as it can erode vigilance and personal responsibility, and lull consumers into complacency.23

Notwithstanding its limited scope, the SRF is a crucial first step in implementing a reimbursement framework which forms one part of the broader scheme of anti-scam efforts across the board. At the time the SRF was proposed, it was the first to include Telcos in the scam reimbursement frameworks. As Australia has recently announced its proposals to include not just Telcos but also social media platforms in its scam reimbursement framework, it would be interesting to see whether Singapore revisits the scope of the SRF given how rapidly scam typologies and anti-scam practices are evolving. We can certainly see benefits with placing responsibility with whole-of-the-scam chain.

Cooperation is the thorough conviction that nobody can get there unless everybody gets there.” – Virginia Burden Tower.

Tackling online scams is not simply your problem, my problem but our problem.

Endnotes

Endnotes
1 https://www.mha.gov.sg/mediaroom/press-releases/public-consultation-on-protection-from-scams-bill/#:~:text=Proposed%20Protection%20from%20Scams%20Bill&text=The%20proposed%20Bill%20seeks%20to,money%20transfers%20to%20the%20scammer.
2 https://www.channelnewsasia.com/singapore/ocbc-phishing-sms-scam-do-not-click-bitly-url-link-2407796
3 https://www.ocbc.com/group/media/release/2022/media-statement-30-jan-phishing-scam.page
4 https://www.channelnewsasia.com/singapore/ocbc-phishing-sms-scam-do-not-click-bitly-url-link-2407796
5 https://www.straitstimes.com/tech/tech-news/how-sms-phishing-scams-have-affected-ocbc-customers-and-put-text-messaging-security-in-focus
6 https://www.ocbc.com/group/media/release/2022/media-statement-30-jan-phishing-scam.page
7 https://www.police.gov.sg/Media-Room/Police-Life/2024/02/Three-Things-you-Should-Know-About-the-Annual-Scams-and-Cybercrime-Brief-2023#:~:text=The%20number%20of%20scam%20and,from%2031%2C728%20cases%20in%202022
8 https://www.channelnewsasia.com/business/losses-crypto-scams-grew-45-2023-fbi-says-4596876
9 https://abs.org.sg/docs/library/mas-abs-media-release-on-2-june-2022
10 ”protected account” means any payment account that (a) is held in the name of one or more persons, all of whom are either individuals or sole proprietors; (b) is capable of having a balance of more than S$500 (or equivalent amount expressed in any other currency) at any one time, or is a credit facility; (c) is capable of being used for electronic payment transactions; and (d) where issued by a relevant payment service provider is a payment account that stores specified e-money.
11 MAS Consultation Paper on Proposed Enhancements to the E-Payments User Protection Guidelines (October 2023), at para 3.1
12 https://www.straitstimes.com/singapore/politics/2m-from-ocbc-scams-recovered-121-local-bank-accounts-frozen-desmond-tan
13 https://www.ocbc.com/group/media/release/2022/media-statement-mas-response.page
14 https://www.todayonline.com/singapore/ocbcs-goodwill-payouts-scammed-victims-were-one-gesture-do-not-set-general-precedent-future-cases-mas-1809656
15 MAS Consultation Paper on Proposed Shared Responsibility Framework (October 2023), at para 5.10
16 MAS Consultation Paper on Proposed Shared Responsibility Framework (October 2023), at para 6.1
17 https://www.police.gov.sg/-/media/C0363F7D6965423B94454A98A6FB67B6.ashx, at para 8
18 https://www.police.gov.sg/-/media/C0363F7D6965423B94454A98A6FB67B6.ashx, at para 9
19 MAS Consultation Paper on Proposed Shared Responsibility Framework (October 2023), at para 4.4
20 MAS Consultation Paper on Proposed Shared Responsibility Framework (October 2023), at para 4.6
21 https://www.mddi.gov.sg/media-centre/press-releases/measures-to-protect-singaporeans-against-online-scams/
22 https://www.straitstimes.com/singapore/new-codes-of-practice-require-carousell-facebook-to-verify-risky-sellers-advertisers-to-curb-scams

The post Tackling Online Scams – Your Problem or Mine? appeared first on The Singapore Law Gazette.


The Doctrine of Comity in Singapore Law – A Trainee’s Perspective

Comity is a legal doctrine necessitated by international politics. Without it, private transnational disputes cannot be easily resolved and can even create tensions between countries. Not surprisingly, a number of common law jurisdictions including Singapore have applied comity in one form or another. However, if they exercise comity but are not reciprocated in kind, they could become disadvantaged. More comity given could mean a loss of sovereignty. It is a Prisoner’s Dilemma. While the development of the doctrine of comity must be constitutional and serve justice, the realities of international relations cannot be ignored.

As a retired diplomat embarking on a career in law, I naturally take an interest in how international relations concepts like comity are applied in judicial decision-making. It is clear that judges in many common law jurisdictions including Singapore1https://www.singaporelawwatch.sg/About-Singapore-Law/Overview/ch-06-the-conflict-of-laws take comity into account where relevant in arriving at their decisions. Considerations of comity come into play when people with different nationalities and their properties interact across national boundaries. In the event of a dispute, the same set of multinational facts could be adjudicated in more than one country. It is not difficult to imagine that courts in different countries, if they do not exercise comity, could end up with opposed decisions, creating an awkward situation not just for the parties, but also between countries.

Comity appears to be a major factor in three main types of disputes. First, parties may fight over their preferred jurisdiction based on natural forum principles, anti-suit injunction, or using transnational issue estoppel. Second, it could be invoked to enforce foreign judgments including insolvency outcomes. Third, it could be called upon to reject the extension of jurisdiction overseas. That said, comity could be at issue in any type of situation with a foreign element, including criminal cases. As of 10 July 2024, there are 242 reported Singapore judgments on LawNet2LawNet is an online database on case law and other material on Singapore and other jurisdictions. It is maintained by the Singapore Law Academy and is available free to Singaporeans at the court libraries. that refer to “comity”. It is a small number relative to all reported cases, but not insignificant. In this era of globalisation, few cases end up in court without an international element. The law on comity is thus important to law practitioners and citizens alike.

What is comity in the first place? Comity according to the Oxford dictionary is simply courtesy and considerate behaviour towards others. There is comity amongst diplomats on the ground for sure. Comity between nations or international comity is a common practice, perhaps even a value consciously adopted, but there is no agreement that it has become customary international law. If comity has become a norm, it would merely reflect the mutual respect or behaviour consistent with deeper underlying values such as the sovereignty and equality of states. In this sense, comity is no more than an epiphenomenon. Comity cannot be used to predict or explain how nations behave, and not surprisingly has not become a focus of scholars of international relations. Interestingly, most of the literature on comity have been produced by lawyers rather than political scientists.

In the eyes of lawyers and diplomats alike, comity, elastic as the concept may be,3Dicey, Morris and Collins on the Conflict of Laws (Lord Collins of Mapesbury gen ed) (Sweet & Maxwell, 16th Ed, 2022) at para 1-008, cited in Gonzalo Gil White v Oro Negro Drilling Pte Ltd and others (2024) 1 SLR 307 at (70) is key to maintaining amicable and workable relationships amongst countries. International law scholars like to emphasise comity as deference to other countries not required by international law. They tend to speak with one view on comity. However, jurists at the national level have vastly different ideas. A survey of selected and limited commentaries and cases in several common law jurisdictions (England,4Airbus Industrie v Patel (1999) 1 AC 119), National Bank of Kazakhstan and others v. Bank of New York Mellon SA/NV, London Branch and others (2020) EWHC 916 (Comm), RiverRock Securities v. International Bank of St. Petersburg (2020) EWHC 2483 British Virgin Islands,5https://www.harneys.com/insights/the-thorny-issue-of-illegality-mistake-and-the-unruly-horse-of-public-policy/#:~:text=While%20the%20award%20of%20compound,friendly%20state%2C%20such%20as%20Thailand Cayman Islands,6https://www.ogier.com/news-and-insights/insights/careful-consideration-of-comity-when-winding-up-a-cayman-company/ US,7Laker Airways Ltd v Sabena, Belgian World Airlines (1984) 731 F 2d 909 Canada,8Kevin W. Gray, The Most Canadian of Virtues: Comity at the Supreme Court of Canada (https://ssrn.com/abstract=3333599) Australia,9Schultz, T., & Mitchenson, J. (2016). Navigating Sovereignty and Transnational Commercial Law: The Use of Comity by Australian Courts. Journal of Private International Law, 12(2), 344-378 (https://doi.org/10.1080/17441048.2016.1206704) India10International Insolvency Review (2023) 32:228–252 (wileyonlinelibrary.com/journal/iir), Alcon Electronics Private Limited v. Celem SA of FAO 34320 Roujan, France and Another (2017) 2 SCC 253 and Singapore11The “Reecon Wolf” (2012) 2 SLR 289, Lakshmi Anil Salgaocar v Jhaveri Darsan Jitendra (2019) 2 SLR 372, Gonzalo Gil White v Oro Negro Drilling Pte Ltd and others (2024) 1 SLR 307, Esben Finance Ltd and others v Wong Hou-Lianq Neil (2022) 1 SLR 136, Beckkett Pte Ltd v Deutsche Bank AG (2011) 2 SLR 96, Merck Sharp & Dohme Corp (formerly known as Merck & Co, Inc) v Merck KGaA (formerly known as E Merck)
(2021) 1 SLR 1102
) show that comity is used variously as: a consideration, concept, principle, judicial attitude, presumption in interpretation, evidential rule, legal tool, doctrine and public policy.

To elaborate further, comity could just be one of many factors to consider when deciding a case. At the lower end of the scale, as it were, it may not even be relevant. In the Singapore case of Gonzalo Gile White v Oro Negro Drilling [2024] 1 SLR 307, the appellant argues that the doctrine of comity requires Singapore courts to give effect to a Mexican judgment. However, the Court of Appeal took the view that comity is not a factor in this case where the foreign judgment was obtained contrary and after a local interim injunction against any foreign proceeding. At the other extreme, comity can be the decisive factor. In the English case of Airbus Industrie GIE v Patel and Others [1999] 1 A.C. 119, the House of Lords held that comity is the reason why it would not stay the proceeding in Texas, even though Texas is not the natural forum and proceeding there could be oppressive. In most other cases, such as The “Reecon Wolf” [2012] 1 SLR 289 in Singapore, courts have applied comity along with other factors to stay an action in favour of foreign proceedings. In construing a statute, the Australian Federal Court in Trade Practices Commission v Australian Iron and Steel Pty Ltd (1989) 22 FCR 305 at [41] recalled an old prima facie rule: “It is always to be understood and implied that the legislature of a country is not intending to deal with persons or matters over which, according to the comity of nations, the jurisdiction properly belongs to some other Sovereign or State.” Comity thus features as an important rule in interpretation.

The many faces of comity however do not make the concept slippery and aimless. On the contrary, each jurisdiction appears to be explicating and evolving its understanding and application of comity in certain direction, some more systematically than others. While this is not the place to attempt to identify where each jurisdiction currently stands in their journey, it is perhaps the occasion to propose a high-level strategic framework for locating all the possible compass points of their destination. As a starting point, more comity means less extra-territoriality, and to some, that could mean less sovereignty. Jurisdictions necessarily differ in the way they weigh comity against sovereignty. While sovereignty takes priority in every jurisdiction, it is also a matter of degree as to how much sovereignty could be traded for comity, in practice if not in principle.12For a closer analysis, including the view that comity is an extension of sovereignty, see (74)-(79) of Gonzalo Gil White v Oro Negro Drilling Pte Ltd and others (2024) 1 SLR 307 At the end of the day, there are just two polar opposite positions that a jurisdiction can move towards. On one end is the expansive and liberal approach where a country rarely defers to foreign decisions or proceedings but aggressively asserts its own jurisdiction overseas. At the other end of the spectrum is a conservative and restrained position where a country often yields to foreign decisions. I refer to them as minimum comity and maximum comity respectively below.

Let us pause for a little thought experiment. If all countries (and their judiciary) practise maximum comity, which is to defer to other countries, there could be a positive-sum outcome, and every country benefits. On the other hand, if all countries practise minimum comity, there will be a negative-sum outcome, and every country loses. If some countries go maximum while other do minimum, there will be sub-optimal outcomes. This is the classic Prisoner’s Dilemma.

Image may be NSFW.
Clik here to view.
In a multilateral world, where every country is part of the same community, comity is a public good in many senses. Country A, say Singapore, will then be located in the box with outcome of (3,3). However, in a fragmenting world, Country A could easily end up in (0,4) or (4,0). While one country defers or exercises maximum restraint to stay all proceedings, the other country could chose to minimise comity and take every opportunity to exercise jurisdiction; the outcome is a zero-sum game: there would be a winner and a loser. To avoid becoming the loser, every country may end up beggaring its neighbour with minimum comity. As a result, both Country A and B will end up in (-1,-1), where neither wants to be in the first place. As is well known in strategic studies and game theories, a Prisoner’s Dilemma is not easily overcome. Being transparent is not enough. Being principled also does not solve the problem. There is no sweet spot between maximum and minimum comity that can serve a country well in all geopolitical situations, especially in a world with increasing tensions, not to mention a VUCA13volatile, uncertain, complex, ambiguous world driven by AI.

Conclusion

In concluding, I hope that this little inter-disciplinary exercise between law and diplomacy has generated some interest in the legal application of the doctrine of comity. From here, there are several possible lines of enquiries or follow-ups. One is to analyse and write up the case law on comity in Singapore. Arguably, comity is more important to small countries than superpowers. Another is to compare how selected common law jurisdictions are similar or different in their use of comity. A third is to understand how civil law jurisdictions view and apply comity if at all. Fourth is to develop indices to gauge where jurisdictions stand on comity and how they are trending between maximum and minimum comity. It is natural for lawyers to focus on what they know best which is the law. But the law, in my view, is not an end in itself, but a means to some larger goals. Let’s call it sustainable justice for now. With my old lenses as diplomat, I can’t see the law as something insulated from global politics. The idea of comity exists to facilitate interactions amongst nations and their people. The availability of comity, whether fat (in the sense of taking an expansive position) or thin (a restrictive position), should depend not just on judicial reasoning around justice and the law, but also on the dynamics of diplomacy including the Prisoner’s Dilemma.

The author wishes to thank K&L Gates Straits Law LLC and its then Managing Director/Partner Sreenivasan Narayan S.C. and Prof. Tommy Koh, Ambassador-at-Large, the Ministry of Foreign Affairs for their feedback. The views and errors are his.

Endnotes

Endnotes
1 https://www.singaporelawwatch.sg/About-Singapore-Law/Overview/ch-06-the-conflict-of-laws
2 LawNet is an online database on case law and other material on Singapore and other jurisdictions. It is maintained by the Singapore Law Academy and is available free to Singaporeans at the court libraries.
3 Dicey, Morris and Collins on the Conflict of Laws (Lord Collins of Mapesbury gen ed) (Sweet & Maxwell, 16th Ed, 2022) at para 1-008, cited in Gonzalo Gil White v Oro Negro Drilling Pte Ltd and others (2024) 1 SLR 307 at (70)
4 Airbus Industrie v Patel (1999) 1 AC 119), National Bank of Kazakhstan and others v. Bank of New York Mellon SA/NV, London Branch and others (2020) EWHC 916 (Comm), RiverRock Securities v. International Bank of St. Petersburg (2020) EWHC 2483
5 https://www.harneys.com/insights/the-thorny-issue-of-illegality-mistake-and-the-unruly-horse-of-public-policy/#:~:text=While%20the%20award%20of%20compound,friendly%20state%2C%20such%20as%20Thailand
6 https://www.ogier.com/news-and-insights/insights/careful-consideration-of-comity-when-winding-up-a-cayman-company/
7 Laker Airways Ltd v Sabena, Belgian World Airlines (1984) 731 F 2d 909
8 Kevin W. Gray, The Most Canadian of Virtues: Comity at the Supreme Court of Canada (https://ssrn.com/abstract=3333599)
9 Schultz, T., & Mitchenson, J. (2016). Navigating Sovereignty and Transnational Commercial Law: The Use of Comity by Australian Courts. Journal of Private International Law, 12(2), 344-378 (https://doi.org/10.1080/17441048.2016.1206704)
10 International Insolvency Review (2023) 32:228–252 (wileyonlinelibrary.com/journal/iir), Alcon Electronics Private Limited v. Celem SA of FAO 34320 Roujan, France and Another (2017) 2 SCC 253
11 The “Reecon Wolf” (2012) 2 SLR 289, Lakshmi Anil Salgaocar v Jhaveri Darsan Jitendra (2019) 2 SLR 372, Gonzalo Gil White v Oro Negro Drilling Pte Ltd and others (2024) 1 SLR 307, Esben Finance Ltd and others v Wong Hou-Lianq Neil (2022) 1 SLR 136, Beckkett Pte Ltd v Deutsche Bank AG (2011) 2 SLR 96, Merck Sharp & Dohme Corp (formerly known as Merck & Co, Inc) v Merck KGaA (formerly known as E Merck)
(2021) 1 SLR 1102
12 For a closer analysis, including the view that comity is an extension of sovereignty, see (74)-(79) of Gonzalo Gil White v Oro Negro Drilling Pte Ltd and others (2024) 1 SLR 307
13 volatile, uncertain, complex, ambiguous

The post The Doctrine of Comity in Singapore Law – A Trainee’s Perspective appeared first on The Singapore Law Gazette.

Open-source AI Models – What Are They, and Closing the Safety and Liability Gaps

Open-source software is widely used by companies, and now they are adopting “open source” AI models as well. Just last month, the Open Source Initiative released a definition of “open-source AI”. This article thus examines what are “open-source AI models” and how much they need to be “open” about – for example, balancing the need to release the training data to understand how model works with IP and data protection issues. It also examines what new risks they pose compared to “traditional” open-source software and closed AI models. Finally, we look at what measures are being instituted to mitigate the risks and ensure the models’ safe use, such as new types of licences (known as “Responsible AI Licences”), and regulatory controls in legislation and ongoing monitoring. For example, are open-source AI models subject to lighter regulatory regimes since they are distributed for free, and how is this balanced against the need for transparency on the model’s capabilities and development process?

The topic of “open-source AI models” is of interest because Singapore’s Infocomm Media Development Authority (IMDA) proposed a “shared responsibility” approach in May 2024, where responsibility should be allocated amongst the players in the AI development chain1For example, model developers, application deployers (who develop solutions or applications that make use of AI technology), application deployers (who provide the AI solutions to end-users) and cloud service providers (who provide the platform to host the AI application). according to the level of control they have, so that they can take the necessary action to protect end-users.2See the Model Governance Framework for Generative AI (30 May 2024) (“Model Gen-AI Framework”) at page 7. The IMDA has indicated that when apportioning responsibility, we “may also need to consider different model types (e.g. closed-source, open-source or open-weights) given the different levels of control that application deployers have for each model type”3See the Model Gen-AI Framework at page 7., and that the details of how these responsibilities will be allocated are in the midst of being worked out.4See the Model Gen-AI Framework at footnote 11.

We will thus explore the different types of models where they exist on a spectrum, described by IMDA as5As defined in the Model Gen-AI Framework at footnotes 9 and 10.:

  1. Closed-source models have all information about them kept private by the developer;
  2. Open-weights models make available pre-trained parameters/weights of the model, but not the training code, dataset, methodology, etc.
  3. Open-source models make available the full source code and information required for re-training the model from scratch, include model architecture code, training methodology and hyperparameters, original training dataset and documentation.

Part 1: What does it take to be an “open source” AI model? What are the difficulties in considering them “open-source”’ and how can these issues be overcome?

In this article, an “AI model” is created when algorithms (as a set of steps/instructions to reach an outcome) are applied to datasets to analyse the data, leading to an output that is examined and the algorithm iterated, until the most appropriate model emerges.6The definitions are based on (3.20) and (3.21) of the Singapore’s Model AI Governance Framework, as well as the definition from IBM at https://www.ibm.com/topics/ai-model. The IBM differentiates that “algorithms are procedures, often described in mathematical language or pseudocode, to be applied to a dataset to achieve a certain function or purpose” and “models are the output of an algorithm that has been applied to a dataset”. An AI model is thus what is “learnt” by the algorithm from the data. Algorithms can be expressed in, for example, mathematical language, pseudocode or programming languages.7https://www.techtarget.com/whatis/definition/algorithm

To understand the concept of “open-source AI models”, we will draw on concepts from open-source software, and their differences will come to light in the paragraphs below.

By way of background, open-source software is software where the source code (i.e. the instructions for a computer to execute, written in languages such as Python, C++ and Java) is made available to anyone to inspect, modify and enhance.8https://opensource.com/resources/what-open-source It is in contrast to “proprietary” or “closed-source” software where only the person or organisation who created the source code can access and modify it.9https://opensource.com/resources/what-open-source

For software to be considered open-source, the Open Source Initiative (OSI) defines 10 criteria to be met10See the definition at https://opensource.org/osd (last modified on 16 February 2024). (where the most relevant are set out below):

  1. the program must include source code, and must allow distribution in source code as well as compiled form;
  2. the license must allow modifications and derived works, and must allow them to be distributed under the same terms as the license of the original software;
  3. the licence must not discriminate against any person or group of persons;
  4. the license must not restrict anyone from making use of the program in a specific field of endeavour – e.g. it may not restrict the program from being used in a business, or from being used for genetic research.

The two criteria mentioned in paragraphs (c) and (d) are most affected when we look at “open-source AI models” and new licence terms developed for them:

  1. Issue 1: how much of the model and its associated/underlying information (e.g. the training data) must be shared so that the user can understand how it works?
  2. Issue 2: what happens if the licence restricts how the AI model can be used, given the growing adoption of “Responsible AI Licences” with use restrictions?

The IMDA has also highlighted that “[t]oday, however, there is a lack of information on the approaches being taken to ensure trustworthy models. Even in cases of “open-source” models, some important information like the methodology and datasets may not be made available.”11See the Model Gen-AI Framework at page 13. Therefore, can we still say that an AI model is ‘open source’ if key criteria are not met as we would then be ‘watering down’ the requirements for open source models? In exploring these issues, we will also look at the positions taken by recognised institutions like the OSI, as well as regulators in the EU and USA.

Issue 1: How much must be shared to allow meaningful use and modification of the model?

Unlike open-source software, with AI models, more than just the source code is needed to understand how the model works. There is no consensus on exactly what other components must be shared for an AI model to be considered as open-source, but it generally includes the following:12See page 11 of “Open Sourcing Highly Capable Foundation Models”, Centre for the Governance of AI (“CGAI Report”), accessible at https://cdn.governance.ai/Open-Sourcing_Highly_Capable_Foundation_Models_2023_GovAI.pdf, referencing training code, model weights and training data. See also page 3 of CNIL, “Open source practices in artificial intelligence” (July 2024) (“CNIL Report”), accessible at: https://www.cnil.fr/sites/cnil/files/2024-07/in-depth_analysis_open_source_practices_in_artificial_intelligence.pdf, which states: “Openness in AI generally does not refer to the publication of the source code related to the use or development of a model, although this may be part of it, but rather to the publication of the model and the weights, or parameters, that constitute it.”

  1. Training code – the instructions that guide the model training, optimising the model weights to improve the model’s performance on the training tasks (this is distinct from inference code, which implements the model after it is trained and allow it to perform tasks like writing and classifying images)13See the definitions on page 11 of the CGAI Report.
  2. Training data – you can’t just look at the code to understand how the model works and how to modify it, as you must also know what kind of data it was trained on. This thus opens up a package of legal issues not found in traditional open-source software: there are limitations to sharing training data, such as IP, privacy and confidentiality concerns, which will be exacerbated if all the training data is shared as-is.

    Practically, model developers may also be reluctant to disclose all their training data if it would expose the fact they trained on third-parties’ copyrighted material.14The Verge, “Open-source AI must reveal its training data, per new OSI definition”, 29 October 2024, accessible at: https://www.theverge.com/2024/10/28/24281820/open-source-initiative-definition-artificial-intelligence-meta-llama Even if they had obtained a licence to use that material for training, that licence may not extend to sharing a copy of that material with the wider public.

    However, it is also not the case that developers necessarily need access to all the training data to modify the AI model – what is helpful is detailed information about the dataset (the dataset building process rather than the dataset), such as where the data was from, so that they can build similar datasets to improve on the existing datasets.15See the interview with OSI’s Executive Director Stefano Maffulli at TechBrew, “The divide over open-source AI, explained” (18 June 2024), accessible at: https://www.emergingtechbrew.com/stories/2024/06/18/what-is-open-source-ai Hence, the issue is how much of the training data must be made available.

  1. Model weights – these are the learned connections between the material the model is trained on (numerical values that influence how much each factor has over an output, that are optimised during training).16See page 8 of the NTIA Report on “Dual-Use Foundation Models with Widely Available Model Weights” (July 2024) (“NTIA Report”), which explains AI model weights simply: “An AI model processes input – such as a user prompt – into a corresponding output, and the contents of that output are determined by a series of numerical parameters that make up the model, known as the model’s weights. The values of these weights, and therefore the behaviour of the model, are determined by training the model with numerous examples. The weights represent numerical values that the model has learned during training to achieve an objective specified by the developers.” These are crucial to determine the effectiveness of model, but are not necessarily covered under traditional open-source licences as they are not source code.

To this end, the OSI has recently released a definition of ‘open source AI’ (in October 2024)17https://opensource.org/ai/open-source-ai-definition, to cover these required components. Regardless of how the offering is characterised (as an AI system, model or weights), it must be made available under terms and in a way that grants users the freedom to use, study, modify and share the system (with or without modifications) for any purpose.

The OSI elaborates that in order to exercise these freedoms, the user must have access to the “preferred form” to make modifications to the system or its components, which includes the following elements:

  1. Training data – where there must be “sufficiently detailed information about the data used to train the system so that a skilled person can build a substantially equivalent system”18https://opensource.org/ai/open-source-ai-definition. This must include a description of all data used for training (including unshareable data due to privacy and copyright issues)19The OSI has made it clear that some training data can be excluded due to privacy and copyright issues. Otherwise, if there is unfettered access to all training data, then what is open-source AI will be reduced to a very small niche of AI that is trained only on open public data – see https://hackmd.io/@opensourceinitiative/osaid-faq, disclosing the provenance of the data, its scope and characteristics, how it was obtained and selected, labelling procedures, as well as data processing and filtering methodologies. It must also include a list of where to obtain publicly available training data and data from third parties.
  2. Code (both training code and inference code, and including code used for processing and filtering data);
  3. Model weights.

Nevertheless, it is very much open to interpretation what training data must be shared to meet the definition, given that the parallel system need only be “substantially equivalent”, and it would depend on the relative “skill” of the person trying to reproduce the system.20See commentary at https://www.juliaferraioli.com/blog/2024/on-open-source-ai/ Also, even if the developer discloses the third-party data source, the subsequent user of the model may not be granted the same permissions by the third party. 21See commentary at https://www.juliaferraioli.com/blog/2024/on-open-source-ai/ It is understandable that sensitive and confidential data cannot just be openly shared, but where the balance will be struck for this definition remains to be seen in practice. The French data protection regulator has suggested that synthetic data could be published instead, or subsets that would be representative of the full dataset (where any personal data has been removed).22Page 11 of the CNIL Report

Issue 2: Can you limit what the model can be used for?

The second issue is not one that is inherent in the model (e.g. how much information is made available, as discussed above), but is a feature of the licence attached to it. This limits the freedom to make use of the model in any field of endeavour.

Responsible AI Licences (RAIL)23See, for example, the BigScience RAIL Licence v1.0, available at https://huggingface.co/spaces/bigscience/license that have use restrictions are gaining traction,24It is not compulsory to use RAIL for AI models – there are also models licensed under traditional open-source licences like MIT and Apache. See the analysis in McDuff et. al., “On the Standardization of Behavioral Use Clauses and Their Adoption for Responsible Licensing of AI”, accessible at https://arxiv.org/pdf/2402.05979. where the use restrictions not only bind the organisation that uses/builds on the model, but the organisation must also integrate these restrictions in its subsequent licence, so anyone using the modified model is also bound.

Some of the restricted uses – e.g. not to use the model to “generate or disseminate verifiably false information with the purpose of harming others” – reflect what the law already is, hence the overwhelming majority of users would not use the model in that manner, even without the licence restriction. However, some RAILs can contain unique and specific purposes – e.g. not “to provide medical advice and medical results interpretation”,25See paragraph (l) in Attachment A to the BigScience RAIL Licence v1.0., in contrast to the responsible AI licence for GRID, available at https://github.com/ScaledFoundations/GRID-playground/blob/main/LICENSE so users must review the licence terms very carefully. Nevertheless, if someone is going to use an AI model for nefarious purposes, the prospect of breaching a licence condition is not going to stop them.

Separately, there are also licences that restrict who can use the model – e.g. if the person has more than 700 million monthly active users for their products/services, they must request for a permission to use the model, which the developer can decide not to grant.26See for example https://github.com/meta-llama/llama-models/blob/main/models/llama3_2/LICENSE This needs to be reconciled with the OSI criteria where the license must not discriminate against any person or group of persons (even if they are competitors).

Taking a pragmatic approach to promoting the safety of AI models regardless of how “open” they are

At the end of the day, what is the practical effect of coming up with a definition for “open source” AI models? If there are no tangible benefits to meeting the OSI definition (or any other emerging definition set to become an industry standard), then there are no incentives for companies to meet it, as it would involve them releasing a sizeable amount of training data together with their AI model, and possibly exposing themselves to liability when they make it public that they have trained their model on copyrighted materials without seeking permission from the rights holder.27Especially since the scope of the fair use and text and data mining exceptions are still pending before the courts.

Furthermore, some industry players have expressed the view that there is no single open-source AI definition as it would depend on the nature and purpose of the AI model.28See the comments by Meta spokesperson Faith Eischen, as reported in The Verge, “Open-source AI must reveal its training data, per new OSI definition” (29 October 2024), accessible at: https://www.theverge.com/2024/10/28/24281820/open-source-initiative-definition-artificial-intelligence-meta-llama They would support a definition of open source that “most suits what they’re pushing at the moment”.29Interview with GitHub’s Chief Legal Officer, “How big new AI regulatory pushes could affect open source” (17 September 2024), accessible at: https://www.emergingtechbrew.com/stories/2024/09/16/ai-regulations-open-source-development-shelley-mckinley-github. See also the view expressed by MIT Technology Review in “We finally have a definition for open-source AI” (22 August 2024), available at: https://www.technologyreview.com/2024/08/22/1097224/we-finally-have-a-definition-for-open-source-ai/, where they said “(d)escribing models as open source may cause them to be perceived as more trustworthy, even if researchers aren’t able to independently investigate whether they really are open source.”

On the regulatory front, the EU AI Act does not define “open-source” AI, but “targets certain categories of licences”,30As described by the CNIL (see page 2 of the CNIL Report). covering licences for software and data, including models, “that allows them to be openly shared and where users can freely access, use, modify and redistribute them or modified versions thereof”.31See Recital 102 of the EU AI Act. Unlike the OSI definition, it does not require training data to be shared32Even in the context of general-purpose AI models, recital 102 does not reference the extent of training data required – “General-purpose AI models released under free and open-source licences should be considered to ensure high levels of transparency and openness if their parameters, including the weights, the information on the model architecture, and the information on model usage are made publicly available.” to be considered open-source. But in the context of the EU AI Act, this makes sense because there are reduced obligations for certain AI models that are not monetised and fall under a “free and open-source licence”, so the definition must be one without room for ambiguity (although one could still argue one cannot freely modify the model without access to a certain amount of training data).

The USA also avoided using the term “open source”, instead calling them “dual-use foundation models with widely available model weights”.33See the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, issued on 30 October 2023. Its emphasis is on whether model weights are shared, the capacity of the model, as well as the resultant risks posed, rather than whether any training data must be shared and whether there can be any restrictions on downstream uses of the model, as that would be “meaningless when addressing threats posed by sophisticated threat actors who are already operating outside the law and thus don’t care about licence terms”.34David Evan Harris, “How to Regulate Unsecured “Open-Source” AI: No Exemptions”, accessible at: https://www.techpolicy.press/how-to-regulate-unsecured-opensource-ai-no-exemptions/

Ultimately, the reality is that any person can open up access to their AI models without meeting the OSI open-source definition, under any licence terms they choose. Hence, searching for a definition may not matter as much as identifying what is shared in the case of each AI model made available, as the degree of sharing poses different risks (which we will address in Part 2).

In the next Parts, where “open-source” AI models is used, it will refer to the spectrum of “open-source” and “open-weights” models, and not solely to models which conform to the OSI definition. An asterisk will be used to mark out such usage. A better term may in fact be “unsecured” AI models (proposed by the Centre for International Governance Innovation), which “convey[s] not only the literal choice to not secure the weights of these AI systems but also the threat to security posed by these systems”.35David Evan Harris, “Not Open and Shut: How to Regulate Unsecured AI” (6 September 2024), accessible at: https://www.cigionline.org/articles/not-open-and-shut-how-to-regulate-unsecured-ai/

Part 2: What are the risks posed by open-source* AI models?

We will cover the risks from the perspective of both users and developers of the models. We will not cover risks of erroneous, biased or toxic output, deepfakes, or leakage of confidential training data, as these concerns apply regardless of whether the model is open-source* or not.

Persons who use or modify the models released

A key concern is that if users do not have access to the training dataset, they will not know exactly what the model is trained on, which can be an issue where it comes to assessing the quality of the model and its appropriateness for the use case.36“Challenges and limits of an open source approach to Artificial Intelligence” at page13, accessible at https://www.europarl.europa.eu/RegData/etudes/STUD/2021/662908/IPOL_STU(2021)662908_EN.pdf. Nevertheless, model cards are raised as a solution to this issue (which we will discuss in Part 3).

Also, it is not clear who bears liability if the model released was trained on copyrighted material by the developer, which the user used/made modifications to, as unlike a proprietary model (where the developer can offer an indemnity for IP infringement), open-source* models are released without any warranties or indemnities relating to IP infringement.

There can also be cybersecurity vulnerabilities inherent in the model, although this is not unique to open-source AI models.37Also found in proprietary AI models, as well as in other open-source software.

Persons who release the open-source* models (i.e. developers)

First, developers are concerned about downstream misuse of their model. When the model weights are released, it becomes easier for people to circumvent safety features (e.g. content filters, blocklists and prompt shields to prohibit certain prompts) in the model.38Page 14 of the NTIA Report. This is also because many filters are implemented post-hoc as part of the model’s inference code, “rather than fundamentally changing the behaviour of the model itself”.39Page 12 of the CGAI Report. It is thus a matter of removing that one or two lines of code to make the model perform in undesired ways.40See the anecdotal example given page 12 of the CGAI Report.

Second, once the model is released, the developer cannot “take it back” even if the model has serious flaws, as users would have a copy of that model/weights within their own computers/servers and can keep going back to it. The developer also loses control over how the model is used, as if the model was instead a closed one accessed through an API, the user’s access could be restricted remotely by revoking the access key,41See the FAQs at https://bigscience.huggingface.co/blog/the-bigscience-rail-license and the developer can also monitor the kind of prompts that go to the model and how it is being used.

Part 3: How do we mitigate the risks of open-source* AI models, looking at regulatory approaches to complement RAIL licences and other best practices?

We will first cover how regulators are looking to control the development and use of open-source* AI models. Their position can generally be summed up as: developers still have responsibilities and standards to develop against so that the model remains safe, even if they release the model without charge, and under circumstances where people can freely use and adapt it.

At the outset, it is important to note that not every open-source* AI model will be restricted or regulated. The EU and US are only going to target the most powerful models (in terms of computing power), which pose serious public safety and national security risks. We will explore the positions across Singapore, EU and the US, and then conclude with identifying general takeaways for developers/deployers.

Singapore

The position in Singapore is still nascent and references open-source* models without distinction of their capabilities (unlike the EU and US). We had earlier discussed IMDA’s proposed “shared responsibility” approach, where responsibility is allocated based on the level of control over the model development. As model developers are “the most knowledgeable about their own models and how they are deployed”, they (regardless of whether the model is released open-source, open-weights or closed-source) are expected lead the ongoing/emerging discussions on how responsibilities should be allocated.42Page 8 of Gen-AI Model Framework. The IMDA also recommends that people who download open-source or open-weights models should do so “from reputable platforms to minimise the risk of tampered models”43Page 8 of Gen-AI Model Framework..

The Cybersecurity Agency of Singapore also issued Guidelines on Securing AI Systems in October 2024, recommending that persons downloading AI models should evaluate these open-source models, such as by running code checking, or checking against a database with vulnerability information.44See 2.1.9 of the CSA Companion Guide on Securing AI Systems.

USA

The US presently takes a relaxed approach towards open-source* AI models with little regulation,45Nicole Kobie, “Open-source AI just got a major seal of approval from US regulators – but will it push developers in the right direction?” (31 July 2024), accessible at: https://www.itpro.com/software/open-source/open-source-ai-just-got-a-major-seal-of-approval-from-us-regulators-but-will-it-push-developers-in-the-right-direction but the Government will shape future strategy based on real-life issues that surface.

The Executive Order on “Safe, Secure and Trustworthy Development and Use of AI” (October 2023) directed the holding of public consultations to determine the appropriate policy and regulatory approaches for “dual-use foundation models with widely available model weights”.46See section 4.6 of the Executive Order. This reference to “dual-use foundation models” means that the EO only targets the most powerful AI models — which contain at least 10 billion parameters47Parameters are variables the model learns during training and are used to make predictions and decisions – see https://tedai-sanfrancisco.ted.com/glossary/parameters/. and can perform tasks that pose a serious risk to security, national economic security, national public health or safety.48See the definition of “dual-use foundation model” in section 3(k) of the Executive Order. Separately, there are also reporting requirements for models trained on a quantity of computing power greater than 1026 FLOPS, which can include dual-use foundation models (see section 4.2 of the Executive Order).

Following from the public consultations, the NTIA recommended49See the “Dual-Use Foundation Models with Widely Available Model Weights” report (NTIA Report) issued in July 2024. that the Government should not restrict the availability of such models for now, such as by prohibiting them from being distributed, or require a person to have a licence before they can access the model weights. However, they also reserved the Government’s position to restrict certain classes of model weights in the future.50Pages 36 and 40 of the NTIA report.

It also recommended that the Government should develop the capacity to evaluate such models for evidence of unacceptable risk, and quickly respond to such risks. The Government should take an evidence-based approach to uncovering such risks (instead of merely hypothesising), such as by looking at audit reports, issues encountered by model developers, model evaluations, and red-teaming results.51Pages 37 and 40 of the NTIA report.

EU

The EU AI Act adopts a tiered approach towards open-source* AI models:

  1. The bulk of open-source* AI models (described in the Act as released under a “free and open-source licence”52See recital (102) of the EU AI Act which defines a “free and open-source” licence as one that allows the model “to be openly shared and where users can freely access, use, modify and redistribute them or modified versions thereof”. It broadly matches the OSI definition of what is ‘open source AI’ in terms of freely accessing, using, modifying and redistributing, but unlike the OSI definition it is silent on whether training data has to be shared to be considered ‘open-source’.) – except for general purpose AI (GPAI) models discussed at paragraph (b) below – are not subject to regulation.53See Article 2(12) of the EU AI Act. Instead, the developers are “encouraged to implement widely adopted documentation practices, such as model card and data sheets as a way to accelerate information sharing along the AI value chain”.54See recital (89) of the EU AI Act.

    Specifically, non-GPAI open-source* AI models will only be regulated if:

    1. they are high-risk AI systems (where they are subject to the same requirements as closed high-risk counterparts);
    2. they are banned or prohibited AI systems under Article 5;
    3. they are AI systems that interact directly with natural persons (e.g. emotion recognition systems) as described in Article 50 – in which case there are transparency obligations (e.g. informing natural persons that they are interacting with an AI system unless it is obvious to a reasonably well-informed person; watermarking of outputs).
  1. For GPAI models (i.e. AI models trained with a large amount of data, have significant generality and are capable of performing a wide range of distinct tasks – similar what the USA calls “foundation models”)55As defined in Article 3(63) of the EU AI Act. — their treatment depends on the following:
    1. If the model is (a) not monetised (e.g. not offered for a fee, no charge for technical support); (b) released under a “free and open-source licence”; and (c) does not “presents systemic risks” (characterised by its technical capabilities where the cumulative amount of computation used for its training is greater than 1025 FLOPS)56See Article 51(2) of the EU AI Act., the developer only has to provide a summary of the content used for model training and comply with EU copyright law.57See Article 53(2). Notably, the EU AI Act requires compliance with copyright law but doesn’t mention how to comply, so it is still an open question as to whether fair use and text and data mining exceptions apply to scraping data from the Internet to train the AI model. A GPAI model that does not fulfil criteria (a) or (b) will require maintaining technical documentation to be provided to the authorities upon request, and making available information about the model to persons who will integrate it into their own systems.
    2. However, if the model “presents systemic risks”, then regardless of whether it is monetised and the type of licence it is released under, it will be subject to the full suite of obligations across Articles 53 to 55, including the need for technical documentation, maintaining cybersecurity protections and reporting any serious incidents arising to the EU AI Office.
Best practices

From the examples above, we can see that how open-source* AI models will be evaluated and regulated is still a work in progress. However, there are safeguards (from legislation, guidelines and industry practice) that model users and developers can adopt now to ensure that open-source* AI models are developed, released and used safely. Testing and evaluation of the models (both before release, and after modifying them) would be essential regardless of whether the model is open-source*, so these will not be discussed here.

In the case of persons using/building on open-source* models, they should be able to answer the question of “do you know what you are using”:

  1. Select models where the technical details, summaries of training data, intended uses, and performance on evaluation and red-teaming efforts are disclosed, over models that don’t – model cards can help with providing this information;58Page 9 of the NTIA Report. See also Anokhy Desai, “5 things to know about AI model cards”, accessible at: https://iapp.org/news/a/5-things-to-know-about-ai-model-cards. See also a sample model card at https://ai.google.dev/gemma/docs/model_card_2 which describes how the model performs on evaluations, the risks/limitations of the model and a general overview of the types of data it was trained on.
  2. Download models from reliable sources to minimise risks of tampered models;59Page 8 of Gen-AI Model Framework.
  3. Read licence terms carefully to comply with permitted uses of model.

On the other hand, model developers should consider how much of the model and related information to share:

  1. Vary levels of access to model weights to “vetted” persons as an alternative to release to all persons;60Page 9 of the NTIA Report, and page 25 of the CGAI Report on gated download access.
  2. Ensure models are tested properly before release to patch vulnerabilities, because once the model and its weights are released the developer cannot “recall” it;61Page 19 of the GCAI Report.
  3. Have API access to the model (akin to “dialling-in” to the model) instead of releasing it for download, so that the developer can cut off access to the model as needed;62Pages 19 and 32 of the GCAI Report. and
  4. Use RAILs to limit downstream use, although effective monitoring and enforcement remains an issue.

The views expressed in this article are the personal views of the author and do not represent the views of Drew & Napier LLC.

Endnotes

Endnotes
1 For example, model developers, application deployers (who develop solutions or applications that make use of AI technology), application deployers (who provide the AI solutions to end-users) and cloud service providers (who provide the platform to host the AI application).
2 See the Model Governance Framework for Generative AI (30 May 2024) (“Model Gen-AI Framework”) at page 7.
3 See the Model Gen-AI Framework at page 7.
4 See the Model Gen-AI Framework at footnote 11.
5 As defined in the Model Gen-AI Framework at footnotes 9 and 10.
6 The definitions are based on (3.20) and (3.21) of the Singapore’s Model AI Governance Framework, as well as the definition from IBM at https://www.ibm.com/topics/ai-model. The IBM differentiates that “algorithms are procedures, often described in mathematical language or pseudocode, to be applied to a dataset to achieve a certain function or purpose” and “models are the output of an algorithm that has been applied to a dataset”.
7 https://www.techtarget.com/whatis/definition/algorithm
8 https://opensource.com/resources/what-open-source
9 https://opensource.com/resources/what-open-source
10 See the definition at https://opensource.org/osd (last modified on 16 February 2024).
11 See the Model Gen-AI Framework at page 13.
12 See page 11 of “Open Sourcing Highly Capable Foundation Models”, Centre for the Governance of AI (“CGAI Report”), accessible at https://cdn.governance.ai/Open-Sourcing_Highly_Capable_Foundation_Models_2023_GovAI.pdf, referencing training code, model weights and training data. See also page 3 of CNIL, “Open source practices in artificial intelligence” (July 2024) (“CNIL Report”), accessible at: https://www.cnil.fr/sites/cnil/files/2024-07/in-depth_analysis_open_source_practices_in_artificial_intelligence.pdf, which states: “Openness in AI generally does not refer to the publication of the source code related to the use or development of a model, although this may be part of it, but rather to the publication of the model and the weights, or parameters, that constitute it.”
13 See the definitions on page 11 of the CGAI Report.
14 The Verge, “Open-source AI must reveal its training data, per new OSI definition”, 29 October 2024, accessible at: https://www.theverge.com/2024/10/28/24281820/open-source-initiative-definition-artificial-intelligence-meta-llama
15 See the interview with OSI’s Executive Director Stefano Maffulli at TechBrew, “The divide over open-source AI, explained” (18 June 2024), accessible at: https://www.emergingtechbrew.com/stories/2024/06/18/what-is-open-source-ai
16 See page 8 of the NTIA Report on “Dual-Use Foundation Models with Widely Available Model Weights” (July 2024) (“NTIA Report”), which explains AI model weights simply: “An AI model processes input – such as a user prompt – into a corresponding output, and the contents of that output are determined by a series of numerical parameters that make up the model, known as the model’s weights. The values of these weights, and therefore the behaviour of the model, are determined by training the model with numerous examples. The weights represent numerical values that the model has learned during training to achieve an objective specified by the developers.”
17 https://opensource.org/ai/open-source-ai-definition
18 https://opensource.org/ai/open-source-ai-definition
19 The OSI has made it clear that some training data can be excluded due to privacy and copyright issues. Otherwise, if there is unfettered access to all training data, then what is open-source AI will be reduced to a very small niche of AI that is trained only on open public data – see https://hackmd.io/@opensourceinitiative/osaid-faq
20 See commentary at https://www.juliaferraioli.com/blog/2024/on-open-source-ai/
21 See commentary at https://www.juliaferraioli.com/blog/2024/on-open-source-ai/
22 Page 11 of the CNIL Report
23 See, for example, the BigScience RAIL Licence v1.0, available at https://huggingface.co/spaces/bigscience/license
24 It is not compulsory to use RAIL for AI models – there are also models licensed under traditional open-source licences like MIT and Apache. See the analysis in McDuff et. al., “On the Standardization of Behavioral Use Clauses and Their Adoption for Responsible Licensing of AI”, accessible at https://arxiv.org/pdf/2402.05979.
25 See paragraph (l) in Attachment A to the BigScience RAIL Licence v1.0., in contrast to the responsible AI licence for GRID, available at https://github.com/ScaledFoundations/GRID-playground/blob/main/LICENSE
26 See for example https://github.com/meta-llama/llama-models/blob/main/models/llama3_2/LICENSE
27 Especially since the scope of the fair use and text and data mining exceptions are still pending before the courts.
28 See the comments by Meta spokesperson Faith Eischen, as reported in The Verge, “Open-source AI must reveal its training data, per new OSI definition” (29 October 2024), accessible at: https://www.theverge.com/2024/10/28/24281820/open-source-initiative-definition-artificial-intelligence-meta-llama
29 Interview with GitHub’s Chief Legal Officer, “How big new AI regulatory pushes could affect open source” (17 September 2024), accessible at: https://www.emergingtechbrew.com/stories/2024/09/16/ai-regulations-open-source-development-shelley-mckinley-github. See also the view expressed by MIT Technology Review in “We finally have a definition for open-source AI” (22 August 2024), available at: https://www.technologyreview.com/2024/08/22/1097224/we-finally-have-a-definition-for-open-source-ai/, where they said “(d)escribing models as open source may cause them to be perceived as more trustworthy, even if researchers aren’t able to independently investigate whether they really are open source.”
30 As described by the CNIL (see page 2 of the CNIL Report).
31 See Recital 102 of the EU AI Act.
32 Even in the context of general-purpose AI models, recital 102 does not reference the extent of training data required – “General-purpose AI models released under free and open-source licences should be considered to ensure high levels of transparency and openness if their parameters, including the weights, the information on the model architecture, and the information on model usage are made publicly available.”
33 See the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, issued on 30 October 2023.
34 David Evan Harris, “How to Regulate Unsecured “Open-Source” AI: No Exemptions”, accessible at: https://www.techpolicy.press/how-to-regulate-unsecured-opensource-ai-no-exemptions/
35 David Evan Harris, “Not Open and Shut: How to Regulate Unsecured AI” (6 September 2024), accessible at: https://www.cigionline.org/articles/not-open-and-shut-how-to-regulate-unsecured-ai/
36 “Challenges and limits of an open source approach to Artificial Intelligence” at page13, accessible at https://www.europarl.europa.eu/RegData/etudes/STUD/2021/662908/IPOL_STU(2021)662908_EN.pdf.
37 Also found in proprietary AI models, as well as in other open-source software.
38 Page 14 of the NTIA Report.
39 Page 12 of the CGAI Report.
40 See the anecdotal example given page 12 of the CGAI Report.
41 See the FAQs at https://bigscience.huggingface.co/blog/the-bigscience-rail-license
42 Page 8 of Gen-AI Model Framework.
43 Page 8 of Gen-AI Model Framework.
44 See 2.1.9 of the CSA Companion Guide on Securing AI Systems.
45 Nicole Kobie, “Open-source AI just got a major seal of approval from US regulators – but will it push developers in the right direction?” (31 July 2024), accessible at: https://www.itpro.com/software/open-source/open-source-ai-just-got-a-major-seal-of-approval-from-us-regulators-but-will-it-push-developers-in-the-right-direction
46 See section 4.6 of the Executive Order.
47 Parameters are variables the model learns during training and are used to make predictions and decisions – see https://tedai-sanfrancisco.ted.com/glossary/parameters/.
48 See the definition of “dual-use foundation model” in section 3(k) of the Executive Order. Separately, there are also reporting requirements for models trained on a quantity of computing power greater than 1026 FLOPS, which can include dual-use foundation models (see section 4.2 of the Executive Order).
49 See the “Dual-Use Foundation Models with Widely Available Model Weights” report (NTIA Report) issued in July 2024.
50 Pages 36 and 40 of the NTIA report.
51 Pages 37 and 40 of the NTIA report.
52 See recital (102) of the EU AI Act which defines a “free and open-source” licence as one that allows the model “to be openly shared and where users can freely access, use, modify and redistribute them or modified versions thereof”. It broadly matches the OSI definition of what is ‘open source AI’ in terms of freely accessing, using, modifying and redistributing, but unlike the OSI definition it is silent on whether training data has to be shared to be considered ‘open-source’.
53 See Article 2(12) of the EU AI Act.
54 See recital (89) of the EU AI Act.
55 As defined in Article 3(63) of the EU AI Act.
56 See Article 51(2) of the EU AI Act.
57 See Article 53(2). Notably, the EU AI Act requires compliance with copyright law but doesn’t mention how to comply, so it is still an open question as to whether fair use and text and data mining exceptions apply to scraping data from the Internet to train the AI model.
58 Page 9 of the NTIA Report. See also Anokhy Desai, “5 things to know about AI model cards”, accessible at: https://iapp.org/news/a/5-things-to-know-about-ai-model-cards. See also a sample model card at https://ai.google.dev/gemma/docs/model_card_2 which describes how the model performs on evaluations, the risks/limitations of the model and a general overview of the types of data it was trained on.
59 Page 8 of Gen-AI Model Framework.
60 Page 9 of the NTIA Report, and page 25 of the CGAI Report on gated download access.
61 Page 19 of the GCAI Report.
62 Pages 19 and 32 of the GCAI Report.

The post Open-source AI Models – What Are They, and Closing the Safety and Liability Gaps appeared first on The Singapore Law Gazette.

Copyright Fair Use in the Face of Technological Developments: Staying Ahead or Limping Behind? (Part 1)

Introduction

Open-ended fair use and categorical fair dealing provisions both temper the exclusive rights of copyright owners to foster further creative expression by permitting secondary uses of copyrighted works, providing the primary mechanism to balance copyright protection with the broader public interest of fostering creative expression.1See, eg, Campbell v Acuff-Rose Music, Inc 510 US 569 at 579 (1994). A number of jurisdictions also provide definitional statutory exceptions that do not require a balancing of factors, that is, it is a permitted use of copyrighted works for specific purposes so long as particular conditions are satisfied; the text and datamining (TDM) exception – called the computational data analysis exception in Singapore – is one such example. Today, the breathtaking pace of technological developments has perhaps left copyright law struggling to keep up, as traditional understandings of various copyright doctrines and legislative mechanisms are generally unable to match this speed. In the article in the Harvard Law Bulletin, it was commented that “[w]hile embracing technological change is part of the human experience, when the pace of that change seems to ramp up exponentially, the rules and regulations meant to keep that technology in check can fall further and further behind.”2Colleen Walsh, “How to think about AI: Delving into the legal and ethical challenges of a game-changing technology”, Harvard Law Bulletin, Summer 2023, 21 at 22. This two-part article discusses the fair use doctrine in Singapore in relation to internet search engines and the use of works for training generative artificial intelligence applications (GAIAs) (e.g. ChatGPT, Midjourney, Stable Diffusion).

Fair Use Codified in Copyright Act 2021

The open-ended fair use provision in the US3Copyright Act 17 USC (US) § 107 (1976). operates as a general exception that courts apply on a case-by-case basis; this is explicitly adopted in Singapore in section 191 of the Copyright Act 2021 which enumerates a non-exclusive list of four factors to be weighed to determine whether an unauthorised use is fair, and hence a permitted use.4It replaces the previous open-ended fair dealing in s 35(2) of the Copyright Act (Cap 63, 2006 Rev Ed). Section 191 of the Copyright Act 2021(2020 Rev Ed) provides:Subject to sections 192, 193 and 194, all relevant matters must be considered in deciding whether a work or a protected performance (including a recording of the performance) is fairly used, including —(a) the purpose and character of the use, including whether the use is of a commercial nature or is for non‑profit educational purposes;(b) the nature of the work or performance;(c) the amount and substantiality of the portion used in relation to the whole work or performance; and(d) the effect of the use upon the potential market for, or value of, the work or performance. It seems from the announcements by the Government that by renaming the open-ended fair dealing provision as “fair use”,5Ministry of Law & Intellectual Property Office of Singapore, Singapore Copyright Review Report (17 January 2019) at para 2.6.8 and Conclusion 6(b). Singapore’s copyright law is poised to be more future ready and able to better tackle how the copyright balance should be struck between authors/owners and the users/public.

The rapid technological developments pose a number of challenges for fair use in Singapore. First, the kaleidoscope of infringing activities made possible by technology makes it difficult to articulate ex ante clear rules as new generative artificial intelligence (AI) uses and capabilities, search engines, social media apps, time-shifting/format-shifting capabilities and prevalent online community behaviour often present novel scenarios for the application of copyright law. Second, these activities also severely test the multi-factor-inquiry of an open-ended fair use approach by requiring courts to make critical policy choices involving technological innovations such as determining the degree of public benefit in a secondary use and how likely it would supplant the commercial market for the original or its derivatives.6For example, Google LLC v Oracle America, Inc, 141 S Ct 1183 at 1207 (2021); Capitol Records, LLC v ReDigi Inc, 910 F.3d 649 at 662 (2nd Cir. 2018); Fox News Network, LLC v TVEyes, Inc, 883 F.3d 169 at 179 (2nd Cir. 2018) and Authors Guild v Google, Inc, 804 F.3d 202 at 223 (2nd Cir. 2015). Third, to what extent should US jurisprudence on technology-related fair use decisions influence the deliberations in Singapore?

Singapore Case Law on Fair Use

The Court of Appeal in Global Yellow Pages Ltd v Promedia Directories Pte Ltd7(2017) 2 SLR 185. concluded that the defendant’s scanning and photocopying of the Business Listings was fair dealing, and the court also provided significant guidance on the application of the fair dealing provision under section 35(2) of the Copyright Act.8Cap 63, 2006 Rev Ed. Sundaresh Menon CJ hinted at the willingness of the local courts to take greater cognisance of US and Australian decisions in this area:9Global Yellow Pages Ltd v Promedia Directories Pte Ltd (2017) 2 SLR 185 at (76). Section 35(2) of the old Copyright Act (Cap 63, 2006 Rev Ed) is the precursor of the new open-ended fair use provision in ss 190–191 of the Copyright Act 2021 (2020 Rev Ed).

Accordingly, although there are very few reported local cases that consider in detail the scope of and relationship between the factors in s 35(2), both American and Anglo-Australian jurisprudence will be helpful in shaping our law on fair dealing.

In respect of the first factor, the purpose and character of the dealing, it favoured fair dealing where “the defendant added to, recontextualised or transformed the parts taken”10Global Yellow Pages Ltd v Promedia Directories Pte Ltd (2017) 2 SLR 185 at (79). or where the new work was “transformative”, that is, whether it “supersede[s] the objects” of the original creation, or “adds something new, with a further purpose or different character”.11Global Yellow Pages Ltd v Promedia Directories Pte Ltd (2017) 2 SLR 185 at (79) (referring to Campbell v Acuff-Rose Music, Inc, 510 US 569 at 579 (1994)). It appears that the Court of Appeal is edging towards the view of the US Supreme Court in Campbell v Acuff-Rose Music, Inc12510 US 569 at 579 (1994). (Campbell) when Menon CJ remarked that “we do not go as far as those cases which suggest that a commercial nature or purpose of the dealing will presumptively be regarded as unfair” and “the commerciality of the dealing is but one of the factors to be considered and it will not necessarily be fatal to a finding of fair dealing”.13Global Yellow Pages Ltd v Promedia Directories Pte Ltd (2017) 2 SLR 185 at (81). In fact, the court considered the application of the transformative use doctrine in Campbell (where the commerciality of the rap song “Pretty Woman” was trumped by the transformative value of the parody) and in Authors Guild v Google, Inc14Authors Guild v Google, Inc, 804 F 3d 202 (2nd Cir. 2015). (where Google’s making of digital copies of books for the purpose of enabling a search for identification of books containing a term of interest to the searcher involved a highly transformative purpose).

With respect to the first factor of fair use, the US statute requires courts to examine the “purpose and character of the use”, but neither “purpose” nor “character” is defined in the statute. Section 191 of the Singapore Copyright Act 2021 contains similar words, with the first factor being stated as “the purpose and character of the use, including whether the use is of a commercial nature or is for non‑profit educational purposes”. While there has been no local case law applying section 191, it is highly likely that courts here will look to how the US courts consider a number of relevant elements like what kind of transformation is present in the secondary work, the track record of the author of the secondary work, the extent of commentary or criticism present in the secondary work, the significance of the secondary use to research or study, as well as its public benefit.15David Tan, “The Lost Language of the First Amendment in Copyright Fair Use: A Semiotic Perspective of the ‘Transformative Use’ Doctrine Twenty-Five Years On” (2016) 26 Fordham Intellectual Property, Media and Entertainment Law Journal 311 at 325.

In response to the Campbell decision, Pierre Leval hailed Justice Souter’s opinion as “the finest opinion ever written on the subject of fair use”.16Pierre N Leval, “Nimmer Lecture: Fair Use Rescued” (1997) 44 UCLA Law Review 1449 at 1464. However, sitting as a judge in the Second Circuit Court of Appeals, he was recently more critical of the privileged position of the transformative use doctrine in copyright fair use, commenting that the fourth factor is “undoubtedly the single most important element of fair use”.17Capitol Records, LLC v ReDigi, Inc, 910 F 3d 649 at 662 (2nd Cir. 2018). In light of the US Supreme Court’s decision in Google LLC v Oracle America, Inc18141 S Ct 1183 (2021). handed down in April 2021, the transformative use doctrine seems to have taken a backseat to the fourth factor which evaluates market impact.19Google LLC v Oracle America, Inc, 141 S Ct 1183 (2021). The importance of economic impact on the licensing market of the original work was also emphasised by the majority in a later decision: Andy Warhol Foundation for the Visual Arts, Inc v Goldsmith, 598 US 508 (2023). Justice Breyer, delivering the majority’s opinion, held that: “in determining whether a use is ‘transformative,’ we must go further and examine the copying’s more specifically described ‘purpose[s]’ and ‘character’”.20Google LLC v Oracle America, Inc, 141 S Ct 1183 at 1203 (2021). Furthermore, the court would “take into account the public benefits the copying will likely produce”.21Ibid at 1206. In Campbell, the court explained that “a use that has a distinct purpose is justified because it furthers the goal of copyright, namely, to promote the progress of science and the arts, without diminishing the incentive to create.”22Campbell v Acuff-Rose Music, Inc, 510 US 569 at 531 (1994) (emphasis added). This was most recently reiterated in Keck v Mix Creative Learning Center LLC, 116 F.4th 448 at 454 (5th Cir. 2024). See also Hachette Book Group, Inc v Internet Archive, 115 F.4th 163 at 181 (2nd Cir. 2024). The need to discern a distinct purpose from the original was also emphasised in the majority judgment of the Supreme Court in 2023 in Andy Warhol Foundation for the Visual Arts, Inc v Goldsmith.23Andy Warhol Foundation for the Visual Arts, Inc v Goldsmith, 598 US 508 at 527–529 and 531–532 (2023).

On the fourth factor, the effect of the use on the potential market for the value of the copyrighted work, Menon CJ, referring to Campbell, was of the view that it requires the court to consider “not only the extent of market harm caused by” the alleged infringer’s action, but also whether the defendant’s conduct, if “unrestricted and widespread”, would “result in a substantially adverse impact on the potential market” for the original and derivative works.24Global Yellow Pages Ltd v Promedia Directories Pte Ltd (2017) 2 SLR 185 at (82) (citing Campbell v Acuff-Rose Music, Inc, 510 US 569 at 590 (1994)). The interplay between the fourth factor and the first factor is a controversial one, depending on one’s definition of a transformative market, a point which the court did not address. It has been observed that the “commerciality” of the secondary work (a consideration under the first factor of fair use) is a different analysis from the effect of the secondary use upon the potential commercial market for, or value of, the copyrighted work or its adaptations (a consideration under the fourth factor of fair use).25David Tan, “The Transformative Use Doctrine and Fair Dealing in Singapore: Understanding the ‘Purpose and Character’ of Appropriation Art” (2012) 24 SAcLJ 832 at para 47.

Part 2 will discuss the application of fair use to two specific technological uses.

Endnotes

Endnotes
1 See, eg, Campbell v Acuff-Rose Music, Inc 510 US 569 at 579 (1994).
2 Colleen Walsh, “How to think about AI: Delving into the legal and ethical challenges of a game-changing technology”, Harvard Law Bulletin, Summer 2023, 21 at 22.
3 Copyright Act 17 USC (US) § 107 (1976).
4 It replaces the previous open-ended fair dealing in s 35(2) of the Copyright Act (Cap 63, 2006 Rev Ed). Section 191 of the Copyright Act 2021(2020 Rev Ed) provides:Subject to sections 192, 193 and 194, all relevant matters must be considered in deciding whether a work or a protected performance (including a recording of the performance) is fairly used, including —(a) the purpose and character of the use, including whether the use is of a commercial nature or is for non‑profit educational purposes;(b) the nature of the work or performance;(c) the amount and substantiality of the portion used in relation to the whole work or performance; and(d) the effect of the use upon the potential market for, or value of, the work or performance.
5 Ministry of Law & Intellectual Property Office of Singapore, Singapore Copyright Review Report (17 January 2019) at para 2.6.8 and Conclusion 6(b).
6 For example, Google LLC v Oracle America, Inc, 141 S Ct 1183 at 1207 (2021); Capitol Records, LLC v ReDigi Inc, 910 F.3d 649 at 662 (2nd Cir. 2018); Fox News Network, LLC v TVEyes, Inc, 883 F.3d 169 at 179 (2nd Cir. 2018) and Authors Guild v Google, Inc, 804 F.3d 202 at 223 (2nd Cir. 2015).
7 (2017) 2 SLR 185.
8 Cap 63, 2006 Rev Ed.
9 Global Yellow Pages Ltd v Promedia Directories Pte Ltd (2017) 2 SLR 185 at (76). Section 35(2) of the old Copyright Act (Cap 63, 2006 Rev Ed) is the precursor of the new open-ended fair use provision in ss 190–191 of the Copyright Act 2021 (2020 Rev Ed).
10 Global Yellow Pages Ltd v Promedia Directories Pte Ltd (2017) 2 SLR 185 at (79).
11 Global Yellow Pages Ltd v Promedia Directories Pte Ltd (2017) 2 SLR 185 at (79) (referring to Campbell v Acuff-Rose Music, Inc, 510 US 569 at 579 (1994)).
12 510 US 569 at 579 (1994).
13 Global Yellow Pages Ltd v Promedia Directories Pte Ltd (2017) 2 SLR 185 at (81).
14 Authors Guild v Google, Inc, 804 F 3d 202 (2nd Cir. 2015).
15 David Tan, “The Lost Language of the First Amendment in Copyright Fair Use: A Semiotic Perspective of the ‘Transformative Use’ Doctrine Twenty-Five Years On” (2016) 26 Fordham Intellectual Property, Media and Entertainment Law Journal 311 at 325.
16 Pierre N Leval, “Nimmer Lecture: Fair Use Rescued” (1997) 44 UCLA Law Review 1449 at 1464.
17 Capitol Records, LLC v ReDigi, Inc, 910 F 3d 649 at 662 (2nd Cir. 2018).
18 141 S Ct 1183 (2021).
19 Google LLC v Oracle America, Inc, 141 S Ct 1183 (2021). The importance of economic impact on the licensing market of the original work was also emphasised by the majority in a later decision: Andy Warhol Foundation for the Visual Arts, Inc v Goldsmith, 598 US 508 (2023).
20 Google LLC v Oracle America, Inc, 141 S Ct 1183 at 1203 (2021).
21 Ibid at 1206.
22 Campbell v Acuff-Rose Music, Inc, 510 US 569 at 531 (1994) (emphasis added). This was most recently reiterated in Keck v Mix Creative Learning Center LLC, 116 F.4th 448 at 454 (5th Cir. 2024). See also Hachette Book Group, Inc v Internet Archive, 115 F.4th 163 at 181 (2nd Cir. 2024).
23 Andy Warhol Foundation for the Visual Arts, Inc v Goldsmith, 598 US 508 at 527–529 and 531–532 (2023).
24 Global Yellow Pages Ltd v Promedia Directories Pte Ltd (2017) 2 SLR 185 at (82) (citing Campbell v Acuff-Rose Music, Inc, 510 US 569 at 590 (1994)).
25 David Tan, “The Transformative Use Doctrine and Fair Dealing in Singapore: Understanding the ‘Purpose and Character’ of Appropriation Art” (2012) 24 SAcLJ 832 at para 47.

The post Copyright Fair Use in the Face of Technological Developments: Staying Ahead or Limping Behind? (Part 1) appeared first on The Singapore Law Gazette.

From Aircons to Ziptracks – Exclusive Use of Common Property

This article discusses the different approaches taken by the courts when dealing with the issue of exclusive use and enjoyment of common property, mapping out developments in this area of the law from Poh Kiong Kok v MCST Plan No 581 [1990] 1 SLR(R) 617, to the recent decision of Soo Hoo Khoon Peng v The MCST Plan No. 2906 [2023] SGHC 355.

Introduction

  1. The question of whether a subsidiary proprietor (SP) of a strata-titled development may install awnings and air conditioner compressors outside his unit is interestingly still not quite settled.
  2. Section 33(1) of the Building Maintenance and Strata Management Act 2004 (BMSMA) provides that a management corporation (MCST) may make a by-law pursuant to an appropriate resolution, conferring on an SP the exclusive use and enjoyment or special privileges in respect of the whole or any part of the common property.
  3. The BMSMA does not provide a definition of what constitutes “exclusive use and enjoyment”. The plain meaning of “exclusion” in the Oxford Learner’s Dictionary is “the act of preventing somebody/something from entering a place or taking part in something”.
  4. Logically, there should be a difference between “use and enjoyment” and “exclusive use and enjoyment”. To amount to “exclusive use and enjoyment” of common property, the use and enjoyment should operate to the exclusion of other SPs or the MCST from doing something that they would have been able to do. Where there is “exclusive use and enjoyment”, the requisite resolution (ordinary, special or 90%) under section 33 BMSMA to be obtained depends on the period of exclusivity.
  5. If an SP uses common property which the MCST and no other SP would want to use, this would be mere “use and enjoyment”, and not “exclusive use and enjoyment”. However, consent of the MCST still has to be obtained.
  6. An example of “exclusive use and enjoyment” would be where a childcare centre situated on the ground floor cordons off a part of the common playground to the exclusion of other SPs.

Decisions That Considered the Exclusive Use and Enjoyment Issue

  1. The meaning of “exclusive use and enjoyment” was first considered by the High Court in Poh Kiong Kok v MCST Plan No 581 [1990] 1 SLR(R) 617. The MCST had a parking scheme where every SP was allocated a specific lot exclusive to him. Mr Poh was allocated a lot and excluded from parking in any other lot.
  2. The Court held that in the absence of an exclusive use unanimous resolution under section 41(8) Land Titles Strata Act, the prevailing legislation, the MCST had no right to exclude Mr Poh from parking in any of the other lots.1Poh Kiong Kok v MCST Plan No 581 [1990] 1 SLR(R) 617, at [20] – [21].
  3. In Wu Chiu Lin v MCST Plan No. 2874 [2018] 4 SLR 966 (Sunglade), the issue was whether awnings sought to be installed by SPs in their private enclosed spaces (PES) and balconies would constitute exclusive use and enjoyment of common property. The High Court held that absent a 90% exclusive use resolution under section 33 BMSMA, Ms Wu was not allowed to build an awning in her balcony despite the fact that: –
    1. the MCST had by a special resolution at an AGM approved installation of the awnings following an approved design for all SPs;2Wu Chiu Lin v MCST Plan No. 2874 [2018] 4 SLR 966 (“Sunglade”), at [6].
    2. out of 12 SPs who made applications to install such awnings, the MCST had before the Strata Titles Board (STB) consented to let the SPs of nine ground floor units proceed with their awnings on the basis that they constituted a safety device;3Sunglade, at [12] – [13].
    3. the MCST made clear to the STB that they recognized that 83.06% of the general body voted in favour of the awnings, that their intention was simply to seek guidance and ensure the purported approval granted to the SPs to install the awnings was valid and regular, and not to unreasonably prohibit them from installing them;4Sunglade, at [6].
    4. there was no evidence that any other SP was being excluded from putting up awnings in their PES or balcony, and/or that anyone would want to put up an awning in Ms Wu’s balcony.
  4. Sunglade was followed in MCST Plan No. 508 v Loh Sook Cheng (Loh Sook Cheng) (HC/RAS 13 of 2020, unreported). Mdm Loh sought several orders from the Court including, inter alia, that she be allowed to install two air conditioning compressors just outside the rear exterior wall of her unit (a location proposed by the MCST), an upgrade to her unit’s electrical supply and ancillary plumbing works for the installation of fire hose reels (to comply with SCDF requirements).
    Image may be NSFW.
    Clik here to view.

    Aircon compressors on the exterior common property wall of the subject property involved in the case of Loh Sook Cheng.

  5. The District Court held that the works did not confer on Mdm Loh exclusive use and enjoyment of common property and furthermore many other SPs including the Chairperson and Secretary had installed air conditioning compressors, piping and cable ducts on common property without any 90% exclusive use resolution under section 33 BMSMA.5MCST Plan No. 508 v Loh Sook Cheng (“Loh Sook Cheng”) [2020] SGDC 159, at [22] – [23].
  6. However, the High Court overturned the decision, noting that the air conditioning compressors, additional electric cables and water pipe were permanent structures installed on common property for the sole benefit of Mdm Loh, which would deprive other SPs from using and enjoying the same.

Decisions That Did Not Consider the Exclusive Use Issue

  1. In Choo Kok Lin and anor v MCST Plan No. 2045 [2005] 4 SLR(R) 175 (Kentish Lodge), the SPs erected, inter alia, air-conditioning compressors on the external wall above their landscape/air well area without the MCST’s consent.6Choo Kok Lin and anor v MCST Plan No. 2045 [2005] 4 SLR(R) 175 (“Kentish Lodge”), [6] – [16]. The High Court dealt with this as a case of use and enjoyment of common property without the MCST’s consent. The issue was whether the compressors should be ordered to be removed. Balancing all the circumstances, the Court decided not to order their removal.7Kentish Lodge, at [59].
  2. In Prem N Shamdasani v MCST Plan No 920 [2022] SGHC 280 (Hawaii Tower), the Appellant carried out renovation works including, inter alia, the replacement of the air conditioner compressor on the external wall, without MCST approval. The Court held that the MCST ought to have approved the renovation works, including the replacement of the air conditioner compressor, as it did not detract from the appearance of the building since there were six other units with similar air conditioner compressors on the external walls which the MCST could not do anything about.8Prem N Shamdasani v MCST Plan No 920 [2022] SGHC 280 (“Hawaii Tower”), at [152] – [153].
  3. It is not surprising that in Kentish Lodge, Hawaii Tower and numerous cases over the years, no court or counsel considered the installation of air conditioning compressor units outside your own window, balcony or unit to amount to “exclusive use and enjoyment” of common property requiring an exclusive use resolution under section 33 BMSMA. These are all ordinary and reasonable instances of use and enjoyment of common property.

Different Tests Applied Depending on Whether Works Carried Out

  1. In Kentish Lodge, the High Court was asked to grant a mandatory injunction requiring the SP to remove air-conditioning compressors erected on common property without the MCST’s approval.9Kentish Lodge, at [4]. Following The MCST Plan No. 1378 v Chen Ee Yueh Rachel [1993] 3 SLR(R) 630, the Court in Kentish Lodge declined to grant the order sought as it would not benefit the MCST.10The MCST Plan No. 1378 v Chen Ee Yueh Rachel [1993] 3 SLR(R) 630; Kentish Lodge, at [59]. The Court held that the MCST did not consider that the appearance of the condominium had been adversely affected by the compressors. This was especially so since other SPs had similarly installed their compressors on common property.11Kentish Lodge, at [59].
  2. However, in Sunglade and Loh Sook Cheng, where the SPs sought the MCST’s approval before carrying out the installations, the High Court took a different approach.
  3. In Sunglade, there was evidence of awnings put up by SPs of six or seven other units similar to Ms Wu’s, all without approval and no action was taken for many years.12Sunglade, at [91]. This was in addition to the ground floor units which were allowed put up the awnings. Nevertheless, the High Court held that “two wrongs do not make a right” and that the obligation is on the SP to obtain a 90% exclusive resolution under section 33 BMSMA.13Sunglade, at [91].
  4. In Loh Sook Cheng, the external wall of the building had many air conditioning compressor units put up by other SPs. There were also piping and cable ducts running outside of the units of several SPs. The District Court took the view that a party who has come to Court to seek approval of works involving the common property should be in no worse a position than a SP who had proceeded to undertake the same works without authorisation and for which the MCST is seeking a mandatory injunction.14Loh Sook Cheng, at [20].
  5. The High Court in Loh Sook Cheng, in reversing the District Court’s decision, stated that the Court, in the exercise of its discretion, may consider the even-handedness of the MCST in dealing with the SPs only in cases involving the grant of a mandatory injunction. However, where a SP applies to court to compel the MCST to consent to works, the Court observed that the question is whether the works may be consented to by the MCST and that this answer does not change because other SPs might have acted in breach of section 33 BMSMA.
  6. The unfortunate result from the different approaches taken is that it appears you may be better off proceeding to carry out the unauthorised works first instead of seeking proper approval before carrying out the works. This cannot be right.

Prescriptive or Descriptive Approach

  1. Even if the works amount to “exclusive use and enjoyment” of common property, it should not follow that an exclusive use resolution must necessarily be passed before it can be allowed. Whilst the MCST “may” make a by-law pursuant to a 90% resolution conferring on a SP “exclusive use and enjoyment” of common property for a period exceeding three years, in which case the SP’s “exclusive use and enjoyment” of the common property during that period is protected by the by-law, it should not follow that without such by-law and 90% resolution, the SP cannot have any such “exclusive use and enjoyment”.
  2. In Chan Sze Ying v MCST Plan No 2948 [2020] SGHC 88 (Chan Sze Ying), the High Court adopted a descriptive approach and held that Paragraph 3A(1) of the First Schedule of the BMSMA which states that a meeting of the MCST “may” be adjourned by a motion did not displace the residual power at common law to adjourn meetings by some other means.15Chan Sze Ying v MCST Plan No 2948 [2020] SGHC 88, at [45].
  3. Another instance of the Court applying the descriptive interpretation of section 33 would be the case of The MCST Plan No 3436 v Tay Beng Huat and another [2019] SGDC 208 (The Infiniti). The District Court dismissed the MCST’s argument that the placement of a shoe cabinet along the common corridor amounted to “exclusive use” or “special privileges” which was unlawful unless there was a by-law under section 33 expressly allowing it. Instead, it held that section 33 is an empowering provision and should not be read as a restrictive provision that renders unlawful anything that might be considered “exclusive use” if the MCST has not expressly permitted it. The Court added that the latter interpretation “would render unnecessary and otiose the fine balance between the potentially competing rights of SPs in respect of the common property that the by-laws in the Second Schedule endeavour to achieve.”16The MCST Plan No 3436 v Tay Beng Huat and another [2019] SGDC 208, at [12].

Equating Exclusive Use and Enjoyment with Permanence

  1. In Loh Sook Cheng, the Court held that the installation of the compressors amounted to “exclusive use and enjoyment” as they were permanent. The Court distinguished The Infiniti as the shoe cabinet was not permanent.
  2. However, usage can be permanent and yet not amount to exclusive use. e.g. air-conditioning compressor outside one’s window, or electrical wires and plumbing pipes running along the common property into one’s unit as no other SP would want to use these parts of the common property. Usage can also be temporary yet amount to exclusive use and enjoyment e.g. exclusive use of three lanes of the swimming pool during the evening to conduct swimming lessons.
  3. It is a question of fact in every case whether there is “exclusive use and enjoyment”. If so, then the “permanence” (i.e. the duration of use), should determine the type of resolution required under section 33 i.e. ordinary, special or 90% resolution.

Other Control Mechanisms in the BMSMA

  1. A descriptive interpretation of section 33 does not imply that a SP will be entitled to do whatever they like on or to the common property, without regard to the rights of other SPs and the MCST.
  2. There are provisions in the BMSMA and regulations thereunder that balance the rights and obligations of SPs and occupiers. For example, section 63 BMSMA lists the duties of SPs and other occupiers. They cannot use or enjoy the common property to interfere unreasonably with the use or enjoyment of the common property or any other lot by other SPs and occupiers.17BMSMA, s 63. The prescribed by-laws under the Second Schedule of the Building Maintenance (Strata Management) Regulations 2005 restrain various specific misuses of common property.

Mere Use and Enjoyment of Common Property

  1. Where there is no “exclusive use and enjoyment” of common property, such that an exclusive use resolution under section 33 BMSMA is required, but mere “use and enjoyment” of common property, then the issue is whether the MCST should consent to the works.
  2. Where the MCST consents to the works, it is hard to understand why the tribunal or court should intervene and stop the works. The BMSMA provides a legal framework for MCSTs to self-govern and manage their own estate. The SPs themselves are the best people to decide what is best for their estate.
  3. Where the MCST does not consent to the works, the issue is whether taking into account all relevant factors, the MCST has been unreasonable, in which case the Board or the Court may make an order that the MCST consents to the works, as was done by the STB in Lee Lay Ting Jane v MSCT Plan No 3414 [2015] SGSTB 5 under section 111 BMSMA.

The Case of Mark Wheeler

  1. Most of the cases that held that there was “exclusive use and enjoyment” of common property cited and followed Mark Wheeler v The MCST Plan No. 751 and Another [2003] SGSTB 5 (Mark Wheeler).
  2. In Mark Wheeler, the SP installed an awning above the balcony of the entrance to his unit, without MCST approval.18Mark Wheeler v The MCST Plan No. 751 and Another [2003] SGSTB 5, at [13] – [21]; [28]. On the facts, the Board did not consider the MCST’s refusal to grant consent unreasonable, considering that: (a) it was the only unit with an awning; (b) the installation detracted from the theme of the development; (c) was in breach of the by-laws; and (d) resolutions to approve the installation were defeated at the AGM.
  3. Although the Board also accepted the MCST’s submission that the installation of the awnings amounted to “exclusive use” which required a unanimous vote at the material time, it treated the case primarily as one of “use and enjoyment” of common property. If the Board had conclusively determined that it was a case of “exclusive use and enjoyment” of common property, the lack of consent from the MCST, let alone a unanimous resolution, would have been fatal to Mark Wheeler’s case.
  4. Interestingly, the Board commented that treating a situation like this as one of “exclusive use” requiring a unanimous vote may make living in a condominium unworkable.

Approach Taken in Australia

  1. Since Singapore’s strata legislation borrowed heavily from Australian provisions, it would be useful to consider some Australian decisions.
  2. In Platt v Ciriello [1999] QCA 33 (Platt), the appellants were proprietors in a strata development who objected to the respondents and their tenants using common property for various purposes.19Platt v Ciriello [1999] QCA 33 (“Platt”), at p 1 – 2. The appellants in Platt argued before the Court below that the respondents’ uses of common property amounted to exclusive use and enjoyment of common property, in breach of the Building Units and Group Titles Act 1980 (BUGTA) since no “exclusive use” by-law had been passed under s 30(7) BUGTA (which is in pari materia with section 33(1) BMSMA).20Platt, at p 1 – 2.
  3. This argument was dismissed by Derrington J, who held that the question for determination was not whether the respondents’ uses of common property involved a use that is exclusive within the meaning of section 30(7), but whether they amounted to a use of common property in a manner or for a purpose that unreasonably interferes with the entitlement of others to use and enjoy common property under section 51(1)(c) BUGTA (which is in pari materia with section 63(c) BMSMA).
  4. On appeal, the Queensland Court of Appeal by a 2:1 majority (Pincus J.A. dissenting) upheld Derrington J’s decision, expressly rejecting the prescriptive reading of section 30(7)(a).
  5. Similarly, in Waller v The Owners of ‘Tranby on Swan’ – Strata Plan 2232 (1996) NSW Titles Cases 80-037, the District Court held that in each instance where exclusive use was being made of common property, the question is whether that particular use unreasonably interfered with the use and enjoyment of the common property by other SPs. This application of the descriptive interpretation means that even where there is “exclusive use and enjoyment” of common property without the requisite resolution, the Court must be satisfied that this was unreasonable before it will injunct such use.21Waller v The Owners of ‘Tranby on Swan’ – Strata Plan 2232 (1996) NSW Titles Cases 80-037; Teo Keang Sood, Strata Title In Singapore and Malaysia (LexisNexis, 5th Ed, 2015) at [10.43].

Conclusion

  1. The decisions in Kentish Lodge and Sunglade, and the cases following either authority, would therefore appear to be inconsistent with each other. A decision of a higher court to resolve this inconsistency would be helpful.
  2. In Soo Hoo Khoon Peng v The MCST Plan No. 2906 [2023] SGDC 162, the Court held that the installation of a screen at the balcony within the SP’s lot (which was essentially a ziptrack) constituted exclusive use and enjoyment of common property requiring a 90% resolution.22Soo Hoo Khoon Peng v The MCST Plan No. 2906 [2023] SGDC 162, at [110].
  3. On appeal, the High Court, in Soo Hoo Khoon Peng v The MCST Plan No. 2906 [2023] SGHC 355 opined that such installations would not always amount to exclusive use and enjoyment just because persons standing outside would be obstructed from viewing this part of the common property. The Court observed that the question of how common property may be used or enjoyed must hinge on the property’s location within the development and the role(s) it plays given that location.23Soo Hoo Khoon Peng v The MCST Plan No. 2906 [2023] SGHC 355, at [12]. This must be a question of fact in every case.

Endnotes

Endnotes
1 Poh Kiong Kok v MCST Plan No 581 [1990] 1 SLR(R) 617, at [20] – [21].
2 Wu Chiu Lin v MCST Plan No. 2874 [2018] 4 SLR 966 (“Sunglade”), at [6].
3 Sunglade, at [12] – [13].
4 Sunglade, at [6].
5 MCST Plan No. 508 v Loh Sook Cheng (“Loh Sook Cheng”) [2020] SGDC 159, at [22] – [23].
6 Choo Kok Lin and anor v MCST Plan No. 2045 [2005] 4 SLR(R) 175 (“Kentish Lodge”), [6] – [16].
7 Kentish Lodge, at [59].
8 Prem N Shamdasani v MCST Plan No 920 [2022] SGHC 280 (“Hawaii Tower”), at [152] – [153].
9 Kentish Lodge, at [4].
10 The MCST Plan No. 1378 v Chen Ee Yueh Rachel [1993] 3 SLR(R) 630; Kentish Lodge, at [59].
11 Kentish Lodge, at [59].
12 Sunglade, at [91].
13 Sunglade, at [91].
14 Loh Sook Cheng, at [20].
15 Chan Sze Ying v MCST Plan No 2948 [2020] SGHC 88, at [45].
16 The MCST Plan No 3436 v Tay Beng Huat and another [2019] SGDC 208, at [12].
17 BMSMA, s 63.
18 Mark Wheeler v The MCST Plan No. 751 and Another [2003] SGSTB 5, at [13] – [21]; [28].
19 Platt v Ciriello [1999] QCA 33 (“Platt”), at p 1 – 2.
20 Platt, at p 1 – 2.
21 Waller v The Owners of ‘Tranby on Swan’ – Strata Plan 2232 (1996) NSW Titles Cases 80-037; Teo Keang Sood, Strata Title In Singapore and Malaysia (LexisNexis, 5th Ed, 2015) at [10.43].
22 Soo Hoo Khoon Peng v The MCST Plan No. 2906 [2023] SGDC 162, at [110].
23 Soo Hoo Khoon Peng v The MCST Plan No. 2906 [2023] SGHC 355, at [12].

The post From Aircons to Ziptracks – Exclusive Use of Common Property appeared first on The Singapore Law Gazette.

Copyright Fair Use in the Face of Technological Developments: Staying Ahead or Limping Behind? – Part 2

Specific Technological Developments and Fair Use – Two Case Studies

At the time of writing, there are over a dozen lawsuits since the start of 2023 against companies such as OpenAI and Stability AI for using copyright-protected works in the training of various AI systems,1For example, Raw Story Media, Inc v OpenAI Inc, Case 1:24-cv-01514 (SDNY, 22 August 2024); UMG Recordings Inc, et al v Uncharted Labs Inc, Case 1:24-cv-04777 (SDNY, 24 June 2024); The Intercept Media, Inc v Open AI, Inc, Case 1:24-cv-01515 (SDNY, 6 June 2024); The New York Times Company v Microsoft Corporation, Case 1:23-cv-11195 (SDNY, 30 May 2024); Zhang, et al v Google LLC, et al, Case 3:24-cv-02531 (ND Cal, 24 April 2024); Nazemian v Nvidia Corp, Case 3:24-cv-01454 (ND Cal, 8 March 2024); Tremblay v Open AI, Case 3:23-cv-03223 (ND Cal, 16 February 2024); Andersen v Stability AI Ltd, Case 23-cv-00201-WHO (ND Cal, 30 October 2023); Getty Images (US), Inc v Stability AI, Inc, Case 1:23-cv-00135 (D Del, 3 February 2023). but there has been no judicial ruling on the merits as yet. Part 1 has provided an overview of fair use case law. This Part will focus on the analysis of whether two particular technological uses qualify as fair use – the common thread between these two uses is that both rely on TDM (text and datamining) and machine learning. Generally, TDM is an umbrella term referring to “computational processes for applying structure to unstructured electronic texts and employing statistical methods to discover new information and reveal patterns in the processed data.”2Brief of Digital Humanities and Law Scholars as Amici Curiae in Support of Defendant-Appellees at 5, Authors Guild v Google, Inc, 804 F.3d 202 (2nd Cir. 2015) (No. 13-4829). It can refer to any process using computers that creates metadata derived from something that was not initially conceived of as data; it can be used to produce statistics and facts about copyrightable works, and to render copyrighted text, sounds, and images into uncopyrightable abstractions.3Matthew Sag, “Copyright Saftety for Generative AI” (2023) 61 Houston Law Review 295 at 305-306.

1. Search Engines

Over the past two decades, search engines have emerged as a significant technology that may qualify as a transformative fair use, making images and information that would otherwise be protected by copyright searchable on the Internet. By 2020, Google has amassed a global market share of 87%, and “has become ubiquitous, often used as a transitive verb”.4Chuck Price, “17 Great Search Engines You Can Use Instead of Google”, Search Engine Journal (5 April 2020). Back then, other search engines, such as Bing, Baidu, Wiki, Twitter, DuckDuckGo and Startpage, while gaining popularity, still lag far behind. However, by 2024, with the rapid development of AI, the possibility of combining AI with search engines is fast becoming a reality, such as GPTGO.ai and a new Gemini model customised for Google Search. On 31 October 2024, OpenAI launched a search feature within ChatGPT, which offers numerous up-to-the-minute information such as sports scores, stock quotes, news, and the weather, powered by real-time web search and partnerships with news and data providers.5Hayden Field, “OpenAI launches ChatGPT search, competing with Google and Microsoft”, CNBC (31 October 2024).

Based on prevailing case law, in assessing fair use in the context of internet search engines, courts have relied heavily on the first fair use factor. In Kelly v Arriba Soft Corp,6336 F.3d 811 (9th Cir. 2003). it was held in 2003 that the now-defunct search engine Arriba’s creation and use of thumbnail versions of a professional photographer’s copyrighted images was fair use because the “smaller, lower-resolution images … served an entirely different function than [the] original images”.7Kelly v Arriba Soft Corp, 336 F.3d 811 at 818 (9th Cir. 2003). The Ninth Circuit was of the view that the original images served an artistic or aesthetic purpose but the thumbnail images, which were provided in response to a user’s search query, were incorporated into the search engine’s overall function “to help index and improve access to images on the internet and their related web sites”.8Ibid at 818–819. Arriba’s use was found to be transformative and the use of the thumbnail images also “benefit[ed] the public by enhancing information-gathering techniques on the internet”.9Ibid at 820. In the Google Images litigation, the Ninth Circuit in 2007 held that Google’s use of thumbnail images in its search engine is “highly transformative” and that “a search engine provides social benefit by incorporating an original work into a new work, namely, an electronic reference tool”, and thus Google’s use of the thumbnail images was fair use.10Perfect 10, Inc v Amazon.com, Inc, 508 F.3d 1146 at 1163–1165 (9th Cir. 2007).

In 2015, the Second Circuit similarly found that fair use protected the Google Books search engine, which employs digital, machine-readable copies of millions of copyright-protected books scanned by Google.11Authors Guild v Google, Inc, 804 F.3d 202 at 220–221 and 223 (2nd Cir. 2015) (“Google Books”). The Google Books search engine enables searching for a specific term, and then provides “snippets,” or a part of a page, for users to read. The Court held that both functions involve a “highly transformative purpose of identifying books of interest to the searcher”.12Ibid at 218. Again the consideration of public benefit was foremost in the minds of the judges as the Court unanimously held that the search function “augments public knowledge by making available information about Plaintiffs’ books without providing the public with a substantial substitute” [emphasis in original].13Ibid at 207. Finally, the Court concluded that Google’s commercial motivation did not significantly outweigh these transformative uses. The search engine makes possible a new type of research known as “text mining” or “data mining”, whereby users can search across the corpus of books to determine the frequency of specified terms across time. In 2019, the Ninth Circuit distinguished these search engine cases where fair use was found, from the closed-universe search engine Digs – a service provided by Zillow, an online real estate marketplace – that does not “crawl” the web, deciding that it was not fair use there.14VHT, Inc v Zillow Group, Inc, 918 F.3d 723 at 739–740 (9th Cir. 2019). The court cautioned that:15Ibid at 742.

What we divine from these cases is that the label ‘search engine’ is not a talismanic term that serves as an on-off switch as to fair use. Rather, these cases teach the importance of considering the details and function of a website’s operation in making a fair use determination.

In summary, not all uses of works in search engines are considered fair use. Courts will still have to analyse each fair use factor on a case-by-case basis. Cases such as HathiTrust and Google Books were based on a different technological paradigm of non-expressive fair use. Generative AI systems like ChatGPT and Midjourney today, however, “produce much more than information about expression; they are now the engines of new content creation.”16Matthew Sag, “Copyright Saftety for Generative AI” (2023) 61 Houston Law Review 295 at 308. For new search engines that combine generative AI with search features, such as the new ChatGPT search, the fair use evaluation becomes more complicated. The next section attempts to understand some of the implications.

2. Generative AI

(a) Computational Data Analysis Exception

It should be noted that a TDM exception known as the computational data analysis (CDA) exception has been enacted in the Copyright Act 2021. Under the CDA exception, five stringent conditions must be fulfilled, and they include “lawful access” to the copyrighted content and that the making of a copy cannot be used for any other purpose except for identifying, extracting or analysing information/data and using that to improve the functioning of a program in relation to that type of information/data.17For an analysis of the computational data analysis exception, see David Tan & Thomas Lee Chee Seng, “Copying Right in Copyright Law: Fair Use, Computational Data Analysis and the Personal Data Protection Act” (2021) 33 SAcLJ 1032. In implementing Proposal 8 of the Copyright Review Report,18Ministry of Law & Intellectual Property Office of Singapore, Singapore Copyright Review Report (17 January 2019). section 243 of the Copyright Act 2021 introduces a specific exception for reproduction of works made for the purpose of “computational data analysis provided that a number of conditions in section 244 are met. “Computational data analysis” is defined non-exhaustively as “using a computer program to identify, extract and analyse information or data from the work” – which is synonymous with TDM. The UK has already in place a TDM exception – albeit narrower than the Singapore version – that “a person who has lawful access to the work may carry out a computational analysis of anything recorded in the work for the sole purpose of research for a non-commercial purpose”.19Copyright, Designs and Patents Act 1988 (c 48) (UK) s 29A. For an analysis of other TDM exceptions, see Rossana Ducato and Alain M Strowel, “Ensuring Text and Data Mining: Remaining Issues with the EU Copyright Exceptions and Possible Ways Out” (2021) 43 European Intellectual Property Review 322; Martin Senftleben, “Compliance of National TDM Rules with International Copyright Law: An Overrated Nonissue?” (2022) 53 International Review Intellectual Property & Competition Law 1477; Thomas Margoni and Martin Kretschmer, “A Deeper Look into the EU Text and Data Mining Exceptions: Harmonisation, Data Ownership, and the Future of Technology” (2022) 71 GRUR International 685.

It is generally difficult to prove wholesale copying of millions of works as the various GAIAs do not disclose the training datasets, and one would have to proceed on a classic substantial similarity analysis in respect of each output text/image vis-à-vis the original work.20David Tan, “Generative AI and Copyright – Part 1: Copyright Infringement” (2023) SAL Prac 24. Two salient issues are relevant: (a) whether the use of copyright-protected works for machine learning (“input”); and (b) the works created from natural language commands (“output”) are infringing copyright. To determine if there is liability, one needs to understand how the CDA exception and fair use provision in the Copyright Act 2021 may be relevant to the input and output scenarios. In Singapore, copyright law can provide a defence for such infringing uses if these uses fall under either the CDA exception21Copyright Act 2021 (2020 Rev Ed) ss 243–244. or the fair use provision.22Copyright Act 2021 (2020 Rev Ed) ss 190–191. It should be noted that these permitted uses are independent of one another, and more than one exception may apply if the relevant conditions are met.23Copyright Act 2021 (2020 Rev Ed) ss 184. Lastly, any contract term is void to the extent that it purports, directly or indirectly, to exclude or restrict the CDA exception.24Copyright Act 2021 (2020 Rev Ed) ss 187(1)(c).

For the CDA exception, the five conditions to be satisfied include the user proving that the copy is made for the purpose of CDA and not for any other purpose; the user not supplying the copy to any person other than for the purpose of verifying the results of the CDA carried out by the user; the user having lawful access to the material (the first copy) from which the copy is made; and that the first copy not being an infringing copy. All five conditions must be satisfied. The Singapore legislation gives an example that “X does not have lawful access to the first copy if X accessed the first copy by circumventing paywalls” and that the use of images to train a computer program to recognise images, such as facial recognition software, as a permissible purpose. Furthermore, it is stated in the Act that “X does not have lawful access to the first copy if X accessed the first copy in breach of the terms of use of a database”.25Copyright Act 2021 (2020 Rev Ed) s 244(2)(d).

For machine learning purposes, the scraping of the Internet for text and images will often circumvent paywalls or violate the terms of use, hence failing the “lawful access” requirement under s 244(2)(d) of the Copyright Act 2021. Furthermore, the making of a copy, which will involve the conversion of authorial works into a machine-readable format or, in some GAIAs, data storage, will not be for the sole purpose of analysing the data to improve the functioning of the AI in relation to that data;26Copyright Act 2021 (2020 Rev Ed) s 244(2)(b). it will be for the purpose of generating new works based on that data, which is an impermissible purpose.

(b) Fair Use

There is a wealth of scholarship on training data and fair use.27See, eg, Andrew W Torrance and Bill Tomlinson, “Training is Everything: Artificial Intelligence, Copyright and ‘Fair Training’” (2023) 128 Dickinson Law Review 233; Matthew Sag, “Copyright Saftety for Generative AI” (2023) 61 Houston Law Review 295; Mark A Lemley and Bran Casey, “Fair Learning” (2021) 99 Texas Law Review 743; Benjamin L W Sobel, “Artificial Intelligence’s Fair Use Crisis” (2017) 41 Columbia Journal of Law & the Arts 45. It was pointed out by Matthew Sag that US courts “have agreed that copying without permission is fair use, and thus noninfringing, in the context of software reverse engineering, plagiarism detection software, and the digitization of millions of library books to enable meta-analysis and indexing.”28Sag, ibid at 304. Sag notes that:

The fair use status of nonexpressive use is not a special exception for the technology sector. Rather, the rationale for allowing for-profit and academic researchers to derive valuable data from other people’s copyrighted works is a necessary implication of the fundamental distinction between protectable original expression and unprotectable facts, ideas, abstractions, and functional elements.29Ibid at 304-5.

In considering fair use as applied to generative AI systems, two fair use factors that are likely to carry the greatest weight in the analysis are: (a) what is the purpose/character of the use, namely whether the use by generative AI is “transformative”, that is, whether it changes the purpose or the nature of the original work in some way; and (b) what is the impact of the generative AI’s use on the market, that is, whether it threatens the livelihood of the original creator by competing with their works or the licensing market for their works. While I conclude that the use of copyrighted works as training data is generally not fair use, there are other scholars who argue that such a use amounts to “fair training” and is therefore fair use.30Eg Andrew W Torrance and Bill Tomlinson, “Training is Everything: Artificial Intelligence, Copyright and ‘Fair Training’” (2023) 128 Dickinson Law Review 233, 245, 253-254.

In respect of the first factor, Authors Guild v HathiTrust31Authors Guild v HathiTrust 755 F.3d 87 at 92 (2nd Cir. 2014). is instructive – the issue was whether the digitisation of copyrighted works by 13 universities and other organisations in creating the HathiTrust Digital Library (HDL) without authorisation may constitute fair use. The US Second Circuit Court of Appeals found that the first factor weighed in favour of fair use as HDL’s enabling of full-text search “serves a new and different function from the original” and is socially beneficial.32Ibid at 97. See also William F Patry, Patry on Copyright, vol. 4 (West, Online, 2015) at §10:21 (observing that the use in Authors Guild v HathiTrust is “socially beneficial, serves a different purpose than the original, and is in no way substitutional”). Additionally, the dealing was found to carry a “non-profit educational” purpose as the HDL was a project started by educational and non-profit institutions targeted at providing greater access to works without any “purely commercial” motive.33Authors Guild v HathiTrust 755 F.3d 87 at 90–91 (2nd Cir. 2014).

The Ninth Circuit’s decision in Kelly v Arriba Soft Corp34336 F.3d 811 (9th Cir. 2003). is also useful in understanding how the evaluation of the third factor could be applied to generative AI uses. There, it was held that the use of entire copyrighted works was necessary in situations involving search engines since copying only a part of the copyrighted work would create practical difficulties for users, thereby reducing the usefulness of the search engine. In the same vein, even if entire works were copied by web robots in the TDM context, it could be reasoned that such a taking is reasonable, considering the different purpose of the dealing (that is, to identify patterns in vast amounts of raw data); thus, the third factor might not necessarily weigh against fair use. But if the purpose of generative AI is to analyse the specific expression of particular artists, and then replicate portions of that expression in response to a text prompt, then it does not appear to be a different purpose.

In the latest US Supreme Court’s decision on fair use, the majority observed that “whether the purpose and character of a use weighs in favour of fair use is, instead, an objective inquiry into what use was made, that is, what the user does with the original work.”35Andy Warhol Foundation for the Visual Arts, Inc v Goldsmith, 598 US 508 at 545 (2023). In that case, the use was Andy Warhol Foundation’s commercial licensing of Warhol’s Orange Prince (which was based on Lynn Goldsmith’s original photograph) to appear on the cover of Condé Nast’s special commemorative edition. The purpose of that use was to illustrate a magazine about Prince with a portrait of Prince, and an infringing work that portrays Prince somewhat differently from Goldsmith’s photograph (yet has no critical bearing on her photograph) was insufficient for the first factor to favour Andy Warhol Foundation, given the specific context of the use. The majority emphasised:36Ibid at 546.

To hold otherwise would potentially authorize a range of commercial copying of photographs, to be used for purposes that are substantially the same as those of the originals. As long as the user somehow portrays the subject of the photograph differently, he could make modest alterations to the original, sell it to an outlet to accompany a story about the subject, and claim transformative use.

These observations are especially pertinent for images produced by GAIAs such as DALL·E, Stable Diffusion or Midjourney. If a user was looking for an image for illustrative purposes for a magazine, book, annual report or marketing brochure, and provides specific text prompts to a generative AI system to produce such an image – as opposed to licensing one directly from the original author – then the first factor is unlikely to weigh in favour of fair use. The most recent US Circuit Court of Appeals decision on fair use clearly illustrates this point. Deciding that the first factor weighed in favour of fair use despite the defendant’s reproduction of the artist’s Dog Art painting series online as part of educational art kits so that students could learn at home during the pandemic, the unanimous opinion states: “As noted, the art kits had educational objectives, while the original works had aesthetic or decorative objectives. The purpose of Mix Creative’s specific use thus was not “substantially the same” as that of the original works, and there was little threat that the art kits would serve as substitutes for the originals.”37Keck v Mix Creative Learning Center LLC, 116 F.4th 448 at 455 (5th Cir. 2024). This stands in contrast to the facts in AWF v Goldsmith, where the purpose of the Foundation’s “specific use” was, according to the Supreme Court, “substantially the same” as the purpose of the original photograph. Both the original and the adaptation that the Foundation licensed to Condé Nast were “portraits of Prince used in magazines to illustrate stories about Prince.”38Ibid.

The application of the fourth factor is also highly dependent on the finding of the first factor. The US Supreme Court in Campbell v Acuff-Rose Music Inc had emphasised the close linkage between the first and fourth factors, in that the more the copying is done to achieve a purpose that differs from the purpose of the original, the less likely it is that the copy will serve as a satisfactory substitute for the original.39Campbell v Acuff-Rose Music, Inc, 510 US 569, 591 (1994). The Second Circuit noted that even if the purpose of the copying was for a valuably transformative purpose, such copying might nonetheless harm the value of the copyrighted original if done in a manner that resulted in widespread revelation of sufficiently significant portions of the original as to make available a significantly competing substitute.40Authors Guild v Google, 804 F.3d 202, 223 (2nd Cir. 2015). Generally, copyright-protected works copied for data mining purposes will require extensive processing and analysis before knowledge is derived and shared. Miners must ensure that they do not reveal significant portions of the original copyrighted works to the public. Although one could argue that data mining could limit the rights owners’ expansion into a potential market (e.g. a lost opportunity to license the works41Authors Guild, Inc v HathiTrust, 755 F.3d 87, 99 (2nd Cir. 2014) (this was an argument the plaintiffs raised).) since markets are dynamic and change over time to meet new demands, the US Circuit Courts have universally dismissed this argument where only a small portion of the original works was revealed to the public. In the Google Books litigation, the Second Circuit held that “a mere revelation of 16% of the text of plaintiffs’ books overstates the degree to which snippet view can provide a meaningful substitute.”42Authors Guild v Google, 804 F.3d 202, 223 (2nd Cir. 2015). In generative AI scenarios where a significant portion of an original work is reproduced in an output in response to a user’s text prompt, then one may more confidently discern a substitutive impact.

I have previously written:

Programme developers, and the organisations that invest significant resources in generative AI, will have the benefit of access to two generous but distinct provisions in the Singapore Copyright Act 2021 as a defence to their unauthorised uses of copyright-protected works. However, they must be mindful that the judicial interpretation of the fair use provision in Singapore likely remains guided by paradigmatic cases where an open-universe search engine making of a digital copy for the purpose of enabling a search for identification of books containing a term of interest involves a highly transformative purpose, and where copying from an original for the purpose of criticism, commentary, caricature, parody, or pastiche would be transformative.43David Tan, “Generative AI and Copyright – Part 1: Copyright Infringement” (2023) SAL Prac 25 at para 23.

ChatGPT, Stable Diffusion, Midjourney and many other comparable GAIAs, including the new Gemini 1.5 announced by Google at the time of writing, are not search engines. A number of them are highly successful commercial enterprises, with Stability AI valued at US$1bn, and some charging a user fee for their services. It is likely that there is little transformative purpose to be found as the AI would be accessing and reproducing the creative expression in these works in the outputs, that is the works would have been appropriated for their creative elements rather than their underlying facts. Similarly, Sag concludes: “If [large language models] just took expressive works and conveyed that same expression to a new audience with no additional commentary or criticism, or no distinct informational purpose, that would be a very poor candidate for fair use.”44Matthew Sag, “Copyright Saftety for Generative AI” (2023) 61 Houston Law Review 295, 312-313. According to Professor Rebecca Tushnet at Harvard Law School, an overhaul of copyright law is not needed as “current copyright law is clear when it comes to those employing the technology for creative use.”45Colleen Walsh, “How to think about AI: Delving into the legal and ethical challenges of a game-changing technology”, Harvard Law Bulletin, Summer 2023, 21 at 22. The fair use provision ain’t broke, and it is poised to be able to handle the challenges of new technology. Bring it on!

This article is adapted from a presentation by Professor Tan titled “AI Learning and Copyright Law: Developments in Singapore” at the United States-Asia Comparative Copyright Roundtable in December 2024 at Waseda University in Tokyo.

Endnotes

Endnotes
1 For example, Raw Story Media, Inc v OpenAI Inc, Case 1:24-cv-01514 (SDNY, 22 August 2024); UMG Recordings Inc, et al v Uncharted Labs Inc, Case 1:24-cv-04777 (SDNY, 24 June 2024); The Intercept Media, Inc v Open AI, Inc, Case 1:24-cv-01515 (SDNY, 6 June 2024); The New York Times Company v Microsoft Corporation, Case 1:23-cv-11195 (SDNY, 30 May 2024); Zhang, et al v Google LLC, et al, Case 3:24-cv-02531 (ND Cal, 24 April 2024); Nazemian v Nvidia Corp, Case 3:24-cv-01454 (ND Cal, 8 March 2024); Tremblay v Open AI, Case 3:23-cv-03223 (ND Cal, 16 February 2024); Andersen v Stability AI Ltd, Case 23-cv-00201-WHO (ND Cal, 30 October 2023); Getty Images (US), Inc v Stability AI, Inc, Case 1:23-cv-00135 (D Del, 3 February 2023).
2 Brief of Digital Humanities and Law Scholars as Amici Curiae in Support of Defendant-Appellees at 5, Authors Guild v Google, Inc, 804 F.3d 202 (2nd Cir. 2015) (No. 13-4829).
3 Matthew Sag, “Copyright Saftety for Generative AI” (2023) 61 Houston Law Review 295 at 305-306.
4 Chuck Price, “17 Great Search Engines You Can Use Instead of Google”, Search Engine Journal (5 April 2020).
5 Hayden Field, “OpenAI launches ChatGPT search, competing with Google and Microsoft”, CNBC (31 October 2024).
6 336 F.3d 811 (9th Cir. 2003).
7 Kelly v Arriba Soft Corp, 336 F.3d 811 at 818 (9th Cir. 2003).
8 Ibid at 818–819.
9 Ibid at 820.
10 Perfect 10, Inc v Amazon.com, Inc, 508 F.3d 1146 at 1163–1165 (9th Cir. 2007).
11 Authors Guild v Google, Inc, 804 F.3d 202 at 220–221 and 223 (2nd Cir. 2015) (“Google Books”).
12 Ibid at 218.
13 Ibid at 207.
14 VHT, Inc v Zillow Group, Inc, 918 F.3d 723 at 739–740 (9th Cir. 2019).
15 Ibid at 742.
16 Matthew Sag, “Copyright Saftety for Generative AI” (2023) 61 Houston Law Review 295 at 308.
17 For an analysis of the computational data analysis exception, see David Tan & Thomas Lee Chee Seng, “Copying Right in Copyright Law: Fair Use, Computational Data Analysis and the Personal Data Protection Act” (2021) 33 SAcLJ 1032.
18 Ministry of Law & Intellectual Property Office of Singapore, Singapore Copyright Review Report (17 January 2019).
19 Copyright, Designs and Patents Act 1988 (c 48) (UK) s 29A. For an analysis of other TDM exceptions, see Rossana Ducato and Alain M Strowel, “Ensuring Text and Data Mining: Remaining Issues with the EU Copyright Exceptions and Possible Ways Out” (2021) 43 European Intellectual Property Review 322; Martin Senftleben, “Compliance of National TDM Rules with International Copyright Law: An Overrated Nonissue?” (2022) 53 International Review Intellectual Property & Competition Law 1477; Thomas Margoni and Martin Kretschmer, “A Deeper Look into the EU Text and Data Mining Exceptions: Harmonisation, Data Ownership, and the Future of Technology” (2022) 71 GRUR International 685.
20 David Tan, “Generative AI and Copyright – Part 1: Copyright Infringement” (2023) SAL Prac 24.
21 Copyright Act 2021 (2020 Rev Ed) ss 243–244.
22 Copyright Act 2021 (2020 Rev Ed) ss 190–191.
23 Copyright Act 2021 (2020 Rev Ed) ss 184.
24 Copyright Act 2021 (2020 Rev Ed) ss 187(1)(c).
25 Copyright Act 2021 (2020 Rev Ed) s 244(2)(d).
26 Copyright Act 2021 (2020 Rev Ed) s 244(2)(b).
27 See, eg, Andrew W Torrance and Bill Tomlinson, “Training is Everything: Artificial Intelligence, Copyright and ‘Fair Training’” (2023) 128 Dickinson Law Review 233; Matthew Sag, “Copyright Saftety for Generative AI” (2023) 61 Houston Law Review 295; Mark A Lemley and Bran Casey, “Fair Learning” (2021) 99 Texas Law Review 743; Benjamin L W Sobel, “Artificial Intelligence’s Fair Use Crisis” (2017) 41 Columbia Journal of Law & the Arts 45.
28 Sag, ibid at 304.
29 Ibid at 304-5.
30 Eg Andrew W Torrance and Bill Tomlinson, “Training is Everything: Artificial Intelligence, Copyright and ‘Fair Training’” (2023) 128 Dickinson Law Review 233, 245, 253-254.
31 Authors Guild v HathiTrust 755 F.3d 87 at 92 (2nd Cir. 2014).
32 Ibid at 97. See also William F Patry, Patry on Copyright, vol. 4 (West, Online, 2015) at §10:21 (observing that the use in Authors Guild v HathiTrust is “socially beneficial, serves a different purpose than the original, and is in no way substitutional”).
33 Authors Guild v HathiTrust 755 F.3d 87 at 90–91 (2nd Cir. 2014).
34 336 F.3d 811 (9th Cir. 2003).
35 Andy Warhol Foundation for the Visual Arts, Inc v Goldsmith, 598 US 508 at 545 (2023).
36 Ibid at 546.
37 Keck v Mix Creative Learning Center LLC, 116 F.4th 448 at 455 (5th Cir. 2024).
38 Ibid.
39 Campbell v Acuff-Rose Music, Inc, 510 US 569, 591 (1994).
40 Authors Guild v Google, 804 F.3d 202, 223 (2nd Cir. 2015).
41 Authors Guild, Inc v HathiTrust, 755 F.3d 87, 99 (2nd Cir. 2014) (this was an argument the plaintiffs raised).
42 Authors Guild v Google, 804 F.3d 202, 223 (2nd Cir. 2015).
43 David Tan, “Generative AI and Copyright – Part 1: Copyright Infringement” (2023) SAL Prac 25 at para 23.
44 Matthew Sag, “Copyright Saftety for Generative AI” (2023) 61 Houston Law Review 295, 312-313.
45 Colleen Walsh, “How to think about AI: Delving into the legal and ethical challenges of a game-changing technology”, Harvard Law Bulletin, Summer 2023, 21 at 22.

The post Copyright Fair Use in the Face of Technological Developments: Staying Ahead or Limping Behind? – Part 2 appeared first on The Singapore Law Gazette.

Employers’ Control of Data in Employees’ Personal Devices

BYOD and Disclosure in Legal Proceedings

What are the legal risks and issues if employees use personal devices in the course of employment? What are ways to mitigate some such risks? This article discusses (i) the benefits and implications of a formal Bring Your Own Device (BYOD) policy, (ii) technological measures for data security and device management; (iii) whether employers have a right to data in employees’ devices; and (iv) discovery in legal proceedings regarding such device data.

Introduction

  1. It has become common for employees to use their personal devices for work.
    Many employees use their personal devices to access their company email and other communication accounts, access and store company information and documents, and access and store work-related contacts.
  2. Some employers may also adopt a “Bring Your Own Device” (BYOD) approach, with or without a formal BYOD policy, benefiting from employees’ use of personal devices in the course of their service. However, what are the legal and other risks and issues for employers and employees in this regard?
 

Securing Data in Personal Devices

  1. Employers would generally have a strong interest in ensuring the security and confidentiality of such accounts, information and documents on employees’ personal devices.
  2. Employers should thus have a formal written BYOD policy which, among other things, stipulates obligations on employees to comply with acceptable use directions, and to secure and keep confidential data on their personal devices according to the organisation’s security directions. Mobile device security requirements may include the following:
    1. Specific strong password requirements;
    2. Device lock requirements after a certain amount of idle time;
    3. Prohibition against use of rooted or jailbroken devices to access company network, systems, applications or data;
    4. Whitelisting or blacklisting certain devices and models.
  3. In addition, employers should consider implementing practical technological measures such as Mobile Device Management (MDM), Mobile Application Management (MAM), and Unified Endpoint Management (UEM) solutions.
  4. MDM solutions enable employers to manage company accounts and data on employees’ devices, whether personal devices or company-issued devices, and are agnostic as to the device’s operating system (whether it is iOS, Android, Windows, or otherwise). It generally works by containerization i.e. segregating company accounts and data within the devices from personal accounts and data. MDM solutions would enable employers to remotely configure application and account settings, enforce device encryption, wipe company accounts and data, whitelist or blacklist certain applications, update applications and licences, and obtain device location reports, status and activity reports, and so on.
  5. MAM solutions are a form of MDM solutions by way of specific software applications installed on the employees’ devices. Employers’ control is limited to the applications, and not the device generally, although MAM solutions may enable some extent of control over employees’ own non-company data without actually being able to view or access such data for the purpose of protecting the company data on the device.
  6. UEM solutions are single-point suites of solutions which enable control of both on-site and off-site devices and security, and include MDM and MAM solutions as well as other security solutions such as anti-malware solutions, web control software, firewalls, etc. UEM solutions enable administrators to enforce policies which are compliant with data privacy regulations, and ensure that only authorized applications with the requisite authentication and privileges can access sensitive data.

Employer’s Right to Data in Personal Devices?

  1. Employers may wish to assert ownership over work-related data stored in employees’ personal devices. In this regard, the common law does not recognise ownership over data per se because “data” is not considered “property” and the common law does not presently recognise “intangible property” other than a thing/chose in action,1Boardman v Phipps (1967) 2 AC 46 at 127, per Lord Upjohn. Your Response Ltd v Datateam Business Media Ltd (2015) 1 QB 41 at (42); Janesh s/o Rajkumar v Unknown Person (“CHEFPIERRE”) (2022) SGHC 264 at (56). i.e. a bundle of rights which can only be claimed or enforced by action.2See UK Law Commission, “Digital Assets: Final report”, Law Com No 412, paras 3.17-3.19. For a discussion on whether data per se should be subject to private property rights, see Hu Ying, “Private and Common Property Rights in Personal Data” (2021) 33 SAcLJ 173.
  2. Information and data may nonetheless give rise, or be subject, to intellectual property rights such as copyright. The general default position would be that any copyrightable work created by an employee would be owned by the employer.3Section 134, Copyright Act 2021. However, copyright does not necessitate a right to possession or control of the data.
  3. Do employers have a right to access, retrieve, or inspect the information stored in employees’ personal devices?
  4. Should an employee refuse to grant an employer consent or access to their personal devices, an employer probably cannot simply take things into their own hands without risking violating the law. This would include offences under the Computer Misuse Act 1993 as well as torts of conversion, detinue or breach of confidence. It is also possible that the implied duty of mutual trust and confidence in the employment relationship would be engaged.
  5. As such, employers would do well to include express provisions in a formal written policy duly incorporated into employment contracts which entitle the employer to have reasonable access to company data stored on or accessible through the employees’ personal devices and accounts (such as email, communication, and cloud storage accounts).4See Ang Ann Liang, “Employee Investigations – The Limits To Accessing Employees’ Emails And Personal Devices”, (2023) SAL Prac 2. The policy should properly define the scope of company data, such as to include work-related documents and contact information. Consideration should be had to what mode of access and the scenarios where the request for access would be considered reasonable. This may include e.g. access under the employee’s or an independent third party’s supervision, supervised access by an independent third party, or agreed scopes of searches or imaging by an independent forensic professional. The policy should also expressly prohibit employees from deleting or disclosing any company data on their personal devices unless with the employer’s approval.
  6. In a contentious scenario where an employee refuses to provide access or surrender company data pursuant to express contractual provisions, an employer may be able to apply to the Court for an order compelling the employee to deliver up and provide access to the company data even if it is stored in their personal devices. In SpaceSATS Pte Ltd v Chan Chia Sern and others [2023] SGHC 40, the plaintiff successfully sued the defendants (including former employees and seconded personnel providing services to the plaintiff) for, among other things, breach of contract to maintain confidentiality and surrender intellectual property and work products, and got an order that the defendants deliver up their personal devices to their solicitors, who were then to deliver them to IT forensic investigators appointed by the plaintiff.
  7. Insofar as any data or material “has the necessary quality of confidence about it” and has been “imparted in circumstances importing an obligation of confidence”, such as to engage the equitable law of confidence, the employer may also obtain an order of delivery up of the confidential data or material, apart from an injunction restraining the wrongful disclosure of the data.5Clearlab SG Pte Ltd v Ting Chong Chai and others (2014) SGHC 221 at (332); c.f. I-Admin (Singapore) Pte Ltd v Hong Ying Ting and others (2020) SGCA 32 at (56), (67)-(70).
  8. Indeed, it is often the case that employers enforcing their rights in legal action in contentious circumstances where the (former) employee has allegedly breached confidentiality would urgently apply ex parte / without notice for search orders or Anton Piller orders against the (former) employees. This would include searches conducted at the (former) employees’ homes (whether or not the home is owned by the employee) or subsequent workplaces.6See e.g. Clearlab SG Pte Ltd v Ting Chong Chai and others (2014) SGHC 221 at (22)-(29). Such search orders would involve searches into the (former) employees’ personal devices and the cloning or forensic imaging of the data on the personal devices.
  9. It should however be borne in mind that the information and materials obtained from a search order would be subject to the Riddick undertaking.7Riddick v Thames Board Mills Ltd (1977) 1 QB 881; Amber Compounding Pharmacy Pte Ltd and another v Lim Suk Ling Priscilla and others (2019) SGHC 269 at (14); Lim Suk Ling Priscilla and another v Amber Compounding Pharmacy Pte Ltd and another and another appeal and another matter (2020) 2 SLR 912 (CA) at (43). In discussing this principle, the Singapore apex court has cautioned against over-expansive search orders, suggesting that independent computer experts would be helpful in ensuring appropriate search terms used in computer searches to meet the legitimate needs of the applicant and to preserve data integrity.8Lim Suk Ling Priscilla and another v Amber Compounding Pharmacy Pte Ltd and another and another appeal and another matter (2020) 2 SLR 912 (CA) at (122)-(127).
  10. It is worth mentioning as regards search orders in respect of personal devices that generally, the terms of search orders would not allow a claimant to seize items which were not owned or controlled by the defendants.9BP Singapore Pte Ltd v Quek Chin Thean and others (2011) 2 SLR 541 (HC) at (64). In BP Singapore Pte Ltd v Quek Chin Thean and others [2011] 2 SLR 541 (HC),10BP Singapore Pte Ltd v Quek Chin Thean and others (2011) 2 SLR 541 (HC) at (62)-(67) the plaintiff executed search orders at the homes of the defendants and seized the personal devices of the defendants and their family members. The Court commented that if the devices were owned solely by the defendants’ family members, the defendants would have had no right to permit those items to be inspected or seized, and the family members would have been perfectly entitled to refuse to hand over such items. If the plaintiff had intended to also seize items belonging to the defendants’ family members, it should have specified such persons in the search orders, presumably with justification. However, this means that if there is justification for including employees’ family members and new employers in the search orders, such persons may be subject to onerous search orders.
  11. This serves as a cautionary tale for (former) employees. Employees who play fast and loose with their employer’s data or confidential information may risk getting themselves, and possibly even their family members or new employers, exposed to onerous circumstances such as search orders, injunctions, and delivery up orders.

Employer’s Discovery Obligations and Personal Accounts or Devices

  1. Another scenario an employer may face is when it is confronted with discovery or disclosure obligations in legal proceedings. Here, both employers and employees may face certain risks.
  2. If an employer is required to comply with general or specific discovery obligations, and the relevant data which may be required to be disclosed or is in fact required to be disclosed is stored in a current or former employee’s personal devices or accounts, what is the employer and employee to do?
  3. The Singapore courts have held that a litigant has a duty to take reasonable steps to search for relevant and material documents and to be satisfied that it has complied with its discovery obligations. Where documents may lie with a third party, the duty extends to making reasonable efforts to request for the relevant documents.11Natixis, Singapore Branch v Lim Oon Kuin and others (2023) SGHC 301 at (32); Saxo Bank A/S v Innopac Holdings Ltd (2022) 3 SLR 964 (HC) at (63); SK Shipping Co Ltd v IOF Pte Ltd (2012) SGHCR 14 at (38); Hai Jiao 1306 Ltd and others v Yaw Chee Siew (2020) 3 SLR 142 (HC) at (47); Phones 4U (in administration) v EE Ltd and others (2021) EWCA Civ 116 at (26) and (28). Otherwise, a litigant could simply come up with a “convenient ruse” for not providing discovery, even if those documents could be easily requested from the third party. Indeed, a particularly wily defendant could even deliberately put documents within the possession of a third party in order to then use that as an excuse not to provide discovery.12Natixis, Singapore Branch v Lim Oon Kuin and others (2023) SGHC 301 at (32).
  4. Where a litigant has the “practical ability” to access or obtain documents held in the possession of the third party, the producing party may be found to have a sufficient degree of control as to constitute power; the practical ability to obtain those documents is to be seen and assessed in context.13Natixis, Singapore Branch v Lim Oon Kuin and others (2023) SGHC 301 at (32); Hai Jiao 1306 Ltd and others v Yaw Chee Siew (2020) 3 SLR 142 (HC) at (46); Dirak Asia Pte Ltd and another v Chew Hua Kok and another (2013) SGHCR 1 at (35)–(37).
  5. Insofar as any disclosable document is stored in a current employee’s personal device, and the employer has contractual rights of access to the company data in the employee’s personal device, the employer may possibly be deemed to have the ‘practical ability’ to access or obtain the document and may also be deemed to have the power over the document in question such that the document must be disclosed by the employer.
  6. On the other hand, it may not be so clear if a party can be said to have the “practical ability” or power to access or obtain documents in a former employee’s possession, control or power. Again, this may turn on the specific terms of the employment contract.
  7. In Pipia v BGEO Group Ltd [2021] EWHC 86 (Comm), at [67]-[87], the Court considered that although the former employee had ceased employment with the defendant, the express provisions of the employment contract entitled the defendant to seek a surrender of the defendant’s confidential information post-termination; this gave the defendant the right to access the former employee’s smartphone used during his employment. Accordingly, the Court ordered that the relevant documents in the phone be disclosed.
  8. In contrast, in In re Pork Antitrust Litig., No. 18-cv-2022 WL 972401 (D. Minn. Mar. 31, 2022), the Court declined to order an employer to disclose text messages from the personal devices of its current employees. The BYOD policy terms of the employer did not assert ownership, control or right to access personal text messages of the employees, but merely defined company data as data that is sourced from company systems and synced between the mobile devices and its servers. The mere fact that they were employees of the company did not mean that the employer had the practical ability to demand access to data on its employees’ personal devices. The Court drew a distinction between permissibly asking for documents on one hand, and on the other hand impermissibly demanding them.
  9. In Phones 4U Ltd v EE Ltd & Ors [2021] EWCA Civ 116, the Court ordered a litigant to request its former employees or agents to voluntarily allow forensic IT consultants to examine their personal devices for relevant documents, as opposed to an order against those former personnel. The order was to enable the IT consultants to search for work-related communications relating to the employer’s business that would be passed to the relevant defendant for a disclosure review to be undertaken. The IT consultants were to undertake to the court to search the devices and emails for responsive material, not to disclose any other material to the defendant or its solicitors, and to return the devices and emails to those third parties, and to delete or destroy any copies. The court noted that although the third parties’ own data were mixed with the disclosable company-related documents, the inseparability of irrelevant materials does not justify refusal to permit inspection, extraction and copying of relevant material.14Phones 4U Ltd v EE Ltd & Ors (2021) EWCA Civ 116 at (29).
  10. In Fairstar Heavy Transport NV v Adkins [2013] EWCA Civ 886, the English Court of Appeal ordered that the employer/principal had the right to inspect and copy emails relating to its business which its former agent and CEO (although technically he was not an employee, but had provided services pursuant to a service agreement between the principal and his own company) had possession of in his own email account. The Court considered that the order should be for an inspection of the emails on the former agent’s computer, and permission to copy those emails;15Fairstar Heavy Transport NV v Adkins (2013) EWCA Civ 886 at (50). as a general rule, a principal is entitled to require production by the agent of documents relating to the affairs of the principal, even if the agency had been terminated;16Fairstar Heavy Transport NV v Adkins (2013) EWCA Civ 886 at (53); c.f. Phones 4U Ltd v EE Ltd & Ors (2021) EWCA Civ 116 at (10), citing Bowstead & Reynolds on Agency (21st edition, 2017). the issue of ownership or proprietary right in the contents of the emails is irrelevant.
  11. Accordingly, it appears from the foregoing authorities that much turns on (i) the relevant provisions in the employment contract and BYOD policy; and (ii) the legal nature of the relationship between the litigant and the third party who is in possession of the relevant documents or data. The fact that the employee’s device in question may contain personal data or documents which are irrelevant to the scope of disclosure does not preclude an order for inspection of the device.
  12. Where circumstances justify it, privacy concerns and interests of the former employee may be addressed by the appointment of an independent IT forensic consultant and perhaps additionally a supervising solicitor to supervise the inspection and access such that only such data as is required to pursue the legitimate interests of the applicant is collected.
  13. It is also worth highlighting that it is likely that the Personal Data Protection Act 2012 (PDPA) does not preclude such access, inspections, or disclosure, where the employer’s disclosure obligations are engaged as a result of legal proceedings. First, if the data in question is in any event not personal data but company data, it would not fall within the scope of the PDPA. Second, in any event, the PDPA provides exemption to consent for collection, use or disclosure of personal data where necessary for any investigation or proceedings.17Paragraph 3, Part 3, First Schedule, PDPA read with section 17 of the PDPA. Section 2(1) of the PDPA defines “investigation” as “an investigation relating to — (a) a breach of an agreement; (b) a contravention of any written law, or any rule of professional conduct or other requirement imposed by any regulatory authority in exercise of its powers under any written law; or (c) a circumstance or conduct that may result in a remedy or relief being available under any law”. And “proceedings” are defined as “any civil, criminal or administrative proceedings by or before a court, tribunal or regulatory authority that is related to the allegation of — (a) a breach of an agreement; (b) a contravention of any written law or any rule of professional conduct or other requirement imposed by any regulatory authority in exercise of its powers under any written law; or (c) wrong or a breach of a duty for which a remedy is claimed under any law”.

Conclusion

  1. We have considered that the express provisions of a formal written BYOD policy implemented by employers can have a wide-ranging impact on employers’ right of access to employees’ personal devices, maintaining the security and confidentiality of company-related data, and disclosure obligations in connection with legal proceedings. Employers should thus consider these scenarios and risks in developing an appropriate BYOD policy. Technological measures such as MDM, MAM and UEM solutions to manage security, confidentiality and data integrity risks should also be considered.
  2. In contentious circumstances, employers and employees should note the possible risk scenarios where personal devices of current or former employees may become subject to search orders, inspection, and disclosure orders. It is therefore pertinent for employers and employees alike to take into account such risks before actively or tacitly adopting any particular BYOD policy or approach.

Endnotes

Endnotes
1 Boardman v Phipps (1967) 2 AC 46 at 127, per Lord Upjohn. Your Response Ltd v Datateam Business Media Ltd (2015) 1 QB 41 at (42); Janesh s/o Rajkumar v Unknown Person (“CHEFPIERRE”) (2022) SGHC 264 at (56).
2 See UK Law Commission, “Digital Assets: Final report”, Law Com No 412, paras 3.17-3.19. For a discussion on whether data per se should be subject to private property rights, see Hu Ying, “Private and Common Property Rights in Personal Data” (2021) 33 SAcLJ 173.
3 Section 134, Copyright Act 2021.
4 See Ang Ann Liang, “Employee Investigations – The Limits To Accessing Employees’ Emails And Personal Devices”, (2023) SAL Prac 2.
5 Clearlab SG Pte Ltd v Ting Chong Chai and others (2014) SGHC 221 at (332); c.f. I-Admin (Singapore) Pte Ltd v Hong Ying Ting and others (2020) SGCA 32 at (56), (67)-(70).
6 See e.g. Clearlab SG Pte Ltd v Ting Chong Chai and others (2014) SGHC 221 at (22)-(29).
7 Riddick v Thames Board Mills Ltd (1977) 1 QB 881; Amber Compounding Pharmacy Pte Ltd and another v Lim Suk Ling Priscilla and others (2019) SGHC 269 at (14); Lim Suk Ling Priscilla and another v Amber Compounding Pharmacy Pte Ltd and another and another appeal and another matter (2020) 2 SLR 912 (CA) at (43).
8 Lim Suk Ling Priscilla and another v Amber Compounding Pharmacy Pte Ltd and another and another appeal and another matter (2020) 2 SLR 912 (CA) at (122)-(127).
9 BP Singapore Pte Ltd v Quek Chin Thean and others (2011) 2 SLR 541 (HC) at (64).
10 BP Singapore Pte Ltd v Quek Chin Thean and others (2011) 2 SLR 541 (HC) at (62)-(67)
11 Natixis, Singapore Branch v Lim Oon Kuin and others (2023) SGHC 301 at (32); Saxo Bank A/S v Innopac Holdings Ltd (2022) 3 SLR 964 (HC) at (63); SK Shipping Co Ltd v IOF Pte Ltd (2012) SGHCR 14 at (38); Hai Jiao 1306 Ltd and others v Yaw Chee Siew (2020) 3 SLR 142 (HC) at (47); Phones 4U (in administration) v EE Ltd and others (2021) EWCA Civ 116 at (26) and (28).
12 Natixis, Singapore Branch v Lim Oon Kuin and others (2023) SGHC 301 at (32).
13 Natixis, Singapore Branch v Lim Oon Kuin and others (2023) SGHC 301 at (32); Hai Jiao 1306 Ltd and others v Yaw Chee Siew (2020) 3 SLR 142 (HC) at (46); Dirak Asia Pte Ltd and another v Chew Hua Kok and another (2013) SGHCR 1 at (35)–(37).
14 Phones 4U Ltd v EE Ltd & Ors (2021) EWCA Civ 116 at (29).
15 Fairstar Heavy Transport NV v Adkins (2013) EWCA Civ 886 at (50).
16 Fairstar Heavy Transport NV v Adkins (2013) EWCA Civ 886 at (53); c.f. Phones 4U Ltd v EE Ltd & Ors (2021) EWCA Civ 116 at (10), citing Bowstead & Reynolds on Agency (21st edition, 2017).
17 Paragraph 3, Part 3, First Schedule, PDPA read with section 17 of the PDPA.

The post Employers’ Control of Data in Employees’ Personal Devices appeared first on The Singapore Law Gazette.

Determining the Law of the Arbitration Agreement

A Comparative Analysis of United Kingdom’s UniCredit Bank v RusChemAlliance and Singapore’s Anupam Mittal v Westbridge Ventures II Investment Holdings

This article offers a comparative analysis of the determination of the governing law of arbitration agreements in the UK and Singapore, focusing on the landmark cases of UniCredit Bank GmbH v RusChemAlliance LLC in the UK and Anupam Mittal v Westbridge Ventures II Investment Holdings in Singapore. It highlights the nuanced approaches both jurisdictions take in interpreting parties’ intentions regarding the governing law of arbitration agreements, especially in scenarios where such agreements lack explicit governing law provisions. The analysis highlights the absence of international consensus on this issue, with both the UK and Singapore emphasising the significance of the law of the main contract as a default governing law for the arbitration agreement, unless clear indications suggest otherwise. The article also discusses the implications of the forthcoming Arbitration Bill in the UK, which proposes a significant shift by prioritising the law of the seat of arbitration as the default governing law for arbitration agreements, unless the parties have expressly agreed otherwise. This legislative change is poised to diverge from the current common ground shared by UK and Singaporean approaches, potentially impacting how future arbitration agreements are interpreted and enforced in the UK. The anticipated divergence underscores the importance of explicitly specifying the governing law in arbitration agreements to avoid legal uncertainties and ensure the efficacy of arbitration clauses.

Introduction

  1. Lord Mustill, in his leading judgment in the 1993 case of Channel Tunnel Group Ltd v Balfour Beatty Construction Ltd, definitively stated that it is “by now firmly established that more than one national system of law may bear upon an international arbitration.1Channel Tunnel Group Ltd v Balfour Beatty Construction Ltd (1993) AC 334 at (67). Although Lord Mustill’s explanation is now more than three decades old, his words still ring true: the determination of the governing law of arbitration agreements remains a cornerstone issue, pivotal for ensuring the efficacy and enforceability of arbitration clauses. However, it is not without considerable debate, with difficulty lying in deciding which system of law should govern the arbitration agreement when the law of the main contract differs from that of the law of the seat. The resulting arbitrability of the dispute heavily depends on this determination, which can spell profound implications for contracting parties.
  2. As of the date of writing, there remains an absence of international consensus regarding the determination of the law of the arbitration agreement. In France, so-called “substantive rules” – “règles matérielles” – specify that the law of the seat will govern an arbitration agreement, including its validity and effectiveness, unless otherwise expressed by the parties to submit the arbitration agreement to another choice of law. However, the position is inversed in the United Kingdom (the UK) and Singapore: the chosen seat will not determine the law applicable to the arbitration agreement.
  3. This note delves into the approach taken to determine the governing law of arbitration agreements by the UK and Singapore, in particular by placing a spotlight on the critical judgments of UniCredit Bank GmbH v RusChemAlliance LLC (UniCredit)2UniCredit Bank GmbH v RusChemAlliance LLC (2024) UKSC 30. in the UK and Anupam Mittal v Westbridge Ventures II Investment Holdings (Anupam)3Anupam Mittal v Westbridge Ventures II Investment Holdings (2023) SGCA 1. in Singapore.
  4. These cases underscore the nuanced approaches English and Singapore courts have taken in deciphering the parties’ intentions regarding the governing law of arbitration agreements, especially when such agreements lack explicit governing law provisions. Through a comparative analysis, this note aims to illuminate the similarities and differences in the judicial treatment of arbitration agreements across the two jurisdictions, and highlight the potential implications of the forthcoming Bill to amend the Arbitration Act 1996 (the Arbitration Bill) in the UK.

The Approach in UniCredit Bank v RusChemAlliance (United Kingdom)

  1. English law, similar to the laws of many other jurisdictions, considers an arbitration agreement as a legally separable contract, entirely distinct from the main contract (referred to as the “matrix contract”) that contains the arbitration clause. Consequently, the law governing the arbitration agreement can differ from the law applicable to the contract in which it is embedded, as was the case in Sulamérica Cia Nacional de Seguros SA v Enesa Engenharia SA [2012] EWCA Civ 638 (Sulamérica).4Sulamérica Cia Nacional de Seguros SA v Enesa Engenharia SA (2012) EWCA Civ 638.
  2. Arbitration agreements often do not specify their governing law, which can lead to complications when the matrix contract is governed by a different jurisdiction’s law than where the arbitration occurs. Although the English Court of Appeal’s decision in Sulamérica provided some guidance, later rulings have complicated the process of identifying the governing law of an arbitration agreement.
  3. Thankfully, the UK Supreme Court decisions of: (i) Enka Insaat Ve Sanayi A.S. v OOO Insurance Company Chubb5Enka Insaat Ve Sanayi A.S. v OOO Insurance Company Chubb (2020) UKSC 38. (Enka); and more recently, (ii) UniCredit now offer a measure of clarity on the vexed issue of how to determine the proper law of an arbitration agreement.

UniCredit Bank GmbH v RusChemAlliance LLC

  1. In UniCredit, RusChemAlliance LLC (RusChem), a Russian company, entered into contracts with German firms for the construction of liquefied natural gas facilities. UniCredit issued the performance bond for these contracts. Following the European Union’s imposition of sanctions against Russia, the German contractors halted their work, leading RusChem to terminate the contracts. Subsequently, RusChem sought the repayment of advance payments and demanded the execution of the bond payments from UniCredit.
  2. The bonds were governed by English law (the law of the main contract) and included an International Chamber of Commerce arbitration clause stipulating that arbitration proceedings would take place in Paris (the law of the seat).
  3. However, RusChem commenced proceedings in Russia and UniCredit turned to the English courts to seek an anti-suit injunction on the basis that RusChem had breached the arbitration agreement. UniCredit, in order to establish the English court’s authority over RusChem, had to demonstrate that its claim pertained to a contract under English law. This requirement aligns with one of the “gateways” for serving proceedings outside the jurisdiction, as outlined in Civil Procedure Rules PD6B.3.1. UniCredit contended that the arbitration agreement was governed by English law, asserting that the selection of English law for the bond contract extended to the arbitration clause and all other contract clauses. Conversely, RusChem maintained that the arbitration agreement should be governed by French law, as it is the law of the arbitration’s seat, which was chosen by the parties.
  4. UniCredit reaffirmed the approach in Enka, namely that the law governing the arbitration agreement will be either: (i) the law (expressly or impliedly) chosen by the parties to govern it; or (ii) the system of law with which the arbitration agreement is most closely connected. The key principles arising out of Enka, as they pertain to UniCredit, are as follows:
  1. where the applicable law is not specified, the law chosen to govern the contract usually extends to the arbitration agreement, which is a component of the contract;
  2. choosing a different country as the seat of arbitration does not, by itself, negate the presumption that the law selected to govern the contract is also intended to govern the arbitration agreement; and
  3. in paragraph 170(iv) of Enka, the UK Supreme Court explained that there are circumstances that might suggest the parties intended for the law of the arbitration’s seat to govern the arbitration agreement. The relevant factor for the purpose of this case was that set out in paragraph 170(iv)(a): “any provision of the law of the seat which indicates that, where an arbitration is subject to that law, the arbitration agreement will also be treated as governed by that country’s law”.6Enka at (170).
  1. Conspicuously, the UK Supreme Court stated that merely specifying a choice of seat for the arbitration does not support an inference that the parties intended the law of the seat to govern the arbitration agreement.7UniCredit at (50).
  2. Applying the Enka test, the UK Supreme Court in UniCredit held that the arbitration clauses were governed by English law. The choice of Paris as the arbitration seat did not warrant a departure from the general rule, thereby granting the English court jurisdiction to repudiate the claim.

RusChem’s Argument

  1. While the decision favoured the law of the main contract, RusChem’s argument in the dispute warrants acknowledgment. RusChem argued that Enka, specifically at paragraph 170(iv)(a), introduced an exception to the general rule that the main contract’s governing law should also apply to the arbitration agreement. This exception would be relevant if the law of the chosen seat automatically governs the arbitration agreement in the absence of an explicit stipulation – under this premise, RusChem contended that selecting such a seat implied the parties’ intention for the arbitration agreement to be governed by the law of that seat. In this scenario, RusChem posited that a French court would likely find the arbitration agreement to be governed by French law.
  2. In response, Lord Leggatt, who delivered the leading judgment, rejected this argument. He clarified that the wording in paragraph 170(iv)(a) of Enka was “permissive rather than prescriptive” and that the parties should focus on the Court’s “underlying reasoning”.8Ibid. at (39). The core outcome of Enka was the determination that the selection of an English seat does not imply the choice of English law to govern the arbitration agreement. Lord Leggatt argued that a principle which assumes the arbitration agreement is governed by the law deemed applicable by the seat’s court would be “neither clear nor simple to apply”.9Enka at (55). The approach would necessitate examining the laws of the chosen foreign seat for arbitration to ascertain which law applies to the arbitration agreement. Moreover, the Court’s task is to deduce the parties’ intentions in selecting a foreign seat for arbitration – the principle proposed by RusChem was unlikely to reflect the intention of typical commercial parties.
  3. UniCredit has shown that the UK maintains a consistent stance, in line with Enka, on determining the law governing the arbitration agreement – by presuming it aligns with the law of the main contract. It is against this backdrop that we explore Singapore’s approach.

The Approach in Anupam Mittal v Westbridge Ventures II Investment Holdings (Singapore)

  1. Singapore’s approach to determining the law of arbitration agreement draws strong parallels with that of the UK. The decision of the Singapore Court of Appeal in Anupam affirmed the three-stage test laid out in BCY v BCZ (BCY).10BCY v BCZ (2016) SGHC 249.
  2. The dispute in Anupam concerned an investment in People Interactive (India) Private Limited, an Indian company which ran the online matchmaking website “shaadi.com”. A dispute arose between the founder (Anupam Mittal) and the private equity fund (Westbridge Ventures II Investment Holdings) with respect to Westbridge’s attempt to exit the business. The claimant and respondent had previously signed a shareholders’ agreement which governed their relationship; and this shareholders’ agreement envisaged an exit by way of IPO five years on from the initial investment by Westbridge. When Westbridge saw that an impending IPO was unlikely within the specified timeframe, they engaged in discussions with a competitor, with which it shared sensitive information. As such, the shareholders’ relationship deteriorated.
  3. Clause 20.1 of the shareholders’ agreement stated that the “[shareholders’ agreement] and its performance shall be governed by and construed in all respects in accordance with the laws of the Republic of India”. Further, clause 20.2 (the Arbitration Agreement) provided that all “such disputes that have not been satisfactorily resolved under Clause 20.1 above shall be referred to arbitration … and the place of arbitration shall be Singapore.” Notably, there was no express provision stipulating the law of the Arbitration Agreement.
  4. The claimant (Mittal) commenced proceedings in the National Company Law Tribunal (NCLT) in Mumbai, India against Westbridge alleging minority shareholder oppression. Consequently, in March 2021, the respondent (Westbridge) proceeded with an action before Singapore’s High Court to seek an interim anti-suit injunction restraining the proceedings before the NCLT, which the respondent argued was in breach of the arbitration clause. The Singapore High Court granted the interim injunction ex parte on the basis that the arbitration agreement was breached when the claimant commenced the proceedings in Mumbai. The claimant then commenced proceedings before the Mumbai High Court, arguing that the NCLT was the “only competent forum to hear and decide the disputes11Anupam at (18). and seeking a permanent injunction to restrain the respondent from pursuing arbitration in Singapore.
  5. Anupam was concerned with the appeal raised by the claimant, and the Singapore Court of Appeal had to determine whether the Arbitration Agreement was governed by Singapore or Indian law.
  6. To analyse this issue, the Singapore Court of Appeal applied the three-stage test laid down in BCY (based on Sulamérica) as follows.12Ibid. at (40).
  1. Stage 1: Whether parties expressly chose the proper law of the arbitration agreement.
  2. Stage 2: In the absence of an express choice, whether parties made an implied choice of the proper law to govern the arbitration agreement, with the starting point for determining the implied choice of law being the law of the main contract.
  3. Stage 3: If neither an express choice nor an implied choice can be discerned, which is the system of law with which the arbitration agreement has its closest and most real connection.[emphasis added]
  1. Applying the BCY test in Anupam, it found that for the first stage the Arbitration Agreement did not constitute an express choice of law, and language providing that the underlying shareholders’ agreement was to be governed by Indian law was “insufficient to constitute an express choice of the proper law of the arbitration agreement”.13Ibid. at (65). The Singapore Court of Appeal ruled that an express choice of law for an arbitration agreement required “explicit language stating so in no uncertain terms”.14Ibid. at (66).
  2. Proceeding to the second stage, the prevailing principle is that in the absence of explicit indications to the contrary, the law chosen for the main contract (Indian law) is presumed to apply to the arbitration agreement. Consequently, by virtue of the shareholders’ agreement between the parties being governed by Indian law, it is implied that Indian law was selected as the proper law of the Arbitration Agreement. In Sulamérica, the English Court observed that the governing law of the main contract “should only be displaced if the consequences of choosing it as the governing law of the arbitration agreement would negate the arbitration agreement even though the parties had themselves evinced a clear intention to be bound to arbitrate their disputes”.15Sulamérica at (65) and (74). While oppression claims are considered non-arbitrable under Indian law, the arbitration agreement explicitly covers disputes “relating to the management of the Company”.16Anupam at (70). Applying the Sulamérica criteria, the Singapore Court of Appeal concluded that applying Indian law would contradict the parties’ evident intention to resolve all disputes through arbitration. This constituted a sufficient indication to counter the presumption that Indian law was intended to govern the Arbitration Agreement.
  3. At the third stage, the Singapore Court of Appeal determined that Singapore law, as the law of the seat, possessed the “most real and substantial connection” to the Arbitration Agreement. Therefore, Singapore law was deemed to govern the Arbitration Agreement.17Ibid. at (75).

Similarities Between the UK and Singapore’s Approaches

  1. In determining the law governing arbitration agreements, the approach taken by the Singapore courts, as evidenced in the Anupam case, closely mirrors that of the English courts, as seen in the UniCredit and Enka cases. Specifically, the methodology applied in Anupam, which follows the BCY test, is consistent with the approach employed by the UK Supreme Court in the Enka case.
  2. The Singapore law position posits that the law governing the main contract is a significant indicator of the law that should govern the arbitration agreement, unless there are clear indications to suggest a different intention. The mere choice of a different seat of arbitration from the law governing the main contract does not suffice to displace this initial presumption. This presumption may only be revisited if adhering to the main contract’s governing law for the arbitration agreement would lead to its invalidation, contrary to the parties’ evident intention to settle disputes through arbitration.

Arbitration Bill

  1. Although the UK judiciary favours the presumption that the law governing the main contract also governs the arbitration agreement, this stance is poised for change. This shift is anticipated due to the Arbitration Bill, which is presently progressing through the UK Parliament.
  2. Clause 1 of the proposed Arbitration Bill introduces a new section 6A to the Arbitration Act 1996 as follows:

“6A Law applicable to arbitration agreement

  1. The law applicable to an arbitration agreement is —
    1. The law that the parties expressly agree applies to the arbitration agreement, or
    2. Where no such agreement is made, the law of the seat of the arbitration in question
  1. For the purposes of subsection (1), agreement between the parties that a particular law applies to an agreement of which the arbitration agreement forms a part does not constitute express agreement that that law also applies to the arbitration agreement.”
  1. The proposed Arbitration Bill marks a significant departure from the precedent established in UniCredit in three key aspects. First, it removes the opportunity for English courts to deduce an implied choice of law for the arbitration agreement. Second, should the parties not explicitly select a governing law for the arbitration agreement, the law of the arbitration’s seat will automatically be applied. Third, the Bill introduces a definitive rule that prioritises the law of the seat, moving away from the close connection test.
  2. The introduction of the proposed Arbitration Bill is set to (largely) nullify the rule established in Enka, significantly limiting its temporal relevance. Had this Bill been in force at the time the UniCredit case was heard before the UK Supreme Court, the outcome would have differed markedly: French law would have been applicable to the arbitration agreements, and consequently, UniCredit’s argument regarding the English law being the governing law would not have prevailed.
  3. Although the introduction of the new section 6A therefore signifies a new beginning, the UK Supreme Court decision in UniCredit does appear to unnecessarily complicate matters. As mentioned, the proposed new section 6A will helpfully eliminate the concept of implied choice in determining the law for the arbitration agreement. The default rule will be that the law of the seat of arbitration applies unless the parties have expressly agreed otherwise: that is clear.
  4. In the UniCredit judgment, the UK Supreme Court makes reference to the newly introduced section 6A, noting that the extent to which section 6A will modify the Enka ruling hinges on the interpretation of “what the word “expressly” is taken to add to the word “agree”” at section 6A(1)(a).18UniCredit at (28). With respect, the authors find it difficult to interpret section 6A in any way other than what it says on its face: “agreement between the parties that a particular law applies to an agreement of which the arbitration agreement forms a part does not constitute express agreement that the law also applies to the arbitration agreement”.19Proposed section 6A(2) Arbitration Bill 2024. Once the new section 6A is in force, unless parties have expressly stated what the law governing the arbitration agreement is, nothing else will suffice: the law of the seat shall apply. Courts will no longer have to contend with the potential presumption that an express or implied choice was made by the parties for the law governing the main contract to also apply to the arbitration agreement.

Conclusion

  1. Identifying the governing law of the arbitration agreement is crucial for protecting the interests of contracting parties. Currently, both the UK and Singapore adopt a similar stance: in instances where parties have not specified a governing law for the arbitration agreement, the chosen law for the main contract is presumed to govern the arbitration agreement as well.
  2. The anticipated overhaul of the approach established in Enka by the Arbitration Bill, which passed its third reading in the House of Lords on 6 November 2024, is set to change how English courts ascertain the governing law. With the potential enactment of section 6A in the Arbitration Bill, parties requesting anti-suit injunctions from English courts to back an arbitration agreement with a seat outside England will be required to demonstrate either an explicit agreement that English law governs the arbitration agreement or establish the jurisdiction of English courts via an alternative mechanism. This represents a notable shift from the precedent in UniCredit, consequently diverging from the methodology employed by Singapore in Anupam as well.
  3. Although it seems likely, if not certain, that the methods for determining the law of the arbitration agreement in the UK and Singapore will diverge in the near future, one clear aspect remains: both jurisdictions, long recognised as strong supporters of arbitration, are committed to enforcing parties’ agreements to arbitrate.
  4. While governing law and arbitration clauses are frequently termed “midnight clauses” due to their tendency to be hurriedly drafted and inserted at the final stages of negotiations, the cases of UniCredit and Anupam serve as welcome reminders that to avoid being entangled in legal complications long after midnight, contracting parties would do well to explicitly specify the law governing the arbitration agreement.

The authors would like to acknowledge the valuable contribution of Choon Wee Yeo, currently studying for a BA in Law at Homerton College, Cambridge.

Endnotes

Endnotes
1 Channel Tunnel Group Ltd v Balfour Beatty Construction Ltd (1993) AC 334 at (67).
2 UniCredit Bank GmbH v RusChemAlliance LLC (2024) UKSC 30.
3 Anupam Mittal v Westbridge Ventures II Investment Holdings (2023) SGCA 1.
4 Sulamérica Cia Nacional de Seguros SA v Enesa Engenharia SA (2012) EWCA Civ 638.
5 Enka Insaat Ve Sanayi A.S. v OOO Insurance Company Chubb (2020) UKSC 38.
6 Enka at (170).
7 UniCredit at (50).
8 Ibid. at (39).
9 Enka at (55).
10 BCY v BCZ (2016) SGHC 249.
11 Anupam at (18).
12 Ibid. at (40).
13 Ibid. at (65).
14 Ibid. at (66).
15 Sulamérica at (65) and (74).
16 Anupam at (70).
17 Ibid. at (75).
18 UniCredit at (28).
19 Proposed section 6A(2) Arbitration Bill 2024.

The post Determining the Law of the Arbitration Agreement appeared first on The Singapore Law Gazette.


Development in the Law Relating to Estate and Mental Capacity Practices 2014 to 2024

With the growth of Singapore as a wealth hub in the last 10 years, there has been a corresponding growth and development in our law in related areas such as estate and trust administration, succession and mental capacity issues. This article is largely based on a 15-minute session at the Family Law Conference on 3 and 4 September 2024 on the development in the law relating to Estate and Mental Capacity practices in the last 10 years.

As with the session, it is a challenge to seek to properly capture the progress in these areas in this relatively short article. The objective is thus to provide a high-level view of the relevant case precedents in the last 10 years under each relevant topic and hopefully a springboard for further and more interesting development of the law in these areas.

Rectification of Wills

Section 28 was included in the Wills Act 18381This amendment was precipitated by the case Cheo Yeoh & Associates LLC v AEL (2015) 4 SLR 325, where beneficiaries who suffered losses because of an invalid Will sued the solicitor for professional negligence. On the issue of mitigation of damages, the Court of Appeal citing English cases, took the view that the claimant should seek rectification of the Will before proceeding on a claim for damages against the solicitor. The Court of Appeal however noted that the remedy of rectification was not available in Singapore. (See also, parliamentary comments by Ms Indranee Rajah on 9 May 2016, Parliament No 13, Session No 1, Volume No 94, Sitting No 20 at 4:04 pm and 4:32 pm) in 2016, after a period of almost 20 years without any amendments. There does not appear to be any Singapore reported decisions on rectification since the amendment.2In UK though, in Marley v Rawlings (2014) UKSC 2, a husband and wife had signed each other’s will. Rectification was allowed.

The Presumptions

Cheo Yeoh & Associates LLC v AEL3Cheo Yeoh & Associates LLC v AEL (2015) 4 SLR 325 importantly, set out the legal position in relation to the presumption of revocation, presumption of intestacy and doctrine of conditional revocation. The legal position is this: Firstly, the Court will determine if there is any evidence that the testator intended to revoke a will. If there is no such evidence, the question is whether the presumption of revocation is triggered (i.e. the will is burnt, torn or otherwise destroyed; or cannot be located upon the testator’s death, despite reasonable efforts).

Secondly, the presumption of revocation is rebuttable and the person seeking to rebut the presumption may rely on the doctrine of conditional revocation. It is for him to (i) show some evidence that the will has been destroyed; (ii) prove the existence of the condition upon which revocation was wholly and solely premised; and (iii) the non-fulfilment of that condition such that the will he is seeking to rely on is still valid.

Lastly, the presumption against intestacy operates as a rule of construction in a case where the testator’s intention is ambiguous and the presumption of revocation has not arisen or has been rebutted by the doctrine of conditional revocation.

These principles were applied in WEZ v WFA.4WEZ v WFA (2022) SGFC 62. In this case, the former wife and residuary legatee of the testator applied to admit a copy of the Will for Grant of Probate. The original of the Will could not be located. The Court took into account that the wife and the testator had divorced and the testator had in his last days asked his daughter to engage a lawyer in concluding that the former wife had failed to rebut the presumption of revocation.

Testamentary Capacity

On the issue of testamentary capacity, the law has not changed since Chee Mu Lin Muriel v Chee Ka Lin Caroline.5Chee Mu Lin Muriel v. Chee Ka Lin Caroline (2010) 4 SLR 373 This has been re-stated in cases such as ULV v ULW,6ULV v. ULW (2019) 3 SLR 1270 UWF v UWH7UWF v. UWH (2021) 4 SLR 314 (UWF) and WWI v WWJ8WWI v. WWJ (2024) SGFC 22 (affirmed on appeal (2024) SGHCF 28) (WWI).

For a valid Will, the testator must have the mental capacity to make a Will, have knowledge and approve of the contents of the Will, and be free from undue influence or the effects of fraud. The testator must also have testamentary capacity. That is, the testator must understand the nature of the act and consequences of executing the Will, know the extent of his property which he is disposing, know who his beneficiaries are, and appreciate their claims to his property and be free from an abnormal state.

In UWF, the Court clarified that undue influence in the probate context meant coercion, that is, the testator was coerced into making a Will, or part of it, which he did not want to make. The persuasion is of such intensity as to overpower his volition but without actually convincing him.

In WWI, the Court stated that an indication of testamentary capacity would be the rationality of the Will having regard to its terms and identities of the beneficiaries.

Executor, Administrator and Trustee

The division of roles between those of an administrator/executor and those of a trustee remains. The administrator/executor “calls in” the estate, collects and converts the assets into cash, and pays all the testamentary expenses, estate duty, debts and legacies. When this is done, his duty as the administrator/executor is discharged, he steps into the shoes of a trustee.9Foo Jee Boo v. Foo Jhee Tuang (2016) SGHC 260 and Ong Wui Teck (personal representative of the estate of Chew Chen Chin, deceased) v. Ong Wui Swoon (2019) SGCA 61

The importance of this distinction is illustrated in UJT v UJR10UJT v. UJR (2018) 4 SLR 931 (UJT) and in VIK v VIL (VIK).11VIK v. VIL (2021) 3 SLR 857 In UJT, the Court pointed out that a sole personal representative of an estate has the power to sell land belonging to the deceased’s estate12see section 15(4) Trustees Act 1967 while by contrast, a trustee must exercise his power of sale with another trustee except where the trustee is a trust corporation.13see sections 15(2) and 15(3) of the Trustees Act 1967

In VIK, the issue arose as to whether the applicant was acting as an administrator or a trustee in their application to court for a power of sale. 14The Will of the testator provided the trustee (and not the administrator) with the power of sale. Section 56 of the Trustees Act 1967 (“TA”) however, applies to both an administrator and a trustee, by reason of sections 2(1) and (3) TA which defined trustee to include executors and administrators. The Court held that as not all liabilities of the estate has been paid, the applicant was acting in their role as administrators.

Whether the personal representative is an executor or an administrator affects the right of the party to litigate for the deceased’s estate. The general principle is stated by Chao Hick Tin JA in Teo Gim Tiong v Krishnasamy.15Teo Gim Tiong v. Krishnasamy Pushpavathi (legal representative of the estate of Maran s/o Kannakasabai, deceased) (2014) 4 SLR 15 Executorship takes effect from the moment of death and the executor can be substituted in place of the deceased in court proceedings, without a grant of probate. For intestacy cases, until such time as the grant of letters of administration is extracted, the cause of action of the deceased estate is vested in the Public Trustee.16See section 37 of the Probate and Administration Act 1934 The administrator could not lawfully commence or continue action on behalf of the estate, until the grant of letters of administration is extracted.17This was elaborated further in Phoa Eugene (personal representative of the estate of Evelyn Phoa (alias Lauw Evelyn Siew Chiang), deceased and personal representative of the estate of William Phoa, deceased) v Oey Liang Ho (alias Henry Kasenda) (sole executor of the estate of Wirio Kasenda (alias Oey Giok Tjeng), deceased) (2024) 4 SLR 1108 (Phoa Eugene) which held that when the grant of the application for letters of administration is obtained, the property of the intestate is vested in the administrator. The authority to administer the deceased’s estate is conferred upon the administrator only upon the extraction of the sealed grant of letters of administration. Likewise, until the reseal of a foreign grant is extracted in Singapore, the administrator has no authority to administer the deceased’s estate. See also China Taiping Insurance v Low Yi Lian Cindy (2018) 4 SLR 523. The proper party to obtain remedy on behalf of estate is the executor or administrator of the estate; on behalf and for a mentally incapable litigant is its donee or deputy. Dependents under the Workmen Injury and Compensation Act claim in their own capacity, and not that of the injured person.

The rule that only the executor or the administrator may sue is subject to the exception established locally in Wong Moy (administratrix of the estate of Theng Chee Khim, deceased) v Soo Ah Choy18Wong Moy (administratrix of the estate of Theng Chee Khim, deceased) v Soo Ah Choy (1996) 3 SLR(R) 27 (Wong Moy) which allows a beneficiary to sue on behalf of the estate. Crucially, there is no restriction as to the kinds of action that a beneficiary may institute to protect the estate’s assets, save that the beneficiary cannot be in a better position than a trustee carrying out his duties in a proper manner.19see Wong Moy at (12), (14), (24) and (28)

In Mustaq Ahmad v Ayaz Ahmed 20Mustaq Ahmad (alias Mushtaq Ahmad s/o Mustafa) v Ayaz Ahmed (2024) 1 SLR 1016 (Mustaq Ahmad) the High Court exercising its appellate jurisdiction allowed the beneficiary to commence minority oppression proceedings with respect to a company in which the estate is a shareholder (as the alleged wrongdoer was also the administrator of the estate). The Court reiterated that the test remains that in Wong Moy,21In Sia Chin Sun v Yong Wah Poh (2019) 3 SLR 1168, where the claimant had applied to pursue the estate’s pecuniary claim, the learned Judge in the High Court had held that the Wong Moy exception only permitted a beneficiary to bring “proprietary claims to protect and preserve the assets of the estate”. In Mustaq Ahmad at (104), the Court was of the view that Sia Chin Sun v Yong Wah Poh does not stand for any legal proposition regarding limits to the types of claims that a beneficiary may bring on behalf of the estate. that is, in considering whether a beneficiary should be allowed to commence or maintain proceedings for the estate, all the circumstances of the case should be considered, including the nature of the assets, the position of the personal representative and the reason for the default of the personal representative.22It would also be pertinent to consider whether the circumstances made it impossible or seriously inconvenient for the representative to take proceedings.

In Phoa Eugene,23Phoa Eugene (personal representative of the estate of Evelyn Phoa (alias Lauw Evelyn Siew Chiang), deceased and personal representative of the estate of William Phoa, deceased) v Oey Liang Ho (alias Henry Kasenda) (sole executor of the estate of Wirio Kasenda (alias Oey Giok Tjeng), deceased) (2024) 4 SLR 1108 the Court held that the Wong Moy exception applied and allowed a beneficiary to be added to proceedings, despite Order 15 rule 15(1) of the Rules of Court 2014 (RoC)24rule 364 of the Family Justice Rules 2014 (FJR) which only allowed one of the litigating parties to be appointed to represent the estate.

Duties of Personal Representatives

Lakshmi Prataprai Bhojwani v Moti Harkishindas Bjohwani25Lakshmi Prataprai Bhojwani (alias Mrs Lakshmi Jethanand Bhojwani) v MotiHarkishindas Bjohwani (2019) 3 SLR 356 (Lakshmi) deals with the duty of an executor and trustee to account to the beneficiaries. The Court made the distinction between (1) named beneficiaries whose benefits are to be paid out based on the discretion of the trustee; and (2) persons who are members of a beneficiary class and hence possible beneficiaries. Named beneficiaries are entitled to an account from the executor/ trustee as they have an identifiable interest in the estate regardless of the manner in which the trustee’s discretion may be exercised; but not persons who are possible beneficiaries as part of a beneficiary class. A trustee’s duty to account is limited to matters which occurred in their term as a trustee and assets which were in their control as trustee. The Court may also, in its discretion, decline to make an order for an account if it will be oppressive for the trustee to do so or if there are other good reasons.

In Mustaq Ahmad v Providentia Wealth Management Ltd26Mustaq Ahmad @ Mushtaq Ahmad s/o Mustafa v Providentia Wealth Management Ltd (2023) SGHCF 52 the Court stated that as a starting point, a beneficiary does not have any entitlement as of right to disclosure of trust documents. This, however, is to be balanced against the beneficiary’s right for an account and the need to maintain trust confidentiality. The Court refused the applicant’s request for disclosure of communication between the trustee and other beneficiaries.

GDR v GDL27GDR v GDL (2022) SGHC 30 dealt with the law of assent. It held that assent may be given notwithstanding that there are debts and other liabilities still outstanding. Executors, when they assent, should be satisfied that the transferee is entitled to the distribution, that a valid receipt can be obtained, and the estate has sufficient funds to meet any remaining liabilities after distribution.

GDR v GDL was followed by Mustaq Ahmad v Providentia Wealth Management Ltd28Mustaq Ahmad @ Mushtaq Ahmad s/o Mustafa v Providentia Wealth Management Ltd (2023) SGHCF 53. This is related to but a different decision from Mustaq Ahmad @ Mushtaq Ahmad s/o Mustafa v Providentia Wealth Management Ltd (2023) SGHCF 52 referred to above. wherein the applicant applied for interim distributions from the estate. The Court held, consistent with the decision in Ong Wui Teck v Ong Wui Soon,29Ong Wui Teck (personal representative of the estate of Chew Chen Chin, deceased) v Ong Wui Soon (2019) SGCA 61 that once an executor decides that he no longer requires the estate’s assets for the satisfaction of liabilities, he should assent to the legacy; delaying distribution where there is sufficient value and liquidity is a breach of duty.

In British and Malayan Trustees Limited v Ameen Ali Salim Talib,30British and Malayan Trustees Limited v Ameen Ali Salim Talib (2024) SGHC 203 (Ameen) the trustee had over the years, distributed the income of a trust based on an interpretation of a provision of the Will, which though supported by legal opinions, was held by the Court to be erroneous. The Court allowed the trustee’s application to court for recoupment of overpayment from the beneficiaries’ future distribution.

Administration Action

The Court in Ameen31This is an administration action which can be made under Order 80 rule 2(1) RoC or rule 786 FJR. The purpose of these administration actions is to provide guidance to personal representatives in the performance of their duties or protection to beneficiaries and creditors against the actions of personal representatives. affirmed the four categories of administration action32As stated in PT v Cooper (2001) WTLR 901 and accepted in Foo Jee Seng v Foo Jhee Tuang (2012) 1 SLR 211 – (1) where the issue is whether some proposed action is within the trustees’ powers; (2) where the issue is whether the proposed course of action is a proper exercise of the trustees’ powers; (3) where there is a surrender of discretion to the Court (eg where the trustees are deadlocked, conflicted from acting or other reasons); and (4) where the trustees have actually taken action and the action is attacked as being either outside their powers or an improper exercise of their powers.

Of interest is the second category – where the trustee’s decision is “particularly momentous”,33Such as on the facts of Ameen. it may be prudent for the trustee to obtain the blessing of the court for their proposed action.34An interesting illustration of this is the case of Grand View Private Trust Co Ltd v Wen-Young Wong (2022) UKPC 47, a Privy Council decision on appeal from the Court of Appeal for Bermuda.

Administration of Estate

In HSBC Trustee (Singapore) Limited v Carolyn Fong Wai Lyn (Carolyn Fong),35HSBC Trustee (Singapore) Limited v Carolyn Fong Wai Lyn (2016) SGHC 31 the estate was left with no liquidity after years of litigation. On the application of the administrator, the Court allowed the administrator to mortgage two properties instead of the option to sell one of the properties. A few years later, the case returned to the courts as VIK v VIL36VIK v VIL (2021) 3 SLR 857 with the administrator seeking a sale of one of the properties as they had not been able to procure any mortgages. The Court held that there was no res judicata in respect of its earlier decision37HSBC Trustee (Singapore) Limited v .Carolyn Fong Wai Lyn (2016) SGHC 31 declining to order a sale.

Removal of Personal Representatives

An application to remove a personal representative can be made at various junctures. In Chiang Shirley v Chiang Dong Pheng,38Chiang Shirley v Chiang Dong Pheng (2015) 3 SLR 770 the applicant objected to the grant being made to the executor named in the Will, under sections 8(1) and 55 of the Probate and Administration Act 1934 (PAA). For this, the test is whether there is evidence that it would be undesirable or unsafe for the estate to be in the hands of the named executor and whether there is someone else (not in an acrimonious relationship) to pass the administration to.

In Ong Wui Swoon v Ong Wui Teck,39Ong Wui Swoon v Ong Wui Teck (2015) SGDC 270 the application was made to revoke a grant to an executor under section 32 of PAA. The revocation is to be made with “sufficient cause”, which is “undue and improper administration of the estate in total disregard of the interests of the beneficiaries.” The Court will consider whether the revocation of the grant is in the interest of the beneficiaries.

In Carolyn Fong,40HSBC Trustee (Singapore) Limited v Carolyn Fong Wai Lyn (2016) SGHC 31 the sole administrator applied to be discharged due to unpaid fees. The Court considered the removal without a replacement as an extreme remedy which would be inappropriate in most cases. The court refused the application.41Query: whether it is even possible for a sole administrator/trustee to be discharged in view of section 40 Trustees Act 1967.

Trustee’s Liability

UVJ v UVH42UVJ v UVH (2020) 2 SLR 336 (lower court’s decisions at (2020) 3 SLR 1329, and (2020) 3 SLR 1355) stands for the proposition that there must be causation between breach of fiduciary duty and profit made for an account of profit.

Jurisdiction of Courts

It is important to be aware of the limits of the jurisdiction of the Family Courts.43Specifically, as stated in section 26(3A) of the Family Justice Act 2014, the jurisdiction of the Family Courts is set out in sections 17(1)(a), (d), (e) and (f) and 17A of the Supreme Court of Judicature Act 1969.

In URF v URH44URF v URH (2020) 3 SLR 314, in defending an application to propound a 2008 Will of the deceased, the defendant inter alia, challenged transfers of monies made by the deceased to the applicant in his lifetime. The Family Court held that such claims relating to inter vivos transfers are not within its jurisdiction.

Tan Zhi Wei Alan v Tan Jia Lin Jaylin45Tan Zhi Wei Alan v Tan Jia Lin Jaylin (2023) SGHC 271 was an application made to the General Division of High Court to remove a joint administrator. The High Court dismissed the application in light of section 26(3A) of the Family Justice Act 2014 (FJA). Section 26(3A) FJA provided that if any family proceedings may be heard and determined by the Family Court or by the Family Division of the High Court, those proceedings must in the first instance be commenced in a Family Court.

Other Estate Related Issues

The Court in UAM v UAN46UAM v UAN (2018) 4 SLR 1086 held that there is no limitation period applicable to probate claims. The defence of laches could be applied to probate proceedings, but given the policy to give effect to the wishes of the testator, the threshold for the defence of laches is higher than in others.

The Court in Chye Seng Kait v Chye Seng Fong47Chye Seng Kait v Chye Seng Fong (executor and trustee of the estate of Chye You, deceased) (2021) 2 SLR 1131 held that the deceased’s intention for the right of survivorship to apply was clear in clause 2 of the Will, and accordingly the jointly held assets were gifted to the surviving owner. The Court’s approach in a case where the Will provides for the application of resulting trust (so that the jointly held asset is to be dealt with according to the provisions of the Will) is less clear but definitely more interesting.48See for instance, Khoo Phaik Eng Katherine v Khoo Phaik Ean Patricia (2023) SGHC 314

In relation to claims by or against the estate, the Court stated that it is the duty of the executor to determine the extent of assets and liabilities of the deceased and act diligently and reasonably in realising the assets. It is for the executor to balance between whether there was a cause of action and the potential value of the cause given the costs to the estate.

The Court further endorsed the practice of including a condition of acceptance of the estate’s account in the final distribution of the residuary estate.

VTL v VTM49VTL v VTM (2021) SGHCF 30 held that a mutual will (i.e. a Will which is executed by a testator pursuant to an agreement not to revoke) takes precedence over subsequent wills.

Determination of Mental Capacity

The locus classicus remains set out in the Court of Appeal decision in Re BKR.50Re BKR (2015) 4 SLR 81 The test as to whether a person lacks capacity is set out in section 4 of the Mental Capacity Act 2008 (MCA). It is decision-specific and time-specific with a clinical component (impairment of, disturbance in the functioning of the mind or brain) and a functional component (inability to make that particular decision at the material time). The Court will require expert evidence for the clinical component while the functional component is a question for the Court51As the assessment as to whether a person has mental capacity is fact-driven, the Court is watchful as to the evidence before the Court. The Court placed little weight on video recordings which are edited or do not provide context (see WEW v WEX (2022) SGFC 60; (2022) SGHCF 32, but contrast with the weight placed on video recording in Goh Yng Yng Karen (executrix of the estate of Liew Khoon Fong (alias Liew Fong), deceased) v Goh Yong Chiang Kelvin (2021) 3 SLR 896), medical reports obtained from “doctor shopping” or where doctors are not properly briefed or even mis-represented to (see VKX v. VKW (2024) SLR(FC) 18). for which there is limited scope for medical experts.

The fact that a person has a medical impairment does not necessarily mean that he lacked mental capacity.52ULP v ULS (2021) 5 SLR 1291

In BUV v BUU,53BUV v BUU (2020) 3 SLR 1041 based inter alia, on P’s performance under cross examination, the Court held that P did not have the requisite mental capacity. The Court held that the “assistance” to be provided to P for his decision making in sections 3(3) and 5(2) MCA refers to “facilitative assistance” which is aimed at helping a person retain his decision-making ability. There must be a base level of capacity.54See also WWI v WWJ (2004) SGFC 22

Goh Yng Yng Karen v Goh Yong Chiang Kelvin55Goh Yng Yng Karen (executrix of the estate of Liew Khoon Fong (alias Liew Fong), deceased) v Goh Yong Chiang Kelvin (2021) 3 SLR 896 followed the approach in Re BKR as to the interaction between mental impairment and undue influence. The Court will have regard of the actual circumstances holistically and decide whether the undue influence caused P to be unable to make decisions.56In ULP v ULS (2021) 5 SLR 1291, it was held that though P had the mental capacity to execute her Lasting Power of Attorney (LPA), she was under undue influence from her son. Her LPA was revoked.

Choice of Deputies

VUW v VUT57VUW v VUT (2021) SGHCF 41 overruled the practice of appointing one plaintiff and one defendant as deputies.58The learned Debbie Ong J held that it is not appropriate or practical as the opposing interests of the deputies where trust was lacking may negatively impact the welfare of P. Given P’s need for consistent and constant care, neither was it in P’s interest for P to be cared for in alternate weeks by each deputy.

Statutory Wills

BHR v BHS59BHR v BHS (2013) SGDC 149 deals with the Court’s exercise of its power60Section 23(1)(k) MCA to execute a Will for P. The overarching principle is the best interest of P, including but not limited to the factors set out in section 6 MCA.61in particular sections 6(8) and (9) MCA The learned DJ Foo Tuat Yien held that the weight to be attached to the different factors may differ depending on the circumstances of each case and features or factors of “magnectic importance” will have decisive influence on its determination. These can include how P will be remembered62TCZ v TDA, TDB and TDC (2015) SGFC 63 and the provisions in P’s previous Will.63P’s previous Will is a relevant written statement, but the weight to be given to it will depend upon the circumstances under which it was prepared (for instance, whether P lacked capacity). The Court should not refrain from directing the execution of a statutory will where the validity of an earlier will is in dispute. The existence and nature of the dispute and the ability of court to investigate the issues which underlie it are relevant in deciding whether it is in P’s best interest to order the execution of a statutory Will.

Other Mental Capacity Related Issues

In Re TQR,64Re TQR (2016) SGFC 98 Colin Tan DJ set out the considerations in granting investment powers to the deputy.65These include whether P has enough assets for investment, the relationship between the deputy and P in particular, whether the deputy is a close relative or a future beneficiary of P, and the safeguards for bad investments.

WBK v WBL66WBK v WBL (2024) SLR(FC) 192 provided guidance as to the powers of a donee for personal welfare. The Court took into account that the donor has chosen to empower the donee. Accordingly, the donee may place restrictions on access to P so long as these are not unreasonable. The donee is not required to consult with others, including P’s family members, as to the medical care of P and may instruct doctors to communicate with the donee only.

The Court in ULP v ULS67ULP and others v ULS (2018) SGFC 43 set out the options available to an applicant to obtain a medical report on P.68Applications may be made under section 20(2) MCA for the Court to authorise, on P’s behalf, the release of P’s medical record; under section 18(2)(a) MCA for the Court to direct the donee of an LPA not to object to the release of medical records; under rule 495 FJR to administer interrogatories to non-party; and/or to issue a subpoena for the production of the medical records. Section 36 MCA is for situations where an order is needed urgently to protect P’s interests and not for the production of medical reports. Likewise, paragraph 19 of the First Schedule of the Supreme Court of Judicature Act 1969 allows orders to be made for medical examination of a person who is a party to the legal proceedings.69Goh Tze Chien v Tan Teow Chee (2024) SGHC 1

The Court in WLR v WLT70WLR v WLT (2023) 5 SLR 1372 held that section 23(1)(d) MCA does not give the Court power to appoint a deputy as a director.

Where tortfeasors apply to be joined as a party in legal proceedings for appointment of deputies, the court in TWD v UQE71TWD v UQE (2019) 3 SLR 662 held that the relevant provision is rule 178(2) of the Family Justice Rules 2014 (FJR) and not Order 15 rule 6(2)(b) RoC. To allow such joinders, the advantage of the joinder had to outweigh the disadvantages.

Practice Reminders

The various cases in these areas in the last 10 years also illustrated the unusual position which lawyers may find themselves in, whether dealing with other family members of the client, dealing with a client who may have been alleged to lack mental capacity or putting in place legal documentation to facilitate the intention of the client. While trite, it remains a good reminder that as an advocate and solicitor, the lawyer may owe other duties, in addition to the duty to act in the best interest of the client.

The Court of Appeal has stated in several cases72See for example, Kuek Siang Wei v Kuek Siew Chew (2015) 5 SLR 357, Mahidon Nichiar bte Mohd Ali v Dawood Sultan Kamaldin (2015) 5 SLR 62 involving family arrangements that the solicitor acting for the administrator or executor may owe a duty to the beneficiaries and potential beneficiaries and there are possibilities of conflicts of interest. The solicitor should be conscious of these and consider the beneficiaries’ need for independent legal advice and/or full and frank disclosure of opinions rendered by the solicitors.

Powers of attorney, when executed, may be used against the interest of the donor. Accordingly, solicitors must be conscious of the standard expected of lawyers in discharging their duties to client in the execution of powers of attorney.73Goh Yng Yng Karen (executrix of the estate of Liew Khoon Fong (alias Liew Fong), deceased) v Goh Yong Chiang Kelvin (2021) 3 SLR 896. The solicitor is expected to speak with the client first, and take sufficient steps to satisfy himself that the client has mental capacity. Charging a small fee is not an excuse for cutting corners.

Endnotes

Endnotes
1 This amendment was precipitated by the case Cheo Yeoh & Associates LLC v AEL (2015) 4 SLR 325, where beneficiaries who suffered losses because of an invalid Will sued the solicitor for professional negligence. On the issue of mitigation of damages, the Court of Appeal citing English cases, took the view that the claimant should seek rectification of the Will before proceeding on a claim for damages against the solicitor. The Court of Appeal however noted that the remedy of rectification was not available in Singapore. (See also, parliamentary comments by Ms Indranee Rajah on 9 May 2016, Parliament No 13, Session No 1, Volume No 94, Sitting No 20 at 4:04 pm and 4:32 pm)
2 In UK though, in Marley v Rawlings (2014) UKSC 2, a husband and wife had signed each other’s will. Rectification was allowed.
3 Cheo Yeoh & Associates LLC v AEL (2015) 4 SLR 325
4 WEZ v WFA (2022) SGFC 62. In this case, the former wife and residuary legatee of the testator applied to admit a copy of the Will for Grant of Probate. The original of the Will could not be located. The Court took into account that the wife and the testator had divorced and the testator had in his last days asked his daughter to engage a lawyer in concluding that the former wife had failed to rebut the presumption of revocation.
5 Chee Mu Lin Muriel v. Chee Ka Lin Caroline (2010) 4 SLR 373
6 ULV v. ULW (2019) 3 SLR 1270
7 UWF v. UWH (2021) 4 SLR 314
8 WWI v. WWJ (2024) SGFC 22 (affirmed on appeal (2024) SGHCF 28)
9 Foo Jee Boo v. Foo Jhee Tuang (2016) SGHC 260 and Ong Wui Teck (personal representative of the estate of Chew Chen Chin, deceased) v. Ong Wui Swoon (2019) SGCA 61
10 UJT v. UJR (2018) 4 SLR 931
11 VIK v. VIL (2021) 3 SLR 857
12 see section 15(4) Trustees Act 1967
13 see sections 15(2) and 15(3) of the Trustees Act 1967
14 The Will of the testator provided the trustee (and not the administrator) with the power of sale. Section 56 of the Trustees Act 1967 (“TA”) however, applies to both an administrator and a trustee, by reason of sections 2(1) and (3) TA which defined trustee to include executors and administrators.
15 Teo Gim Tiong v. Krishnasamy Pushpavathi (legal representative of the estate of Maran s/o Kannakasabai, deceased) (2014) 4 SLR 15
16 See section 37 of the Probate and Administration Act 1934
17 This was elaborated further in Phoa Eugene (personal representative of the estate of Evelyn Phoa (alias Lauw Evelyn Siew Chiang), deceased and personal representative of the estate of William Phoa, deceased) v Oey Liang Ho (alias Henry Kasenda) (sole executor of the estate of Wirio Kasenda (alias Oey Giok Tjeng), deceased) (2024) 4 SLR 1108 (Phoa Eugene) which held that when the grant of the application for letters of administration is obtained, the property of the intestate is vested in the administrator. The authority to administer the deceased’s estate is conferred upon the administrator only upon the extraction of the sealed grant of letters of administration. Likewise, until the reseal of a foreign grant is extracted in Singapore, the administrator has no authority to administer the deceased’s estate. See also China Taiping Insurance v Low Yi Lian Cindy (2018) 4 SLR 523. The proper party to obtain remedy on behalf of estate is the executor or administrator of the estate; on behalf and for a mentally incapable litigant is its donee or deputy. Dependents under the Workmen Injury and Compensation Act claim in their own capacity, and not that of the injured person.
18 Wong Moy (administratrix of the estate of Theng Chee Khim, deceased) v Soo Ah Choy (1996) 3 SLR(R) 27
19 see Wong Moy at (12), (14), (24) and (28)
20 Mustaq Ahmad (alias Mushtaq Ahmad s/o Mustafa) v Ayaz Ahmed (2024) 1 SLR 1016
21 In Sia Chin Sun v Yong Wah Poh (2019) 3 SLR 1168, where the claimant had applied to pursue the estate’s pecuniary claim, the learned Judge in the High Court had held that the Wong Moy exception only permitted a beneficiary to bring “proprietary claims to protect and preserve the assets of the estate”. In Mustaq Ahmad at (104), the Court was of the view that Sia Chin Sun v Yong Wah Poh does not stand for any legal proposition regarding limits to the types of claims that a beneficiary may bring on behalf of the estate.
22 It would also be pertinent to consider whether the circumstances made it impossible or seriously inconvenient for the representative to take proceedings.
23 Phoa Eugene (personal representative of the estate of Evelyn Phoa (alias Lauw Evelyn Siew Chiang), deceased and personal representative of the estate of William Phoa, deceased) v Oey Liang Ho (alias Henry Kasenda) (sole executor of the estate of Wirio Kasenda (alias Oey Giok Tjeng), deceased) (2024) 4 SLR 1108
24 rule 364 of the Family Justice Rules 2014 (FJR)
25 Lakshmi Prataprai Bhojwani (alias Mrs Lakshmi Jethanand Bhojwani) v MotiHarkishindas Bjohwani (2019) 3 SLR 356
26 Mustaq Ahmad @ Mushtaq Ahmad s/o Mustafa v Providentia Wealth Management Ltd (2023) SGHCF 52
27 GDR v GDL (2022) SGHC 30
28 Mustaq Ahmad @ Mushtaq Ahmad s/o Mustafa v Providentia Wealth Management Ltd (2023) SGHCF 53. This is related to but a different decision from Mustaq Ahmad @ Mushtaq Ahmad s/o Mustafa v Providentia Wealth Management Ltd (2023) SGHCF 52 referred to above.
29 Ong Wui Teck (personal representative of the estate of Chew Chen Chin, deceased) v Ong Wui Soon (2019) SGCA 61
30 British and Malayan Trustees Limited v Ameen Ali Salim Talib (2024) SGHC 203
31 This is an administration action which can be made under Order 80 rule 2(1) RoC or rule 786 FJR. The purpose of these administration actions is to provide guidance to personal representatives in the performance of their duties or protection to beneficiaries and creditors against the actions of personal representatives.
32 As stated in PT v Cooper (2001) WTLR 901 and accepted in Foo Jee Seng v Foo Jhee Tuang (2012) 1 SLR 211
33 Such as on the facts of Ameen.
34 An interesting illustration of this is the case of Grand View Private Trust Co Ltd v Wen-Young Wong (2022) UKPC 47, a Privy Council decision on appeal from the Court of Appeal for Bermuda.
35 HSBC Trustee (Singapore) Limited v Carolyn Fong Wai Lyn (2016) SGHC 31
36 VIK v VIL (2021) 3 SLR 857
37 HSBC Trustee (Singapore) Limited v .Carolyn Fong Wai Lyn (2016) SGHC 31
38 Chiang Shirley v Chiang Dong Pheng (2015) 3 SLR 770
39 Ong Wui Swoon v Ong Wui Teck (2015) SGDC 270
40 HSBC Trustee (Singapore) Limited v Carolyn Fong Wai Lyn (2016) SGHC 31
41 Query: whether it is even possible for a sole administrator/trustee to be discharged in view of section 40 Trustees Act 1967.
42 UVJ v UVH (2020) 2 SLR 336 (lower court’s decisions at (2020) 3 SLR 1329, and (2020) 3 SLR 1355)
43 Specifically, as stated in section 26(3A) of the Family Justice Act 2014, the jurisdiction of the Family Courts is set out in sections 17(1)(a), (d), (e) and (f) and 17A of the Supreme Court of Judicature Act 1969.
44 URF v URH (2020) 3 SLR 314
45 Tan Zhi Wei Alan v Tan Jia Lin Jaylin (2023) SGHC 271
46 UAM v UAN (2018) 4 SLR 1086
47 Chye Seng Kait v Chye Seng Fong (executor and trustee of the estate of Chye You, deceased) (2021) 2 SLR 1131
48 See for instance, Khoo Phaik Eng Katherine v Khoo Phaik Ean Patricia (2023) SGHC 314
49 VTL v VTM (2021) SGHCF 30
50 Re BKR (2015) 4 SLR 81
51 As the assessment as to whether a person has mental capacity is fact-driven, the Court is watchful as to the evidence before the Court. The Court placed little weight on video recordings which are edited or do not provide context (see WEW v WEX (2022) SGFC 60; (2022) SGHCF 32, but contrast with the weight placed on video recording in Goh Yng Yng Karen (executrix of the estate of Liew Khoon Fong (alias Liew Fong), deceased) v Goh Yong Chiang Kelvin (2021) 3 SLR 896), medical reports obtained from “doctor shopping” or where doctors are not properly briefed or even mis-represented to (see VKX v. VKW (2024) SLR(FC) 18).
52 ULP v ULS (2021) 5 SLR 1291
53 BUV v BUU (2020) 3 SLR 1041
54 See also WWI v WWJ (2004) SGFC 22
55 Goh Yng Yng Karen (executrix of the estate of Liew Khoon Fong (alias Liew Fong), deceased) v Goh Yong Chiang Kelvin (2021) 3 SLR 896
56 In ULP v ULS (2021) 5 SLR 1291, it was held that though P had the mental capacity to execute her Lasting Power of Attorney (LPA), she was under undue influence from her son. Her LPA was revoked.
57 VUW v VUT (2021) SGHCF 41
58 The learned Debbie Ong J held that it is not appropriate or practical as the opposing interests of the deputies where trust was lacking may negatively impact the welfare of P. Given P’s need for consistent and constant care, neither was it in P’s interest for P to be cared for in alternate weeks by each deputy.
59 BHR v BHS (2013) SGDC 149
60 Section 23(1)(k) MCA
61 in particular sections 6(8) and (9) MCA
62 TCZ v TDA, TDB and TDC (2015) SGFC 63
63 P’s previous Will is a relevant written statement, but the weight to be given to it will depend upon the circumstances under which it was prepared (for instance, whether P lacked capacity). The Court should not refrain from directing the execution of a statutory will where the validity of an earlier will is in dispute. The existence and nature of the dispute and the ability of court to investigate the issues which underlie it are relevant in deciding whether it is in P’s best interest to order the execution of a statutory Will.
64 Re TQR (2016) SGFC 98
65 These include whether P has enough assets for investment, the relationship between the deputy and P in particular, whether the deputy is a close relative or a future beneficiary of P, and the safeguards for bad investments.
66 WBK v WBL (2024) SLR(FC) 192
67 ULP and others v ULS (2018) SGFC 43
68 Applications may be made under section 20(2) MCA for the Court to authorise, on P’s behalf, the release of P’s medical record; under section 18(2)(a) MCA for the Court to direct the donee of an LPA not to object to the release of medical records; under rule 495 FJR to administer interrogatories to non-party; and/or to issue a subpoena for the production of the medical records.
69 Goh Tze Chien v Tan Teow Chee (2024) SGHC 1
70 WLR v WLT (2023) 5 SLR 1372
71 TWD v UQE (2019) 3 SLR 662
72 See for example, Kuek Siang Wei v Kuek Siew Chew (2015) 5 SLR 357, Mahidon Nichiar bte Mohd Ali v Dawood Sultan Kamaldin (2015) 5 SLR 62
73 Goh Yng Yng Karen (executrix of the estate of Liew Khoon Fong (alias Liew Fong), deceased) v Goh Yong Chiang Kelvin (2021) 3 SLR 896.

The post Development in the Law Relating to Estate and Mental Capacity Practices 2014 to 2024 appeared first on The Singapore Law Gazette.

Comparative Legal Practices in Artificial Intelligence and Data Protection

Singapore Vs. the European Union

The article examines Singapore’s innovation-driven AI and data protection frameworks, contrasting them with the EU’s rights-centric governance model exemplified by regulations like the Model AI Governance Framework and the proposed AI Act. It explores their historical, cultural, and socio-legal foundations while offering practical strategies for businesses to navigate these divergent systems. Companies that balance innovation with ethical responsibility can align their operations with evolving global standards while effectively addressing challenges posed by fragmented regulatory landscapes.

The rapid proliferation of Artificial Intelligence (AI) and the increasing importance of data protection have created a complex global regulatory landscape. With its unique approach to fostering innovation and economic growth through voluntary frameworks and self-regulation, Singapore and the European Union (EU), which prioritises safeguarding individual rights via robust, binding regulations that impose significant business obligations, represent two distinct paradigms in addressing these challenges. These contrasting approaches reflect more profound cultural and socio-legal philosophies.

Singapore actively creates a regulatory environment that attracts investment and fosters technological advancements by minimising compliance barriers. For example, the Personal Data Protection Act (PDPA) allows organisations to use “deemed consent” in specific situations, while the Model AI Governance Framework provides voluntary guidelines for developing artificial intelligence.

On the other hand, the EU’s General Data Protection Regulation (GDPR) and proposed AI Act embody a rights-centric ethos, ensuring transparency, accountability, and fairness through enforceable legal instruments.

Navigating such divergent frameworks requires nuanced strategies for businesses operating across these jurisdictions. This article profoundly explores these differences, highlighting their historical underpinnings and practical implications for companies. It also offers personal perspectives on how businesses can align their operations with evolving global standards while balancing innovation with ethical responsibility.

Globally, regulatory approaches to AI and data protection vary widely. The United States adopts a sectoral approach, relying on industry-specific regulations, while China emphasises state control and national security in its governance of AI and data privacy. These differences underscore the complexity of achieving global harmonisation in AI and data governance, making the comparison between Singapore and the EU particularly instructive.

1. Artificial Intelligence Regulation: A Comparative Perspective

1.1 Singapore’s Innovation-Driven Framework

Singapore has long aimed to position itself as a global nexus for advanced technologies by fostering public-private partnerships and promoting AI research through funding initiatives. Its regulatory stance aligns with this ambition by emphasising flexibility and industry-led best practices rather than prescriptive laws.

The Model AI Governance Framework is at the core of Singapore’s approach, which advocates transparency, accountability, and fairness in AI development without imposing binding obligations.1IMDA developed Singapore’s Model AI Governance Framework to guide ethical AI deployment through transparency, accountability, and fairness. Accessible at https://www.imda.gov.sg/ To assist organisations in managing risks, Singapore introduced AI Verify, a tool that enables companies to assess potential biases or vulnerabilities in their AI systems.2AI Verify is a self-assessment tool launched by Singapore to evaluate the trustworthiness of AI systems.

For example, a local healthcare start-up might use AI Verify to detect demographic biases in diagnostic algorithms before public deployment. However, such tools may not address high-risk scenarios uniformly across industries without enforceable mechanisms.

For example, autonomous vehicle malfunctions or algorithmic discrimination in hiring processes could remain inadequately regulated, leaving liability to civil litigation rather than statutory obligations.

The absence of enforceable mechanisms leaves liability primarily to civil litigation, which relies on corporate goodwill rather than statutory obligations. Singapore’s “light-touch” approach fosters rapid innovation by reducing business compliance burdens.

Start-ups in sectors like fintech or autonomous mobility benefit from fewer regulatory hurdles, allowing them to prototype and deploy solutions quickly.

However, companies targeting global markets must prepare to meet stricter international standards, particularly if they intend to operate within jurisdictions like the EU.

Consider the case of a Singaporean fintech company developing AI-driven credit scoring models. The company benefits from reduced compliance burdens under Singapore’s framework but faces significant challenges when expanding into jurisdictions like the EU, where stricter standards under the AI Act apply. This duality highlights the need for businesses to adopt scalable compliance strategies that accommodate varying regulatory landscapes, ensuring they are well-prepared for the challenges of operating in multiple jurisdictions.

While Singapore’s voluntary framework has successfully fostered innovation, growing international scrutiny of AI ethics may necessitate a shift toward hybrid models that combine flexibility with enforceable obligations for high-risk applications.

For instance, mandatory risk assessments for autonomous vehicles or facial recognition technologies could enhance public trust without stifling innovation. A Singaporean healthcare start-up using AI Verify to detect biases in diagnostic algorithms illustrates how voluntary tools can drive ethical AI practices, offering a hopeful vision for the future of AI innovation. However, without binding obligations, such measures may not be uniformly adopted across industries, potentially leaving gaps in accountability.

1.2 The EU’s Rights-Driven Approach

The EU’s proposed AI Act adopts a comprehensive risk-based classification system to mitigate potential harms associated with AI technologies.3The European Union’s Artificial Intelligence Act introduces a risk-based classification system for AI applications. High-risk applications — such as those used in law enforcement or employment — must meet stringent requirements for human oversight, transparency, and documentation.4Prohibited AI systems under the EU framework include applications like social scoring by governments. For instance, a European company developing AI-powered hiring tools must navigate extensive documentation and human oversight requirements under the AI Act. While these measures increase compliance costs, they also enhance consumer trust and attract privacy-conscious clients, demonstrating how robust regulations can serve as a competitive advantage.5High-risk AI systems require compliance with transparency obligations and mechanisms for human oversight.

Non-compliance can result in fines of up to 7% of global annual revenue.6Non-compliance with the EU’s Artificial Intelligence Act can result in penalties of up to €35 million or 7% of global annual turnover. This rigorous approach reflects Europe’s historical experiences with authoritarian regimes and its cultural emphasis on protecting individual rights. The EU views AI as a technological advancement deeply intertwined with social justice and ethical responsibility.

For businesses operating within the EU, compliance involves significant investments in algorithmic audits, impact assessments, and internal governance structures. While these measures increase operational complexity and costs, they also enhance consumer trust by demonstrating adherence to high ethical standards. This can be a significant competitive advantage in the global market, particularly for businesses that cater to privacy-conscious clients.

A European company developing AI-powered hiring tools might face extensive documentation and human oversight requirements under the AI Act. Despite these hurdles, achieving compliance could enhance its reputation among privacy-conscious clients and investors, demonstrating how robust regulations can serve as a competitive advantage in global markets. However, these regulations pose challenges, such as increased compliance costs and operational complexity. Understanding and navigating these implications is crucial for businesses operating within the EU, empowering them with the knowledge they need to succeed.

The EU’s rights-centric approach sets a global benchmark for ethical AI governance. This model may influence other regions to adopt similar frameworks, particularly as public demand for transparency and accountability grows. For instance, a European company developing AI-powered hiring tools must navigate extensive documentation and human oversight requirements under the AI Act. While these measures increase compliance costs, they also enhance consumer trust and attract privacy-conscious clients. The EU’s approach could shape the global AI market, influencing the development and deployment of AI technologies worldwide.

2. Data Protection Laws: Diverging Priorities

2.1 Singapore’s PDPA

The PDPA reflects Singapore’s pragmatic approach to balancing business efficiency with privacy protection.7Singapore’s Personal Data Protection Act (PDPA) emphasizes principles such as consent, purpose limitation, and data security while allowing deemed consent under specific conditions. It allows for “deemed consent” under certain conditions while requiring reasonable security measures for personal data processing. Unlike the GDPR, it does not mandate data erasure or portability rights. This flexibility benefits small businesses by reducing compliance costs but may create challenges for multinational firms managing cross-border data flows. For example, companies adopting GDPR-level protections globally might find Singapore’s framework less aligned with stricter jurisdictions like Europe. A multinational e-commerce platform operating in Singapore might implement GDPR-level protections globally to streamline operations across jurisdictions. While this approach ensures consistency, it also highlights how Singapore’s lighter framework can sometimes fall short of meeting global expectations for data protection.

While “deemed consent”’ provisions reduce compliance burdens for businesses, they may risk undermining consumer trust if individuals feel their privacy is insufficiently protected.

More straightforward guidelines on how companies should implement these provisions could help strike a better balance between efficiency and accountability. For example, a multinational e-commerce platform operating in Singapore might adopt GDPR-level protections globally to ensure consistency across jurisdictions. This approach highlights how Singapore’s lighter framework can sometimes fall short of meeting global expectations for data protection.

2.2 The EU’s GDPR

The GDPR is considered one of the world’s most stringent data protection frameworks. It establishes individual rights, including access to personal data, the right to erasure, and data portability.8The EU’s General Data Protection Regulation (GDPR) grants extensive individual rights over data processing activities. At the same time, it imposes strict obligations on businesses to justify every purpose for processing data.

One significant aspect of the GDPR is its extraterritorial effect, which means that even businesses outside the EU that handle the data of EU residents must comply with its rules. While this requirement can create considerable compliance challenges for smaller companies looking to enter European markets, it also enhances their reputation by demonstrating a commitment to responsible data governance practices.9GDPR non-compliance can lead to fines of up to €20 million or 4% of global annual turnover.

Consider a U.S.-based tech company expanding into Europe. Achieving GDPR compliance mitigates legal risks and enhances its reputation among European consumers, prioritising data privacy — and demonstrating how stringent regulations can drive competitive advantages in global markets. The GDPR’s extraterritorial reach ensures robust data protection globally but creates significant challenges for non-EU companies. This expansive scope underscores the EU’s commitment to setting global standards but raises questions about its long-term sustainability as data ecosystems grow increasingly complex.

3. Practical Implications of the Differences

3.1 Compliance Strategies and Operational Complexity

Operating across Singapore and the EU presents businesses with a fragmented compliance landscape due to the stark differences in their regulatory frameworks.

In Singapore, companies benefit from a more permissive environment that allows rapid prototyping and innovation without excessive oversight requirements. For instance, a start-up in Singapore can rely on voluntary AI frameworks like the Model AI Governance Framework and “deemed consent” standards under the PDPA, which reduce administrative burdens.

However, this flexibility can create challenges when scaling operations internationally, particularly in jurisdictions like the EU, where stricter regulations apply.

In the EU, businesses face significantly higher compliance requirements under the GDPR and the forthcoming AI Act. These mandates require companies to adopt strict lawful bases for data usage, conduct algorithmic risk assessments for high-risk AI solutions, and implement robust documentation processes.

This duality often translates into operational complexity for mid-sized businesses that lack the resources of significant tech players. To navigate these challenges effectively, companies must adopt strategic compliance measures that align with their long-term goals.

One practical approach is implementing “compliance by design” principles, which integrate privacy safeguards and ethical considerations into products and processes from inception. Businesses can streamline internal operations and avoid constant protocol adjustments when entering new markets. While this approach may involve higher upfront costs, it ultimately enhances consumer trust and regulatory approval in both jurisdictions.

A Singaporean AI start-up targeting European markets might design its systems to meet GDPR requirements from the outset. While this involves higher initial costs, it streamlines future expansion efforts and builds consumer trust by demonstrating adherence to global standards.

Adopting international standards harmonising compliance requirements across jurisdictions could reduce operational complexity while fostering stakeholder trust.

For example, a healthcare AI company developing diagnostic tools may need to conduct algorithmic audits to comply with GDPR standards while simultaneously addressing Singapore’s voluntary guidelines. This dual compliance strategy ensures smoother market entry but requires significant upfront investment in legal and technical expertise.

3.2 Liability and Risk Management

The differences in liability frameworks between Singapore and the EU further illustrate how divergent AI governance manifests in practice.

In Singapore, liability tends to hinge on contractual arrangements and civil litigation, with non-binding guidelines from the Model AI Governance Framework informing best practices.

For example, a company that voluntarily conducts risk assessments and addresses identified issues could argue that it exercised due diligence if an AI-related harm occurs.

However, without statutory liability mechanisms, the resolution of such disputes remains uncertain and largely dependent on judicial interpretation.

In contrast, the EU provides more straightforward statutory provisions for liability under its regulatory frameworks. High-risk AI systems must incorporate human oversight and extensive documentation protocols, making it easier to pinpoint accountability if something goes wrong.

This clarity benefits businesses by reducing uncertainty over potential legal disputes while protecting consumers’ fundamental rights. Although the EU’s approach increases compliance burdens for companies, it also establishes a more predictable legal environment that fosters stakeholder trust. Legal advisors often recommend that businesses in both jurisdictions draft robust contracts specifying oversight responsibilities to mitigate risks effectively.

By clearly defining accountability measures in contractual terms, companies can reduce the likelihood of disputes arising from ambiguous liability interpretations.

For instance, a company that voluntarily conducts risk assessments under Singapore’s Model AI Governance Framework might argue due diligence in court if AI-related harm occurs. However, without statutory liability mechanisms, outcomes remain uncertain and highly dependent on judicial interpretation.

3.3 Impact on Innovation and Investment

The longstanding debate over whether strict regulation stifles or fosters innovation is particularly relevant when comparing Singapore’s flexible regime with the EU’s stringent model.

On the one hand, Singapore’s permissive approach attracts start-ups looking to iterate quickly on novel AI products without being constrained by heavy compliance requirements. This is especially advantageous in sectors like fintech, healthcare diagnostics, and autonomous vehicles, where rapid adaptation is key to staying competitive.

However, as these start-ups scale beyond Singapore’s borders, they often face pressure to meet stricter international standards like those imposed by the GDPR or AI Act. This presents a significant paradox: Singapore’s environment effectively fosters early-stage innovation, yet its flexibility fails to prepare companies for successful global expansion adequately.

Conversely, the EU’s rigorous regulatory framework imposes higher upfront costs but builds consumer trust through robust protections against technology misuse. Businesses that comply with these standards enjoy global market reputational benefits and competitive advantages.

For example, achieving GDPR compliance signals a commitment to responsible data governance, which can attract privacy-conscious consumers and investors. A US-based tech firm expanding into Europe successfully leveraged its GDPR compliance to secure contracts with European healthcare providers. This demonstrates how stringent data protection frameworks can enhance reputational credibility and open doors to new markets.

Over time, market forces may drive a form of “de facto convergence,” where even regions with lighter regulations adopt elements of stricter regimes due to reputational pressures and consumer expectations.

Start-ups often struggle to navigate divergent regulatory frameworks due to limited resources, whereas established firms may leverage their scale to implement universal compliance strategies. This disparity highlights the need for tailored support mechanisms to help smaller players compete globally.

4. Analysis and Personal Views on Regulatory Divergence

From my perspective as an international lawyer specialising in cross-border regulatory compliance, each jurisdiction’s approach reflects its unique socio-economic priorities and cultural values. Singapore prioritises business feasibility and economic growth by fostering an environment conducive to innovation through minimal regulatory constraints. This strategy has proven effective for fintech and maritime technology, where agility is critical for maintaining competitiveness.

Conversely, the EU’s rights-centric model draws on historical experiences with authoritarian regimes and surveillance overreach to place individual rights at the forefront of its governance principles. Although some may perceive these regulatory structures as burdensome for businesses, they serve as vital safeguards against potential abuses of powerful technologies like AI. A gradual convergence between these frameworks is not just a possibility but an inevitability as public demand for accountability grows alongside technological advancements. This convergence will create a more balanced regulatory environment that respects individual rights and business innovation.

Singapore may eventually incorporate mandatory obligations for high-risk AI applications under international pressure or market demands for stricter oversight. Businesses should adopt ‘compliance by design’ principles. This approach involves integrating privacy safeguards and ethical considerations into their products from inception rather than as an afterthought. By doing so, businesses can ensure smoother navigation of cross-jurisdictional requirements and enhance consumer trust globally as they demonstrate a proactive commitment to ethical and legal compliance.

Similarly, the EU could refine its broad definitions or risk tiers to ensure proportionality in regulating lower-risk innovations without stifling creativity. As global standards evolve, we may see hybrid models emerge that combine Singapore’s flexibility with the EU’s accountability mechanisms. For example, mandatory risk assessments for high-risk technologies like autonomous vehicles could become standard practice worldwide.

International agreements like the EU-Singapore Digital Trade Agreement align certain principles between these jurisdictions. While such agreements are incremental steps toward harmonisation, they demonstrate a shared commitment to fostering responsible innovation while addressing ethical concerns. Singapore’s emphasis on economic growth reflects its pragmatic ethos, while the EU’s focus on individual rights draws from historical experiences with authoritarian regimes. Reconciling these cultural differences, with the help of international agreements, is essential for achieving meaningful regulatory convergence and ensuring a stable global regulatory landscape.

5. Cross-Jurisdictional Challenges and Digital Trade Agreements

Businesses encounter increased challenges in cross-border compliance when they face conflicting regulations between jurisdictions like Singapore and the EU. A company based in Singapore might initially rely on its flexible data protection laws but face new obligations for explicit consent and data subject rights when expanding into Europe. A global tech firm implementing GDPR-level protections across all operations demonstrates how adopting universal high standards can streamline compliance while enhancing customer trust worldwide.

This often necessitates operating dual infrastructures or implementing a universal high-standard policy across all regions. Adopting a global mindset is crucial for overcoming these challenges. Businesses should implement policies that align with the strictest applicable standards — such as GDPR-level protections — to safeguard against potential penalties while enhancing customer trust worldwide. The EU-Singapore Digital Trade Agreement exemplifies efforts to establish greater interoperability between regulatory frameworks by promoting transparency and fairness in data transfers while fostering collaboration in technology governance.10The EU-Singapore Digital Trade Agreement promotes interoperability between regulatory frameworks while protecting personal data during transfers.

However, its success depends on how well it translates into actionable guidance that reduces compliance burdens without compromising core principles.

6. Conclusion

Singapore and the European Union represent two distinct paradigms in regulating AI and data protection — one emphasising efficiency through flexibility and self-regulation, the other prioritising ethical responsibility through stringent oversight mechanisms rooted in fundamental rights protection. Integrating their strengths into cohesive internal policies is essential for businesses navigating these jurisdictions’ frameworks. This requires technical compliance and an appreciation of each jurisdiction’s underlying principles shaping its governance approach.

Regulatory convergence appears increasingly likely as global standards mature under mounting public scrutiny of AI technologies’ societal impacts. Singapore may adopt stricter obligations for high-risk applications under international pressure or market demands for greater accountability; meanwhile, the EU could refine its regulations to remain proportionate without hindering lower-risk innovations. Fostering ethical AI ecosystems requires collaboration among regulators, industry stakeholders, and legal professionals worldwide — a shared effort essential for ensuring technology serves humanity responsibly while enabling sustainable progress across borders. Businesses must adopt hybrid compliance models that effectively balance flexibility and enforceable obligations to navigate these evolving frameworks. Creating ethical AI ecosystems will demand proactive involvement in international regulatory dialogues to harmonise standards while considering regional priorities.

As global standards mature under mounting public scrutiny of AI technologies’ societal impacts, international collaboration among regulators, industry stakeholders, and legal professionals will foster ethical AI ecosystems that balance innovation with accountability.

Endnotes

Endnotes
1 IMDA developed Singapore’s Model AI Governance Framework to guide ethical AI deployment through transparency, accountability, and fairness. Accessible at https://www.imda.gov.sg/
2 AI Verify is a self-assessment tool launched by Singapore to evaluate the trustworthiness of AI systems.
3 The European Union’s Artificial Intelligence Act introduces a risk-based classification system for AI applications.
4 Prohibited AI systems under the EU framework include applications like social scoring by governments.
5 High-risk AI systems require compliance with transparency obligations and mechanisms for human oversight.
6 Non-compliance with the EU’s Artificial Intelligence Act can result in penalties of up to €35 million or 7% of global annual turnover.
7 Singapore’s Personal Data Protection Act (PDPA) emphasizes principles such as consent, purpose limitation, and data security while allowing deemed consent under specific conditions.
8 The EU’s General Data Protection Regulation (GDPR) grants extensive individual rights over data processing activities.
9 GDPR non-compliance can lead to fines of up to €20 million or 4% of global annual turnover.
10 The EU-Singapore Digital Trade Agreement promotes interoperability between regulatory frameworks while protecting personal data during transfers.

The post Comparative Legal Practices in Artificial Intelligence and Data Protection appeared first on The Singapore Law Gazette.