Primary Blocks

Confidentiality

This guide explains the different parts that make up the blocks dealing with confidentiality.

Intro

Confidentiality

If certain information relating to your business ends up in the wrong hands, it can be devasting for your business. Therefore, to protect against situations where someone discloses confidential information, a confidentiality block needs to be inserted in the Agreement.

FREE Quick reference guide

A quick reference guide on how to draft confidentiality provisions for tech contracts.

Parts

Confidential information

There are a couple of approaches when it comes to defining Confidential Information.

Blanket approach

You can consider stipulating that all information exchanged between the Parties relating to the Purpose must be regarded as Confidential Information. This approach is often called the “blanket approach” and offers a broad scope of protection. For instance, if two companies are collaborating on a new software project, all code, algorithms, designs, and even meeting notes related to the project could be considered confidential under this approach.

Specified information

Another approach may be a more detailed and specific approach where you stipulate the type of information that will be regarded as confidential information. For example:

  1. any information of the Disclosing Party relating to financial structure, accounting methods, cash flows, revenue forecast methodology, and market forecast methodology; such as profit margins, pricing strategies, or investor relations strategies.

  2. any information of the Disclosing Party relating to plans, designs, drawings, functional and technical requirements and specifications; like product roadmaps, system architecture diagrams, or hardware schematics.

  3. any information related to intellectual property, including patents, copyrights, trademarks, and trade secrets; for instance, patent applications, source code, or proprietary algorithms.

  4. any information regarding the Disclosing Party’s customers, suppliers, or partners, including contact details, contractual terms, and specific needs or preferences.

  5. any information related to the Disclosing Party’s employees, including their roles, responsibilities, performance data, and compensation.

  6. any information that the Disclosing Party expressly designates as confidential, either in writing or verbally, at the time of disclosure.

Using a more detailed and specific approach to defining Confidential Information can help ensure that both parties understand the scope of the confidentiality obligations and reduce the risk of misunderstandings. However, it requires a thorough understanding of the information being shared and may take longer to draft and negotiate. In some cases, a combination of both approaches can be used, providing a broad catch-all provision and then listing specific categories of information for added clarity.

Information disclosed before the Signature Date

Furthermore, remember to stipulate whether information disclosed before the Signature Date will or will not be regarded as Confidential Information.

Information of Affiliates 

When a Party operates as part of a group structure, indicate that the Disclosing Party’s Affiliates’ information must also be treated as Confidential Information.

Information of third-parties

Depending on the specific transaction, and for example, the use of sub-contractors, there may also be a need to provide that the information of certain third parties must also be treated as Confidential Information.

Purpose

The purpose of the disclosure plays an important role in confidentiality clauses, particularly in tech contracts where the nature of the disclosed information can have a significant impact on the parties involved.

Generally, the purpose of the disclosure is linked to the extent to which the Receiving Party can use the confidential information. So, for example, the Confidential Information can only be used to the extent that it is required by the Receiving Party to give effect to the concluded Agreement. If the Receiving Party uses the Confidential Information for any other purpose, the Receiving Party will be in breach of the confidentiality block.

In a software development agreement, for instance, if a software development company discloses proprietary code to a client for the purpose of customizing a software solution, the client should only use the code for that specific purpose. If the client uses the disclosed code to create a competing product, it would be a breach of the confidentiality clause.

Discloser friendly

If you are acting for a Party that will disclose most of the Confidential Information, make sure to use narrow and specific wording for the purpose. For example, in a software licensing agreement, the purpose of the disclosure might be “solely for the purpose of installing, configuring, and using the licensed software in accordance with the terms of this Agreement.” By using precise language, the Disclosing Party can better protect its Confidential Information and minimize the risk of unauthorized use.

Labeling

Receiver friendly

If you are mainly receiving Confidential Information, it will help if you require “labelling” of information. This will assist you in knowing which information must be handled with care. In tech contracts, labelling can be used for various types of information, such as design documents, source code, API keys, or access credentials. By clearly marking these materials as “Confidential,” the Receiving Party can more easily identify and manage sensitive information.

For example, a company providing IT consulting services may receive technical documentation and system access credentials from its client. By requiring that these materials be labelled as “Confidential,” the IT consulting company can ensure that its employees handle the information appropriately and maintain the client’s trust.

Discloser friendly

When you are the Party that will mainly be Disclosing Information, you would likely want to follow a different approach. For example, you can stipulate that any information that the Receiving Party should reasonably have understood (because of legends or other markings, the circumstances of disclosure, or the nature of the information) to be confidential will be regarded as Confidential Information.

This approach can help protect the Disclosing Party’s interests in situations where Confidential Information is inadvertently not labelled or where the nature of the information makes its confidentiality apparent. For instance, in a tech contract involving the development of a new AI algorithm, the Disclosing Party might share unlabelled proprietary information during a meeting or presentation. By including a provision that covers information that the Receiving Party should reasonably understand to be confidential, the Disclosing Party can still safeguard its valuable intellectual property.

In summary, when drafting confidentiality clauses in tech contracts, it is essential to consider the needs and interests of both the Disclosing and Receiving Parties. By requiring labelling for Confidential Information and including provisions that account for situations where labelling may not be present, parties can better protect sensitive information and maintain a successful business relationship.

Permitted receivers

A permitted receiver is usually a person who works for or assists the Receiving Party somehow. For example, the Receiving Party’s lawyers, accountants, subcontractors, or consultants. In tech contracts, it may be necessary for these individuals to access Confidential Information to perform their duties or provide advice effectively.

If you are acting for the Disclosing Party, you want to impose various obligations on the Receiving Party regarding permitted receivers to ensure the protection of your Confidential Information. For example, the Receiving Party must require the permitted receivers to sign confidentiality undertakings that are to the satisfaction of the Disclosing Party if the Receiving Party wants to make available the Confidential Information to a permitted receiver.

Obligations that can be imposed on the Receiving Party in tech contracts include:

  1. Prior written consent: The Receiving Party must obtain the Disclosing Party’s prior written consent before sharing Confidential Information with any permitted receiver.

  2. Confidentiality agreements: The Receiving Party must ensure that permitted receivers sign a confidentiality agreement or non-disclosure agreement (NDA) that is at least as protective as the confidentiality clause in the main contract.

  3. Need-to-know basis: The Receiving Party should only disclose Confidential Information to permitted receivers who have a legitimate need to access the information to perform their duties or provide services related to the contract.

  4. Responsibility for breaches: The Receiving Party should be responsible for any breaches of confidentiality by permitted receivers and should promptly notify the Disclosing Party of any such breach.

  5. Termination of access: The Receiving Party must terminate a permitted receiver’s access to Confidential Information if the relationship with the permitted receiver ends or if the permitted receiver breaches the confidentiality obligations.

By imposing these obligations on the Receiving Party with respect to permitted receivers, the Disclosing Party can better protect its Confidential Information and ensure that it is only shared with individuals who have a legitimate need to access it and are bound by appropriate confidentiality obligations.

Excluded information

The following are examples of information that is generally not regarded as Confidential Information-

  1. Pre-existing Knowledge Information known to the Receiving Party before disclosure by the Disclosing Party: For instance, if a software company receives technical information from a client that it already possessed or had previously developed, this information would not be considered Confidential Information under the contract.
  2. Publicly Available Information Information that is or becomes publicly known, not as a result of a breach of this Agreement, by the Receiving Party: If a trade secret, algorithm, or business strategy is published in a news article, blog post, or public patent filing, and the Receiving Party was not responsible for the disclosure, the information would no longer be considered confidential.
  3. Independently Developed Information Information developed independently by the Receiving Party in circumstances that are not a breach of this Agreement: For example, if a tech company independently creates an algorithm or software feature without using or referencing the Disclosing Party’s Confidential Information, the newly developed information would be excluded from the confidentiality obligations.
  4. Information from Unrestricted Third-Party Sources Information which Receiving Party receives from a third party who can disclose the Confidential Information free of restriction and without obligation: If the Receiving Party obtains information from a third party who has the right to share it without restrictions, such as from an open-source project or a non-confidential industry report, this information would not be considered Confidential Information under the contract.

These exclusions are essential to maintain a balance between protecting the Disclosing Party’s sensitive information and allowing the Receiving Party to operate freely without undue restrictions. In the context of tech contracts, it is crucial to carefully consider the scope of confidentiality obligations and the potential impact on both parties’ ability to conduct business effectively. Including reasonable exclusions in the confidentiality clause can help strike a balance that benefits both parties and promotes a successful partnership.

Obligations

If you are acting for the Party that will mainly be disclosing confidential information in a tech contract, you must be clear on how Confidential Information must be handled to protect your client’s interests.

As a start, you want to impose certain obligations on the Receiving Party, for example:

  1. Standard of Care The Receiving Party must protect the Confidential Information by using the same standard of care to safeguard their confidential information. This helps ensure that the Receiving Party takes the disclosure seriously and handles the information with due diligence.
  2. Prevent Unauthorized Disclosure A Receiving Party must take reasonable steps to prevent any unauthorized disclosure of the Confidential Information. This may include implementing security measures such as access controls, encryption, and employee training.

Additionally, consider what needs to happen if the Receiving Party becomes aware that there has been unauthorized access to the Confidential Information:

  1. Reporting and Mitigation Generally, you would want to impose an obligation on the Receiving Party to report the unauthorized access as soon as possible and to assist in mitigating any adverse effects of the unauthorized access. This could involve investigating the breach, notifying affected parties, and implementing measures to prevent future incidents.

On the flip side, if you act for the party that will mainly be Receiving Confidential Information in a tech contract, you want to limit express obligations that may open you up to liability claims. For example:

  1. Reasonable Efforts Ensure that the confidentiality obligations only require the Receiving Party to use reasonable efforts to protect the Confidential Information, as opposed to an absolute guarantee of security, which might be unattainable and expose the Receiving Party to undue risk.

By carefully crafting the confidentiality provisions in a tech contract, both parties can strike a balance between protecting the Disclosing Party’s sensitive information and limiting the Receiving Party’s potential liability.

Ownership

There may be situations in tech contracts where Confidential Information that is disclosed may be used by the Receiving Party in one of their processes, such as product development, software integration, or research and development.

No Transfer of Ownership

Make sure to expressly state that no ownership relating to the Confidential Information will transfer to the Receiving Party. This helps protect the Disclosing Party’s intellectual property rights and ensures that the Receiving Party does not claim ownership over the disclosed information.

For example, a software development company may share proprietary algorithms with a consultant to optimize its product performance. By including a provision that states no transfer of ownership, the company can protect its ownership rights to the algorithms.

Limited License to Use

If you are acting for the Party that will mainly be disclosing Confidential Information, and if the Receiving Party requires any rights to use the Confidential Information, stipulate that any rights granted in respect of the Confidential Information are only granted to the extent required to fulfill the Purpose expressly stated in the confidentiality clause.

For instance, a technology company may disclose certain source code to a contractor for the purpose of software customization. In this case, the Disclosing Party can grant the Receiving Party a limited license to use the source code solely for the specific customization project, preventing the Receiving Party from using the code for other purposes or projects.

Termination or Expiration of Rights

Additionally, it’s crucial to specify that any granted rights to use the Confidential Information will terminate or expire upon completion of the Purpose or the termination of the contractual relationship between the parties. This ensures that the Receiving Party cannot continue using the Confidential Information after the project or relationship has ended.

No warranties

A typical warranty you will see within a confidentiality clause in tech contracts is where the Disclosing Party warrants that they can disclose the Confidential Information. As a Receiving Party, you want this warranty. You do not want to get caught up in a situation where you receive confidential information from a Disclosing Party that they were not supposed to disclose.

Warranty of Authority to Disclose

For example, a technology company may share confidential customer data with a third-party vendor to provide customer support services. As the Receiving Party, the vendor would want a warranty from the technology company ensuring they have the legal authority to disclose such data, protecting the vendor from potential legal issues.

As a Disclosing Party, you want to disclaim all representations and warranties relating to the Confidential Information. In other words, you do not want to make any warranties in respect of the accuracy, completeness, and suitability of the Confidential Information as this may open you up to claims.

Disclaimer of Warranties for Confidential Information

For instance, a software provider may disclose proprietary information to a client for integration purposes. The software provider, as the Disclosing Party, may want to include a disclaimer stating that they make no representations or warranties regarding the accuracy or completeness of the disclosed information. This helps protect the software provider from potential claims if the client encounters issues or errors related to the proprietary information.

To balance the interests of both parties in a tech contract, the confidentiality clause should include a warranty from the Disclosing Party ensuring their authority to disclose the Confidential Information while also incorporating disclaimers to limit the Disclosing Party’s liability in terms of the accuracy, completeness, and suitability of the disclosed information. This approach helps protect both parties from potential risks and legal issues associated with the disclosure and use of Confidential Information.

Duration

Confidentiality clauses should survive termination of the Agreement in tech contracts to ensure the protection of sensitive information even after the contractual relationship ends. 

Survival of Confidentiality Obligations

For example, if a software development company and a client terminate their contract, it’s essential that the confidentiality obligations concerning the proprietary algorithms, source code, or business strategies continue to protect both parties from potential harm.

Duration of Confidentiality Obligations

Another aspect that needs to be addressed in your confidentiality clause is how long the confidentiality provisions will be binding on the Receiving Party.

One approach is to provide that the confidentiality provisions will remain binding as long as the Confidential Information is retained. Another approach may be to provide a fixed period for which the confidentiality provisions will apply after the termination of the Agreement.

A fixed-period approach may favour the Receiving Party. However, if you disclose any trade secrets, you should definitely look at providing that the confidentiality provisions will apply indefinitely, to the extent allowed by applicable law.

For instance, if a tech company discloses a trade secret related to a unique manufacturing process or a novel software algorithm to a partner, it is crucial that the confidentiality provisions protecting this information remain in force indefinitely, ensuring the trade secret remains protected.

In summary, when drafting a tech contract, it’s crucial to consider the survival and duration of confidentiality obligations to ensure that the Disclosing Party’s sensitive information remains protected even after the contract terminates. Balancing the interests of both parties in the duration of confidentiality provisions will help create a fair and effective agreement that promotes trust and collaboration.

Remedies

Sometimes, monetary compensation may not be sufficient to address the harm caused by a breach of confidentiality. In such cases, you may consider including a part which deals with injunctive relief which can be a powerful remedy that requires the breaching party to cease their wrongful actions immediately.

Important considerations

World Commerce and Contracting Principles

World Commerce and Contracting provides the following principles relating to warranties-

If parties intend to share Confidential Information in anticipation of, or during a business relationship, it should be subject to the protections of a separate non-disclosure agreement or of a confidentiality clause within the contract documenting the relationship (perhaps entered into subsequent to the NDA, in which case the NDA is normally superseded by the contract language).

In a typical business relationship, the determination of what information is deemed to be Confidential Information is an issue in the absence of clear markings, particularly when information is conveyed verbally or when the parties do not want impediments to the free flow of information between the parties. Accordingly, the most efficient and practical approach is to define Confidential Information as being all information-

  1. that is disclosed in any form by one party to the other or one party has gained from the other party as a result of the relationship,
    and
  2. that a reasonable person would Identify as being confidential to the discloser or that is marked as confidential.

Confidential Information should not include information that-

  1. has already been made public by the Discloser or a third-party;
  2. is independently developed by the Recipient without reliance on the Discloser’s Confidential Information;
  3. was obtained by the Recipient from a third-party without restriction; or
  4. the Discloser has expressly indicated as not confidential.

The Recipient must be given the right to hand over Confidential Information pursuant to a governmental or court order, provided that the Discloser is notified (if permitted) as soon as reasonably possible to take action to block the order or protect the information.

A Discloser’s Confidential Information should only be shared with the Recipient’s employees as required for the Purpose. In the event the parties contemplate that their respective affiliates or third parties (e.g., agents, consultants, subcontractors) will be involved in furtherance of the Purpose, Confidential Information should be shared with those entities only if-

  1. those entities use the Confidential Information to the same extent as the Recipient may under the agreement between the Discloser and the Recipient;

  2. the Recipient ensures that those entities will comply with confidentiality obligations comparable to the ones contained in the agreement between the Discloser and the Recipient and the Discloser has given any required consent.

In establishing disclosure rules applicable to third parties, the parties should also address any issues if the Recipient may be sharing Confidential Information with any competitors of the Discloser or if there are any anti-trust or collusion concerns.

The degree of care given by the Recipient for safeguarding a Discloser’s Confidential Information should be no less than that it gives to its own similar Confidential Information.

The Recipient should also promptly notify the Discloser about all unauthorized disclosures and take measures to mitigate the effects of such events.

Violating confidentiality obligations can cause irreparable harm that goes beyond mere direct monetary damages and may include both indirect and consequential damages, loss of revenues, profits, or the like.

The duration of the confidentiality obligations should be a function of the expected period over which the Confidential Information continues to be of value to the Discloser if kept non-public. Factors to be considered include the pace at which technology is changing, whether the information is a trade secret, whether the information is expected to become stale or will likely become public at some point, and standards for the particular market segment or geography.

Parties often do not maintain corporate memory of documents that need to be returned at the end of discussions or an engagement, so a more practical approach to returning Confidential Information to the Discloser is to have the Discloser ask for the return of the information if it is of sufficient importance to take that step.

The same principles relating to assignments of obligations to third parties that are typically applied in transactional agreements should also apply in NDAs.

Personal data often gets lumped together with Confidential Information but should typically be treated separately and with different standards of care given the laws and regulations that apply (See WorldCC Contracting Principle Data Security and Privacy).

Ownership of intellectual property rights in Confidential Information is not transferred as a result of mere disclosure and any license given to the Recipient to use the Confidential Information, including the intellectual property right therein, is limited to activities related to the Purpose.

Example clause

1.          CONFIDENTIAL INFORMATION

1.1           Definitions:

(a)         Affiliate , for the purposes of Article 1, means, with respect to a Party, any other person or entity which directly or indirectly Controls, is Controlled by, or is under common Control with such Party.

(b)         "Confidential Information means all information disclosed between the Parties disclosed in connection with the Purpose of Confidential Disclosure.

(c)          Control , for the purposes of Article 1, means the person or entity owns, directly or indirectly, more than 50 percent of the capital of the other entity, or in the absence of such ownership interest, substantially has the power to direct or cause the direction of the management and set the policies of such entity.

(d)         Disclosing Party means a Party that discloses Confidential Information under this Agreement.

(e)         Purpose only for the purposes of Article 1 means to give effect to the Agreement concluded between the Parties.

(f)           Receiving Party means a Party that receives or acquires Confidential Information directly or indirectly under this Agreement.

1.2          Affiliate confidential information: Confidential Information will include any Confidential Information of any Affiliate of the Receiving Party.

1.3          Third party confidential information: Confidential Information will include any Confidential Information of any third party.

1.4         Labelling: For Confidential Information to be considered confidential, the information must be marked as confidential or if disclosed orally, identified as confidential in writing within [].

1.5          Time of disclosure: The Confidential Information will include Confidential Information disclosed before and after the Signature Date.

1.6         Excluded information: The following information is not Confidential Information:

(a)         information known to the Receiving Party before disclosure by the Disclosing Party;

(b)         information that is or becomes publicly known, not as a result of a breach of this Agreement by the Receiving Party;

(c)          information developed independently by the Receiving Party in circumstances that are not a breach of this Agreement; and

(d)         information which Receiving Party receives from a third party who can disclose the Confidential Information free of restriction and without obligation.

1.7          Notification and disclosures required in terms of law: If the Receiving Party is required to disclose Confidential Information to satisfy a court order or to comply with any applicable law the Receiving Party will notify the Disclosing Party in writing before such disclosure to enable the Disclosing Party to protect their interest; and

1.8         Obligations and disclosures required in terms of law: If the Receiving Party is required to disclose Confidential Information to satisfy a court order or to comply with any applicable law the Receiving Party will only disclose the legally required portion of the information and use reasonable endeavours to protect the confidentiality of such information (the onus is on the Receiving Party to demonstrate that they have complied with this provision).

1.9         Handling of Confidential Information: A Receiving Party must not disclose the Confidential Information to any third party without first obtaining written consent from the Disclosing Party.

1.10       Standard of care: A Receiving Party must protect the Confidential Information of a Disclosing Party by using the same standard of care to safeguard their confidential information.

1.11         Steps required to protect Confidential Information: A Receiving Party must take reasonable steps to prevent any unauthorised disclosure of the Confidential Information.

1.12        Unauthorised access: A Receiving Party will immediately notify the Disclosing Party if the Receiving Party becomes aware of any loss or any unauthorised access to, or use or disclosure of, any Confidential Information in the control of the Receiving Party or their authorised recipient.

1.13        Cooperation: The Receiving Party must cooperate with the Disclosing Party to investigate and mitigate any adverse effects of unauthorised access to, or use or disclosure of, any Confidential Information.

1.14       Rights of the Disclosing Party: A Disclosing Party can at any time require:

(a)         the Receiving Party to return any Confidential Information;

(b)         the Receiving Party to expunge any Confidential Information from any device;

(c)          the Receiving Party to destroy any material relating to the Confidential Information;

(d)         the Receiving Party to cause the return or destruction of any Confidential Information which the Receiving Party disclosed to any third party; or

(e)         a written statement under oath that the Receiving Party has not retained any such Confidential Information and that no third party has retained any such Confidential Information.

1.15        Authorised Recipients: A Receiving Party can disclose the Confidential Information to their representatives, employees, consultants, or professional advisors, if necessary and to the extent required to fulfil the Purpose.

1.16       Confidentiality undertakings: If a Receiving Party intends to disclose the Confidential Information to their representatives or employees, such representatives or employees must sign a confidentiality undertaking that is to the satisfaction of the Disclosing Party.

1.17        Acknowledgment: A Receiving Party acknowledges that unauthorised or unlawful use or disclosure of the Confidential Information can cause irreparable damage to the Disclosing Party.

1.18       Indemnity: The Receiving Party indemnifies the Disclosing Party against any, and all loss suffered where the Receiving Party, or their representative or employee, discloses or uses the Confidential Information unlawfully or without the Disclosing Party s consent.

1.19       Injunctive relief: The Receiving Party acknowledges that monetary damages may not be a sufficient remedy for unauthorised or unlawful use or disclosure of the Confidential Information and a Disclosing Party can ask a court for injunctive relief without waiving any other rights or remedies.

1.20      No limitation: Notwithstanding anything agreed to between the Parties, a claim for breach of the confidentiality provisions , or a claim under 1.18, will not be limited or excluded under any limitation of liability or exclusion of liability provision.

1.21        Ownership and rights: The Disclosing Party will remain the owner of all rights relating to the Confidential Information. Where rights must be granted in respect of the Confidential Information, such rights are only granted to the extent required to fulfil the Purpose.

1.22      Termination and survival: The confidentiality provisions in this Agreement will survive the termination of this Agreement.

1.23       Period: The confidentiality provisions in this Agreement will bind the Receiving Party for an indefinite period.

1.24      Warranties: The Disclosing Party warrants that they have the right to disclose the Confidential Information to the Receiving Party.

1.25       No further warranties: The Disclosing Party makes no other express, implied, or statutory warranties in respect of the Confidential Information.

1.26      Disclaimer: The Disclosing Party disclaims all other representations, warranties, or assurances for the Confidential Information, including for accuracy, performance, completeness, suitability, or third-party rights.

 

Ninja holding a laptop explaining tech contracts

Interested in our Contract Builder?

Table of Contents

Master contracts now
Elevate your career!

Try for free. No credit card required.

Elevate your legal game with ContractNinja.

Form part of the spearhead movement of shaping the global standard for tech contracts.