ReviewMyContract.aiReview My Contract
Deep Dive Guide

Confidentiality Clauses in Contracts: What They Mean, Red Flags & How to Negotiate

Confidentiality clauses appear in nearly every commercial contract — but their scope, duration, and mutual vs. one-way structure vary enormously. Signing without understanding what you have agreed to can restrict your professional freedom for years.

Updated March 20, 202645 min read
16 sections5 landmark cases15 states compared14 FAQ answersDTSA & Dodd-Frank

General information only · Not legal advice · Results in ~2 minutes

Not legal advice. This guide provides general educational information about confidentiality clauses and is not a substitute for legal advice tailored to your specific situation, jurisdiction, or contract. Always consult a licensed attorney before signing, drafting, or relying on any contract provision.

Confidentiality clauses are embedded in almost every commercial contract — services agreements, consulting engagements, employment offers, vendor contracts, partnership agreements, and software licenses. Yet most people sign them without closely reading what they actually restrict: not just what they cannot tell others, but what they cannot do with information they receive; how long they are bound; whether their own information is protected; and what consequences follow from a breach.

This guide covers 16 topic areas across the full confidentiality landscape — from the statutory foundation of the Defend Trade Secrets Act (18 U.S.C. § 1836) and Dodd-Frank whistleblower protections, to the trade secret vs. confidential information distinction, landmark cases including PepsiCo v. Redmond and Silvaco v. Intel, a 15-state enforcement comparison, a 12-issue negotiation priority matrix, and 7 common compliance mistakes. Each section includes actual contract language, practical analysis, and specific action steps.

The FAQ section at the bottom answers 14 detailed questions about confidentiality clauses — including DTSA immunity requirements, SEC whistleblower protections, the inevitable disclosure doctrine, and what actually happens when a breach occurs.

Biggest Red Flag

Perpetual one-way confidentiality that restricts your professional knowledge and skills — a de facto non-compete in confidentiality language.

Best Outcome

Mutual confidentiality with a 3-5 year term, four standard exclusions, a residuals clause, DTSA immunity notice, and a whistleblower carve-out.

Top Priority

Mutual structure first — if you are sharing valuable information, your confidentiality must be protected by the same clause that protects theirs.

01

What a Confidentiality Clause Is — and How It Differs from an NDA

High

Common contract language

"Each party agrees to keep confidential all Confidential Information received from the other party and to use such Confidential Information solely for the purposes of performing its obligations under this Agreement. Neither party shall disclose Confidential Information to any third party without the prior written consent of the disclosing party."

A confidentiality clause is a provision embedded within a broader contract — a service agreement, consulting contract, employment agreement, vendor contract, or software license — that restricts one or both parties from disclosing certain information. It is not a standalone document; it is one section of a larger agreement that also covers deliverables, payment, intellectual property, indemnification, and other commercial terms.

A standalone Non-Disclosure Agreement (NDA) is a contract whose sole purpose is confidentiality. When parties sign a standalone NDA before sharing sensitive information — during due diligence, in pre-contract negotiations, before a business partnership — confidentiality is the entire bargain. NDAs are often signed before any other contractual relationship exists.

The practical difference matters because the confidentiality clause and the NDA govern different phases and different risks. A standalone NDA covers what is shared in exploratory conversations before a deal is struck. The confidentiality clause in your services contract covers what is shared during performance — client data, trade secrets, business processes, financial information, and proprietary systems you encounter while doing the work.

When a broader contract contains a confidentiality clause, that clause typically supersedes any prior standalone NDA between the same parties for information shared after the contract date. If you signed an NDA during sales discussions and then a services agreement with its own confidentiality clause, the services agreement's clause governs going forward — and it may be narrower or broader than the original NDA. This substitution often goes unnoticed.

Federal Statutory Foundation: Beyond contractual confidentiality, the Defend Trade Secrets Act (DTSA), 18 U.S.C. § 1836, creates a federal civil cause of action for trade secret misappropriation and is available regardless of whether a contract exists. State law equivalents — adopted in 48 states under the Uniform Trade Secrets Act (UTSA) framework — provide parallel protection. New York and North Carolina retain common-law misappropriation frameworks rather than UTSA. A confidentiality clause is one layer; the statutory floor exists beneath it.

The clause above is a standard mutual confidentiality provision — both parties have obligations to the other. It does three things: (1) it defines a duty to keep the other party's confidential information secret; (2) it restricts the use of that information to the contractual purpose (the "use restriction"); and (3) it prohibits disclosure to third parties without consent. Understanding each of these three obligations separately is the starting point for any confidentiality clause review.

What to do

When you encounter a confidentiality clause in a services or vendor contract, read it alongside any standalone NDA already in place between the parties. Check whether the new contract supersedes the old NDA — most integration clauses will make it control. Also identify whether the clause is mutual (both parties have obligations) or one-way (only you have obligations). One-way confidentiality provisions in favor of the other party are common in standard-form client contracts and should be flagged for review.

02

Defining Confidential Information: What the Clause Actually Covers

High

Common contract language

"'Confidential Information' means any and all information disclosed by one party to the other, whether orally, in writing, electronically, or by any other means, that is designated as confidential or that reasonably should be understood to be confidential given the nature of the information and the circumstances of disclosure, including without limitation business plans, financial data, customer lists, pricing information, technical specifications, source code, proprietary processes, and trade secrets."

The definition of "Confidential Information" is the most consequential provision in any confidentiality clause. It determines the scope of everything that follows — your duty to maintain secrecy, your use restrictions, your disclosure prohibitions, and your return or destruction obligations. A broad definition creates sweeping obligations; a narrow definition may fail to protect what actually matters.

Marked or Designated Confidential: Some definitions require confidential information to be explicitly marked — stamped "CONFIDENTIAL" on documents, verbally designated at the time of oral disclosure and confirmed in writing within a specified period. This approach benefits the disclosing party by creating clarity but is often impractical for fast-moving business relationships where not every sensitive conversation is formally marked. If you are the party receiving confidential information, a marking requirement limits your obligations and is generally preferable.

Reasonableness Standard: The clause above includes a "reasonably should be understood to be confidential" standard — this is far broader than a marking requirement and creates obligations for any information that a reasonable person would recognize as sensitive. Business strategy discussions, pricing conversations, client lists — even if never labeled confidential — are covered under this standard. Courts have consistently enforced this type of expansive definition against the receiving party.

Catch-All Language: Phrases like "including without limitation" or "including but not limited to" followed by an illustrative list signal that the definition is not exhaustive — the listed categories are examples, not boundaries. Any commercially sensitive information that falls within the general definition, even if not specifically listed, is covered.

Trade Secrets vs. Confidential Information: A critical distinction that the definition often blurs: not everything labeled "Confidential Information" qualifies as a trade secret under the DTSA (18 U.S.C. § 1839(3)) or state UTSA. To qualify as a trade secret, information must (1) derive independent economic value from not being generally known or reasonably ascertainable, and (2) be subject to reasonable measures to maintain secrecy. The contractual label is irrelevant to statutory trade secret status. Customer lists and pricing information — the bread-and-butter of many confidentiality clauses — may or may not qualify depending on how they were developed and how secrecy is maintained. See Section 08 for the full trade secret analysis.

Oral Disclosures: A definition that covers oral disclosures creates practical challenges for the receiving party — every conversation could potentially be subject to confidentiality obligations, and there is no written record of what was shared. If you are the receiving party, try to limit oral disclosures to those that are confirmed in writing within a short period (15-30 days) to be designated as confidential.

What to do

As the receiving party, push for a definition that requires either written marking or verbal designation followed by written confirmation within 30 days. As the disclosing party, ensure the definition includes the reasonableness standard to capture sensitive information shared informally. In both cases, verify that the categories listed reflect the actual information that will be shared under the contract — over-inclusive definitions create unnecessary compliance obligations; under-inclusive definitions leave your most valuable information unprotected.

03

Standard Exclusions: What Is Not Confidential

High

Common contract language

"Confidential Information shall not include information that: (a) is or becomes generally available to the public through no act or omission of the receiving party; (b) was in the receiving party's possession before disclosure by the disclosing party, as demonstrated by written records predating the disclosure; (c) is rightfully received from a third party without restriction; or (d) is independently developed by the receiving party without reference to or use of the disclosing party's Confidential Information."

Standard exclusions carve out categories of information from confidentiality protection. These exclusions exist because applying confidentiality obligations to publicly available, independently developed, or previously known information would be commercially unreasonable and legally unenforceable in most jurisdictions. The four exclusions in the clause above are the industry-standard set, and their absence from a confidentiality clause is a red flag.

Public Domain / Publicly Available: Information that is genuinely available to the general public — published in industry publications, announced in press releases, filed in public records, or otherwise accessible without breach of confidentiality — cannot be protected by contract. The critical qualifier is "through no act or omission of the receiving party." If the receiving party is the one who disclosed the information publicly (in breach of the clause), the public domain exclusion does not protect them from liability for the original unauthorized disclosure.

Prior Possession: If the receiving party already had the information before it was disclosed by the disclosing party, there is no new confidential disclosure to protect. Courts require written proof of prior possession — internal records, documents with timestamps, prior disclosures — rather than mere assertion. The "demonstrated by written records" qualifier is standard and appropriate; verbal claims of prior knowledge are insufficient.

Rightful Third-Party Receipt: If a third party lawfully and without restriction shares information that happens to overlap with what you received under the contract, you are free to use that third-party information without triggering your confidentiality obligations. The "without restriction" qualifier is essential — if the third party itself received the information under a confidentiality agreement, the exclusion does not apply.

Independent Development: You may independently develop the same ideas, processes, or solutions without violating confidentiality, provided you can demonstrate that the development occurred without reference to the disclosing party's information. This is the most litigated of the four exclusions. In Silvaco Data Systems v. Intel Corp., 184 Cal. App. 4th 210 (Cal. Ct. App. 2010), the court examined whether a recipient's development activities were genuinely independent, emphasizing the need for contemporaneous records segregating the development effort from confidential disclosures. Maintaining separate development logs, records, and personnel segregation is essential to preserve this defense.

A Fifth Exclusion to Consider: Required legal disclosure — if you are compelled by law, court order, or regulatory subpoena to disclose confidential information, you should not be in breach of the confidentiality clause. This exclusion is addressed separately in Section 07 on carve-outs, but its absence from the exclusion list itself is worth noting. Courts generally imply this exclusion, but having it written in avoids disputes.

What to do

Verify that all four standard exclusions are present. If any are missing, add them before signing. Pay particular attention to the independent development exclusion — knowledge workers (developers, consultants, designers) frequently develop similar solutions for multiple clients, and without this exclusion, anything similar to a client's confidential information could be claimed as a misappropriation. Also check whether the exclusions require written proof or merely allow verbal assertion — written documentation requirements are reasonable and provide both parties with evidentiary certainty.

04

Mutual vs. One-Way Confidentiality Obligations

High

Common contract language

"Receiving Party agrees to hold in strict confidence all Confidential Information of Disclosing Party and shall not, without the prior written consent of Disclosing Party, disclose any Confidential Information to any third party or use any Confidential Information for any purpose other than the evaluation and performance of the Agreement."

One of the most significant structural questions in any confidentiality clause is directionality: does only one party have obligations, or do both? The clause above is drafted in one-directional terms — "Receiving Party" and "Disclosing Party" as defined roles, with only the Receiving Party bearing obligations. This structure is appropriate in some contexts and problematic in others.

When One-Way Confidentiality Is Appropriate: One-way confidentiality makes sense when information flows predominantly in one direction. If you are a service provider who will be given access to a client's customer database, internal systems, and business plans to complete a project, but you will not be sharing anything confidential from your own business, one-way confidentiality in the client's favor is commercially reasonable. Similarly, employment agreements appropriately impose one-way confidentiality on the employee, since the employer is sharing its business information.

When One-Way Confidentiality Disadvantages You: If you are sharing your own proprietary methodologies, pricing structures, proposal documents, or trade secrets with the other party — which is common in consulting, software development, and professional services — and the confidentiality clause only protects the client's information, your confidential information is unprotected. A client can use your pricing intelligence to pit competitors against each other, share your proprietary methodologies with internal teams, or repurpose your proposals without contractual restriction.

The Mutual Structure: The clause in Section 01 is the mutual version — "each party agrees to keep confidential all Confidential Information received from the other party." This is the standard approach for balanced commercial relationships between parties that will share information in both directions. Enterprise-to-vendor contracts frequently begin as one-way clauses protecting only the enterprise, then are amended to mutual upon negotiation.

Detecting One-Way Clauses: One-way confidentiality is often apparent from the structure of defined terms. If the agreement defines specific "Disclosing Party" and "Receiving Party" roles with fixed assignments (rather than the reciprocal "each party / other party" language), it is likely one-directional. Read the defined terms section carefully before analyzing the substantive obligations.

The Practical Stakes: A technology consultant who shares proprietary development methodologies, pricing models, and tool configurations with a client under a one-way confidentiality clause — protecting only the client — has no recourse if the client shares those methodologies with competitors, uses them internally without compensation, or reverse-engineers the consultant's pricing to negotiate lower rates. The one-way clause silently strips the consultant of IP protection they assumed they had.

What to do

If you are sharing anything of confidential value with the other party — methodologies, pricing, proposals, tool configurations, business strategies — insist on mutual confidentiality. The simplest approach is to replace 'Disclosing Party' and 'Receiving Party' role definitions with reciprocal language: 'each party agrees to keep confidential all Confidential Information received from the other party.' If the other side refuses mutual confidentiality, ask why. A refusal often signals an intent to use your information for purposes beyond the stated contractual purpose.

Have a contract with a confidentiality clause to review?

Get an instant AI-powered analysis that flags overbroad definitions, one-way obligations, missing exclusions, perpetual duration, missing DTSA notices, and knowledge restrictions — with plain-English guidance on what to negotiate. Just $4.99.

Check My Contract Free →
05

Duration and Survival: How Long Confidentiality Obligations Last

High

Common contract language

"The confidentiality obligations set forth in this Section shall survive the termination or expiration of this Agreement and shall remain in effect for a period of five (5) years following such termination or expiration. Notwithstanding the foregoing, confidentiality obligations with respect to trade secrets shall survive indefinitely."

Duration is one of the most actively negotiated confidentiality terms — and the one where the discrepancy between what both parties want is often largest. The disclosing party wants long-lived or perpetual protection; the receiving party wants a finite, predictable end date for their obligations.

Finite vs. Perpetual Duration: A time-limited confidentiality obligation (e.g., 3-5 years after termination) is commercially standard in most services and consulting relationships. A perpetual confidentiality obligation — one that never expires — is aggressive and difficult to manage over a business lifetime. The receiving party has no way to know with certainty whether information that is 10 years old has entered the public domain without ongoing monitoring.

The Trade Secret Carve-Out: The clause above uses a structure common in technology and professional services contracts: a fixed term (5 years) for general confidential information, with perpetual protection for trade secrets. This bifurcation is legally sound — the Defend Trade Secrets Act (18 U.S.C. § 1836) and state UTSA adoptions protect trade secrets independently of contract duration, so a perpetual contractual obligation for trade secrets aligns with the legal reality. The practical challenge is that "trade secrets" are not always precisely defined — parties frequently dispute whether specific information qualifies.

Industry Norms by Sector: Duration norms vary significantly by industry. Technology and software agreements often specify 3-5 years for general confidential information. Employment agreements frequently run perpetually for trade secrets and 2-3 years for other confidential information. M&A and financial due diligence NDAs often run 2-3 years. Healthcare and pharmaceutical agreements dealing with drug development information may run perpetually given the long product development timelines. Consulting agreements commonly use 3 years.

Why Duration Matters for Recipients: As time passes, information loses its confidential character — markets shift, technologies change, personnel turn over. A confidentiality obligation that runs perpetually for all information, without a trade secret carve-out, means you can never freely discuss the substance of a project without potentially breaching a contract from a decade ago. This creates real compliance risk for knowledge workers who move between clients, employers, and projects.

The Survival Clause Interaction: Confidentiality obligations typically appear in the contract's survival clause, which lists provisions that remain enforceable after the agreement ends. If confidentiality is not listed in the survival clause, a party can argue that confidentiality obligations terminated with the contract. Always verify that confidentiality appears in the survival clause, and verify that the duration specified in the confidentiality clause is consistent with the survival clause's language. Conflicts between these provisions create ambiguity that courts will have to resolve.

What to do

As the receiving party, push for a finite confidentiality duration — 3-5 years post-termination for general confidential information — with a carve-out for trade secrets that aligns with the DTSA/UTSA statutory protections. Avoid perpetual obligations for all confidential information; they are overbroad and practically unmanageable. As the disclosing party, ensure your most sensitive business information is characterized as trade secrets (meeting the DTSA/UTSA requirements of independent economic value and reasonable secrecy measures) to preserve indefinite protection for information that genuinely warrants it.

06

Permitted Disclosures: Who Can Receive Confidential Information Internally

Medium

Common contract language

"Receiving Party may disclose Confidential Information only to those of its employees, contractors, and professional advisors who have a need to know such Confidential Information in connection with the performance of this Agreement, provided that such persons are bound by confidentiality obligations no less restrictive than those set forth in this Agreement."

An absolute prohibition on disclosing confidential information to any third party would make most contracts commercially impracticable — no one can perform complex work without involving their own team, subcontractors, legal counsel, or accountants. Permitted disclosure provisions define who, within the receiving party's organization and professional network, may legitimately receive confidential information.

The Need-to-Know Standard: The "need to know" requirement is the universal limiting principle in permitted disclosure provisions. It prevents the receiving party from sharing confidential information throughout their organization for general business purposes — only those whose work for the specific contract requires access are permitted recipients. This standard is commercially reasonable and industry-standard.

Employees and Internal Personnel: The straightforward core of permitted disclosures — your own employees who are working on the contract. The need-to-know standard prevents sharing with departments unrelated to the contract: sharing a client's financial data with your sales team to inform pricing strategy would likely exceed the need-to-know threshold.

Independent Contractors and Subcontractors: Most modern businesses use contractors extensively, and the confidentiality clause must account for this. The provision above covers "contractors" alongside employees. The key protections: (1) the contractors must have a need to know for contract performance purposes; and (2) they must be bound by confidentiality obligations at least as restrictive as those in the main agreement — which requires the receiving party to obtain a written confidentiality agreement with each contractor before disclosure.

Professional Advisors: Legal counsel, accountants, and similar professional advisors have independent professional duties of confidentiality that exist outside the contract. The permitted disclosure provision typically covers professional advisors without requiring a separate written agreement, relying instead on their professional obligations.

Flow-Down Requirements: The requirement that permitted recipients be "bound by confidentiality obligations no less restrictive than those set forth in this Agreement" is the flow-down requirement. It prevents the receiving party from creating a confidentiality arbitrage — sharing information with a third party who has weaker obligations, effectively laundering the confidential information into less-protected hands. The receiving party must ensure its contractors are actually bound to these obligations in writing before disclosure.

Parent, Subsidiary, and Affiliate Access: Larger organizations often need confidential information to flow to affiliated entities — a parent company providing compliance oversight, a subsidiary doing implementation work. If affiliates are not covered by the permitted disclosure provision, disclosing to them is technically a breach. Enterprise clients frequently negotiate to include "affiliates" in the permitted recipient list; smaller companies signing agreements with large enterprises should read this carefully to understand who they are actually sharing information with.

What to do

Verify that the permitted disclosure provision covers the types of people you actually need to share information with: employees, contractors, and professional advisors. If you use subcontractors to perform work, ensure the clause allows disclosure to them with the flow-down requirement. If you are the disclosing party, verify that the flow-down requirement is present — without it, the receiving party can share your information with contractors who have no obligation to protect it. Track which contractors have signed confidentiality agreements covering your client's information; this is the most frequently dropped ball in contractor-heavy service businesses.

07

Required Carve-Outs: Legal Process, Regulatory Compliance, and Whistleblower Protections

Medium

Common contract language

"Notwithstanding the foregoing, Receiving Party may disclose Confidential Information to the extent required by applicable law, regulation, or court order, provided that Receiving Party: (i) provides Disclosing Party with prompt written notice of such requirement, to the extent legally permitted, sufficient to allow Disclosing Party to seek a protective order; (ii) cooperates with Disclosing Party in seeking such protective order; and (iii) discloses only that portion of Confidential Information that is legally required to be disclosed."

Even the most comprehensive confidentiality obligation cannot prevent legally compelled disclosure — courts, regulatory agencies, and law enforcement can compel production of information regardless of what contracts say. The legal process carve-out is the mechanism that addresses this reality without putting the receiving party in the impossible position of choosing between contract compliance and legal compliance.

The Three-Step Process: The clause above establishes the industry-standard three-step approach for legally compelled disclosures: (1) prompt notice to the disclosing party before disclosure occurs, so they can attempt to obtain a protective order from the court or agency; (2) cooperation with the disclosing party's efforts to prevent or limit disclosure; and (3) disclosure limited to the minimum legally required. Each element matters.

DTSA Immunity Provision — 18 U.S.C. § 1833(b): The Defend Trade Secrets Act contains a critically important immunity provision that is often omitted from confidentiality clauses: under 18 U.S.C. § 1833(b), any individual who discloses a trade secret to a government official or attorney for the purpose of reporting a suspected legal violation, or who files a sealed lawsuit that includes trade secret information, is immune from civil and criminal liability under both federal and state trade secret law. The DTSA actually requires employers to include notice of this immunity in any confidentiality agreement they enter with employees and contractors. Failure to include this notice bars the employer from recovering exemplary damages or attorney fees in a subsequent DTSA action. This provision must be included in employment and contractor confidentiality agreements.

SEC Whistleblower Protections — Dodd-Frank Act: Section 21F of the Securities Exchange Act (as amended by Dodd-Frank, 15 U.S.C. § 78u-6) protects individuals who report potential securities law violations to the SEC from retaliation. SEC Rule 21F-17 makes it unlawful for any person to take any action to impede a potential whistleblower from reporting possible securities law violations to the SEC — including through confidentiality agreements. Confidentiality clauses that purport to prevent disclosure of securities violations to the SEC, or that require pre-approval before reporting to regulators, are unenforceable and independently illegal. The SEC has brought enforcement actions against companies for using overbroad confidentiality clauses that chilled employee SEC reporting. Any confidentiality clause in a securities industry or public company context must explicitly preserve SEC reporting rights.

NLRA Section 7 Considerations: The National Labor Relations Act, Section 7, protects employees' rights to discuss wages and working conditions. Confidentiality clauses in employment agreements that purport to bar discussion of compensation or working conditions with coworkers may violate the NLRA even if the parties have contractually agreed to them.

Regulatory Disclosure: For regulated industries — financial services, healthcare, government contracting — regulatory disclosure obligations extend beyond court orders. A securities firm receiving a confidential business plan must share it with regulators investigating potential fraud, regardless of a confidentiality agreement. Healthcare organizations face mandatory reporting requirements under HIPAA, state health laws, and public health statutes that can compel disclosure of otherwise confidential health information.

What to do

Verify that the legal process carve-out includes all three elements: notice (to the extent legally permitted), cooperation with efforts to limit disclosure, and minimum necessary disclosure. For employment and contractor agreements, include the DTSA § 1833(b) immunity notice — its absence can cost you exemplary damages and attorney fees in a DTSA case. For any public company or securities industry context, explicitly preserve SEC whistleblower reporting rights per Dodd-Frank. For regulated businesses, add explicit carve-outs for applicable regulatory bodies and self-regulatory organizations.

08

Trade Secrets vs. Confidential Information: What Qualifies and Why It Matters

High

Common contract language

"'Trade Secret' means information, including a formula, pattern, compilation, program, device, method, technique, or process, that derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use, and is the subject of efforts that are reasonable under the circumstances to maintain its secrecy."

The contract can call anything "Confidential Information," but only qualifying information receives the heightened statutory protection of trade secret law — available independently of any contract, with its own remedies, its own statute of limitations, and its own enforcement mechanisms at both federal and state levels.

The DTSA Standard — 18 U.S.C. § 1839(3): Under the Defend Trade Secrets Act, a trade secret is defined as information that: (1) the owner has taken reasonable measures to keep secret; and (2) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, another person who can obtain economic value from its disclosure or use. The definition is intentionally broad — covering formulas, patterns, compilations, programs, devices, methods, techniques, processes, financial, business, scientific, technical, economic, or engineering information.

The Reasonable Measures Requirement: Trade secret protection hinges on the owner actively protecting the information. Courts have denied trade secret status where companies failed to implement basic security measures. In Rockwell Graphic Systems, Inc. v. DEV Industries, Inc., 925 F.2d 174 (7th Cir. 1991), Judge Posner emphasized that "the word 'reasonable' must be given content; it cannot mean that the measures must be the most stringent possible." Courts look at: restricting access on a need-to-know basis, using confidentiality agreements (the contract itself is evidence), physical and digital access controls, employee training, and marking sensitive documents. A company that freely shares its "trade secrets" internally without restriction may lose that protection in litigation.

Inevitable Disclosure Doctrine: In PepsiCo, Inc. v. Redmond, 54 F.3d 1262 (7th Cir. 1995), the Seventh Circuit upheld a preliminary injunction preventing a senior PepsiCo executive from working for a competitor, finding that he would inevitably disclose PepsiCo's trade secrets given the similarity of his new role. The inevitable disclosure doctrine — adopted in some states and rejected in others — allows a court to prevent employment of a person who "inevitably" will use trade secret knowledge in their new job, even without proof of actual misappropriation. California rejects the doctrine as inconsistent with Section 16600. The doctrine's application underscores why the definition of "trade secret" in a confidentiality clause has consequences far beyond the four corners of the contract.

What Commonly Qualifies: Customer lists compiled through significant effort and not publicly available; pricing models and margin structures not known to competitors; proprietary software source code and algorithms; manufacturing processes providing a competitive advantage; strategic business plans not yet in the market; clinical trial data and pharmaceutical formulations. What generally does not qualify: general industry knowledge; skills and techniques known throughout a trade; information that could be reverse-engineered from a publicly available product; information that the company fails to protect internally.

Misappropriation Claims Under DTSA: The DTSA provides civil remedies (18 U.S.C. § 1836(b)) including injunctive relief, damages for actual loss and unjust enrichment, and in willful and malicious cases, exemplary damages up to twice the actual damages plus attorney fees. Criminal penalties under 18 U.S.C. § 1832 apply to willful trade secret theft for economic benefit. The federal cause of action is available in addition to, not instead of, state UTSA claims. Misappropriation includes both acquisition by improper means and disclosure or use of a trade secret by someone who knew it was acquired improperly — which is why receiving confidential information from a disgruntled former employee of a competitor is legally dangerous regardless of whether you solicited it.

What to do

When drafting or reviewing a confidentiality clause, explicitly identify which categories of information are likely to qualify as trade secrets (and therefore warrant indefinite contractual protection) versus which are merely confidential business information (for which finite duration is appropriate). Ensure your company's operational practices — access controls, employee training, NDAs with contractors, document marking — support trade secret status for genuinely sensitive information. Include the DTSA § 1833(b) immunity notice in employment and contractor agreements. If you are receiving information and are uncertain whether it might qualify as a trade secret, document your independent development activities carefully.

Have a contract with a confidentiality clause to review?

Get an instant AI-powered analysis that flags overbroad definitions, one-way obligations, missing exclusions, perpetual duration, missing DTSA notices, and knowledge restrictions — with plain-English guidance on what to negotiate. Just $4.99.

Check My Contract Free →
09

Residuals Clauses: What They Are and Why Knowledge Workers Must Understand Them

High

Common contract language

"Notwithstanding any other provision of this Agreement, Receiving Party's personnel shall not be restricted from using Residual Information in the conduct of Receiving Party's business. 'Residual Information' means information in intangible form retained in the unaided memories of Receiving Party's personnel who had access to Confidential Information, provided that such personnel have not intentionally memorized the Confidential Information for the purpose of using it subsequent to this Agreement."

The residuals clause is one of the most commercially significant — and most frequently misunderstood — provisions in confidentiality agreements involving knowledge workers, technology professionals, and consultants. It draws a line between what a person can do based on knowledge they have legitimately internalized and what they are prohibited from using because they retained a specific document or data set.

The Core Concept: The residuals clause permits a person who received confidential information to use what they have retained in memory — concepts, skills, general knowledge, professional methodologies — even after confidentiality obligations end or apply. What it does not permit is the use of specific documents, files, or data sets. A software developer who worked on a client's system can continue to use general programming techniques they learned during the engagement; they cannot take a copy of the client's proprietary algorithm and use it elsewhere.

Why It Matters for Knowledge Workers: Without a residuals clause, a consultant or contractor who was exposed to a client's confidential technical methodologies could theoretically be prohibited from ever applying similar problem-solving approaches to future clients. A software developer could be restricted from using coding patterns they learned on one project for any subsequent project. These restrictions would be commercially unworkable — professionals cannot compartmentalize their professional knowledge every time they change clients.

The "Intentional Memorization" Carve-Out: The disqualifying condition in the standard residuals clause is intentional memorization — if personnel deliberately memorize specific trade secrets for the purpose of using them after the agreement ends, the residuals clause does not protect that use. This prevents the residuals clause from becoming a license to study confidential materials for the express purpose of building a copycat product or service. In Solutec Corp. v. Agnew, 88 Cal. App. 3d 1 (Cal. Ct. App. 1979), the court drew a similar distinction between legitimately internalized knowledge and deliberate misappropriation of specific confidential information.

Large Company vs. Small Company Dynamics: Residuals clauses originated in large technology company-to-company transactions (notably in agreements between major software companies) to address the practical reality that engineers, consultants, and knowledge workers move between companies and carry their professional knowledge with them. They are less commonly found in agreements between individuals and large enterprises — which creates an asymmetry: a large company has a residuals clause in its outbound agreements (protecting its consultants), but its standard service agreement with a small vendor may not include one.

When the Disclosing Party Objects: Disclosing parties often resist residuals clauses, arguing that they weaken confidentiality protection. The compromise position: a residuals clause that is limited to information retained in unaided memory (no written or electronic copies), does not apply to trade secrets (which remain protected indefinitely regardless of how the information was retained), and excludes information that was specifically memorized for the purpose of subsequent use.

What to do

If you are a knowledge worker — consultant, developer, designer, advisor — who will be exposed to a client's confidential technical or business information, request a residuals clause. The absence of a residuals clause creates theoretical (and sometimes actual) restrictions on applying your professional knowledge after the engagement. If the client refuses a residuals clause entirely, negotiate one that is limited to unaided memory and excludes trade secrets — this addresses the client's core concern while preserving your professional mobility. As the disclosing party evaluating a residuals clause request, distinguish between what you are protecting (specific trade secrets and data) and what you cannot reasonably restrict (general professional skills and knowledge).

10

Return and Destruction of Confidential Information

Medium

Common contract language

"Upon the termination or expiration of this Agreement, or upon the written request of Disclosing Party at any time, Receiving Party shall promptly return or, at Disclosing Party's option, destroy all Confidential Information and all copies, summaries, notes, and reproductions thereof in Receiving Party's possession or control. If destruction is elected, Receiving Party shall provide written certification of such destruction within thirty (30) days."

Return and destruction provisions establish what happens to confidential information after the contractual relationship ends. They exist because the disclosing party has an ongoing interest in preventing confidential information from sitting in a counterparty's files, systems, and backups after there is no longer a business reason for the counterparty to possess it.

Return vs. Destruction: Most modern agreements give the disclosing party a choice between return and destruction, because physical return is often impractical or impossible for electronically stored information. Returning a physical hard drive is straightforward; returning copies of files that were shared via email, cloud platforms, and collaboration tools is rarely achievable without destruction of those copies.

The Scope of the Obligation: "All Confidential Information and all copies, summaries, notes, and reproductions thereof" is broad language that covers not just the original files but derivative materials — notes taken from confidential presentations, summaries prepared for internal use, excerpts incorporated into other documents. This scope is intentional and appropriate from the disclosing party's perspective; it is also extremely difficult to comply with perfectly, particularly in organizations where information has been broadly shared internally.

Electronic Data and Backup Systems: The most practically challenging aspect of return-and-destruction obligations is electronically stored information. Enterprise systems routinely retain backup copies of emails, files, and databases on rolling schedules — deleting a file from active storage may not remove it from backup tapes or cloud backups for months. Well-drafted return-and-destruction provisions acknowledge this reality: "Receiving Party shall use commercially reasonable efforts to purge Confidential Information from its systems, provided that backup copies retained in the normal course of business need not be deleted until the next regularly scheduled backup rotation."

Certification of Destruction: The requirement to certify destruction — in writing, within a specified period — is the disclosing party's only practical confirmation that the obligation has been fulfilled. Without certification, the disclosing party has no way to verify compliance. The certification requirement also creates accountability: signing a false certification is a legal exposure for the receiving party, which incentivizes actual compliance.

Exceptions to Return and Destruction: Some information cannot or should not be destroyed: information required to be retained by law (tax records, regulatory filings, litigation holds); information embedded in deliverables that have already been delivered to the disclosing party; and information that is part of the receiving party's own records of the engagement itself (contracts, invoices, correspondence). These exceptions should be explicitly carved out of the return-and-destruction obligation, rather than left to implication.

What to do

As the receiving party, negotiate to limit return and destruction to active storage — documents, files, and systems actively used — with a practical exception for backup copies retained in the normal course of business through their regularly scheduled rotation. Require the right to retain copies needed for legal compliance, regulatory requirements, and records of your own engagement. As the disclosing party, insist on the certification requirement and a reasonable but specific deadline (30 days is standard). Track which counterparties have been sent your most sensitive information so you can direct return-and-destruction requests appropriately when agreements terminate.

11

Remedies for Breach: Injunctive Relief, DTSA Damages, and Indemnification

High

Common contract language

"Receiving Party acknowledges that any breach or threatened breach of this Section may cause irreparable harm to Disclosing Party for which monetary damages may be an inadequate remedy, and that Disclosing Party shall be entitled to seek injunctive or other equitable relief in any court of competent jurisdiction without the requirement of posting a bond or proving actual damages."

The remedies provisions of a confidentiality clause determine what the disclosing party can do — quickly and effectively — when a breach occurs. Confidentiality breaches are time-sensitive in a way that most contractual breaches are not: once information is disclosed, the harm compounds with each additional dissemination. Monetary damages may be entirely inadequate if the breach is not stopped immediately.

Why Injunctive Relief Is Central: A preliminary injunction or temporary restraining order (TRO) can stop further disclosure within days of being sought, before the information has spread further or been used by competitors. However, courts in most jurisdictions require a plaintiff seeking injunctive relief to prove: (1) likely success on the merits; (2) irreparable harm in the absence of the injunction; (3) the balance of harms favors the injunction; and (4) the injunction serves the public interest. The "irreparable harm" element is where confidentiality clause language becomes critical.

The Stipulated Irreparability: The clause above contains a stipulated acknowledgment by the receiving party that any breach "may cause irreparable harm for which monetary damages may be an inadequate remedy." This contractual stipulation helps the disclosing party satisfy the irreparable harm prong in a TRO or preliminary injunction proceeding. Courts in many jurisdictions will treat this contractual acknowledgment as evidence — though not conclusive proof — of the irreparable harm element. In PepsiCo, Inc. v. Redmond, 54 F.3d 1262 (7th Cir. 1995), the court found irreparable harm warranting injunctive relief precisely because the threat of ongoing confidential information use could not be adequately remedied by money damages.

DTSA Statutory Damages: For trade secrets specifically, the Defend Trade Secrets Act (18 U.S.C. § 1836(b)) provides: (1) damages for actual loss caused by the misappropriation; (2) damages for unjust enrichment not captured in actual loss; (3) in lieu of damages, a reasonable royalty; (4) exemplary damages up to twice the actual damages for willful and malicious misappropriation; and (5) attorney fees in willful and malicious cases. These statutory remedies are available in addition to contractual remedies, and in some circumstances they are substantially more valuable than a contract damages calculation.

Liquidated Damages: Some confidentiality clauses specify a fixed monetary penalty per breach — for example, "$50,000 per unauthorized disclosure" — rather than relying on proof of actual damages. Liquidated damages clauses are enforceable if the specified amount is a reasonable estimate of actual damages at the time of contracting, rather than a penalty. For trade secret disclosures, where actual damages are notoriously difficult to quantify, a well-calibrated liquidated damages provision can be commercially valuable for both parties.

Indemnification for Third-Party Claims: A confidentiality breach can generate third-party liability for the disclosing party — for example, if the disclosed information includes customer data, the resulting regulatory fines, class action liability, and notification costs may be substantial. If the confidentiality clause links to an indemnification provision, the receiving party may be required to indemnify the disclosing party for these downstream consequences of the breach.

Case Law on Injunctive Relief Availability: In Softchoice Corp. v. Schmidt, No. 16-cv-3572 (D. Minn. 2016), the court granted a TRO based on the defendant's misappropriation of a customer database, relying in part on the contractual irreparability acknowledgment. Courts are less willing to grant injunctive relief when the plaintiff delays in seeking it — laches can defeat a TRO request even when liability is clear.

What to do

Verify that the remedies section includes the right to seek injunctive relief without a bond requirement and with the receiving party's stipulation that monetary damages may be inadequate. As the receiving party, read this provision carefully — you are pre-agreeing that any breach can result in immediate court intervention without the disclosing party having to prove actual harm. As the disclosing party, consider adding a liquidated damages provision if your confidential information has a quantifiable value — it removes the burden of proving actual damages in a breach proceeding and establishes clear deterrence.

12

Use Restrictions: The Obligation Beyond Secrecy

High

Common contract language

"Receiving Party shall use Confidential Information solely for the purpose of performing its obligations under this Agreement and shall not use Confidential Information for any other purpose, including without limitation for Receiving Party's own competitive advantage, product development, or business strategy."

Confidentiality obligations have two distinct components: the secrecy obligation (don't disclose) and the use restriction (don't use for unauthorized purposes). The use restriction is the one that matters most in sophisticated commercial disputes — and it is the one most commonly overlooked when parties focus only on preventing disclosure.

Why Use Restrictions Matter: A receiving party can technically comply with the secrecy obligation — never telling a third party anything about what they received — while using the information for their own business benefit in ways the disclosing party never intended. A competitor who receives a company's pricing structure during a vendor evaluation and uses that intelligence to undercut the company on future bids has technically kept the information secret while misusing it in a commercially significant way.

The "Contractual Purpose" Standard: Use restrictions typically limit use of confidential information to the specific contractual purpose — "the evaluation and performance of the Agreement." This prevents lateral use for related but distinct purposes: information shared for a software development project cannot be used to build a competing product, even if the development team has legitimately received access.

Competitive Use Prohibitions: The explicit prohibition on using confidential information for competitive purposes is increasingly common in agreements between companies that are or might become competitors. If you are sharing technical information with a vendor who also serves your competitors, the competitive use prohibition prevents them from synthesizing your information into a market advantage.

The Consulting Firm Conflict: Use restrictions create particular complexity for consulting firms and professional services organizations that serve multiple clients in the same industry. A management consulting firm that advises both Company A and Company B in the same market sector faces potential use restriction issues if insights from Company A's engagement inform its advice to Company B. Firms in this position typically address the conflict through information barrier (or "Chinese wall") procedures, but the adequacy of those procedures in satisfying contractual use restrictions has been the subject of significant litigation.

Use vs. Disclosure: The interplay between use restrictions and disclosure obligations creates a spectrum of prohibited conduct. At one end: sharing confidential information with a direct competitor (both use and disclosure violations). In the middle: internally using confidential information to benefit your own business without sharing it externally (use violation only, no disclosure violation). At the other end: sharing anonymized or aggregated information derived from confidential data with third parties (potential disclosure violation even if specific confidential information is not disclosed). Courts analyze each point on this spectrum differently.

What to do

Read the use restriction carefully and consider how your planned activities during the contract relationship relate to the limitation. If you will be working with multiple clients in the same industry, ensure you have information barrier procedures in place before accepting confidential information from any client that competes with another. If you are the disclosing party, explicitly prohibit competitive use and product development use in the restriction — the generic 'solely for the purpose of performing the Agreement' language may not be specific enough to prevent sophisticated misuse of your information.

Have a contract with a confidentiality clause to review?

Get an instant AI-powered analysis that flags overbroad definitions, one-way obligations, missing exclusions, perpetual duration, missing DTSA notices, and knowledge restrictions — with plain-English guidance on what to negotiate. Just $4.99.

Check My Contract Free →
13

Red Flags: 10 Confidentiality Provisions That Warrant Immediate Attention

High

Common contract language

"All information, whether or not designated as confidential, that is disclosed by Client to Vendor in connection with this Agreement or Vendor's services shall be deemed Confidential Information. Vendor's confidentiality obligations shall be perpetual. Vendor may not use any knowledge, skill, or experience gained in performing services for Client in connection with any subsequent engagement for any other party."

The clause above contains three of the most significant red flags that can appear in a confidentiality provision: an unlimited definition of confidential information, a perpetual duration, and a knowledge restriction that effectively bars the receiving party from applying their professional expertise elsewhere. Identifying these red flags before signing is essential.

Red Flag 1 — "All information" definitions without a reasonableness standard: A definition that covers literally all information shared, with no requirement that it be sensitive or business-related, is overbroad and commercially unreasonable. Courts may refuse to enforce unreasonably broad confidentiality definitions or narrow them through judicial construction, but that requires litigation.

Red Flag 2 — Perpetual confidentiality for all information: As discussed in Section 05, perpetual confidentiality is appropriate for genuine trade secrets but not for general business information. A perpetual obligation on all information creates a permanent compliance burden that is practically impossible to manage over the course of a career.

Red Flag 3 — Knowledge and skill restrictions: The most dangerous clause in the example above is the last sentence: a prohibition on using any "knowledge, skill, or experience gained in performing services for Client" with any subsequent party. This is not a confidentiality clause — it is a de facto non-compete disguised in confidentiality language. Courts in many states (particularly California, Minnesota, and others with strong non-compete restrictions) would likely invalidate this provision as an unenforceable restraint of trade.

Red Flag 4 — No standard exclusions: If the four standard exclusions (public domain, prior possession, third-party receipt, independent development) are absent, the clause is overbroad. Absence of these exclusions is often an oversight rather than intentional drafting, but it creates litigation risk if a dispute arises.

Red Flag 5 — No legal process carve-out: Without the ability to comply with court orders and regulatory requirements without breaching the confidentiality clause, the receiving party faces an impossible conflict between legal obligation and contractual obligation.

Red Flag 6 — No DTSA immunity notice in employment/contractor agreements: As required by 18 U.S.C. § 1833(b)(3), confidentiality agreements with employees and contractors must include notice of the DTSA whistleblower immunity. Omission prevents the employer from recovering exemplary damages or attorney fees in any subsequent DTSA action.

Red Flag 7 — No SEC/regulatory whistleblower carve-out in public company contexts: Under SEC Rule 21F-17, confidentiality clauses that impede employees from reporting to the SEC are unenforceable and can result in SEC enforcement action against the company. Any confidentiality clause that lacks an explicit carve-out for regulatory reporting in a public company or securities industry context is a red flag.

Red Flag 8 — Unlimited liquidated damages: Liquidated damages provisions that specify enormous per-breach penalties without a reasonable relationship to actual harm can be unenforceable as penalties, but they create litigation risk and negotiating leverage for the disclosing party in any breach dispute.

Red Flag 9 — No return-and-destruction exception for legally required retention: A return-and-destruction clause that requires destruction of all confidential information without exception conflicts with legal retention requirements for financial records, tax documents, and regulatory filings.

Red Flag 10 — One-way obligation in a mutual-information relationship: When both parties will share sensitive business information, a one-way confidentiality clause that only protects the other party's information leaves your information unprotected by contract.

What to do

Before signing any contract with a confidentiality clause, run through these 10 red flags. Flag any red flag item before signing and address it in negotiation. The most dangerous combination is perpetual one-way confidentiality with a knowledge restriction and no standard exclusions — this configuration can follow a consultant or contractor indefinitely, restrict professional mobility, and cover information that was never genuinely confidential.

14

Industry-Specific Confidentiality Considerations

Medium

Common contract language

"For purposes of this Agreement, Confidential Information shall include, without limitation, all Personal Health Information (PHI) as defined by HIPAA and applicable state health privacy laws, which shall be subject to the additional protections set forth in the Business Associate Agreement attached hereto as Exhibit B."

Confidentiality obligations are shaped by the industry context in which they operate. Regulatory frameworks, industry standards, and the nature of the information shared create different confidentiality requirements and different legal consequences for breach across sectors.

Healthcare and HIPAA: The Health Insurance Portability and Accountability Act (HIPAA) creates federally mandated confidentiality requirements for Protected Health Information (PHI) that operate independently of and alongside any contractual confidentiality obligations. Contracts involving PHI must include a Business Associate Agreement (BAA) in addition to or integrated with the confidentiality clause. The BAA has specific required terms under HIPAA's Business Associate regulations (45 CFR Parts 160 and 164). Breach of HIPAA confidentiality obligations carries civil penalties ($100 to $50,000 per violation, up to $1.9 million per violation category per year) and potential criminal liability.

Financial Services: In financial services, confidentiality obligations extend to client financial data, trading strategies, and proprietary analytical models. Regulatory frameworks including Regulation SP (privacy of consumer financial information), Gramm-Leach-Bliley Act (GLBA), and SEC and FINRA rules on information barriers create overlapping confidentiality requirements. Contracts involving material non-public information (MNPI) carry additional restrictions — trading on MNPI in breach of a confidentiality agreement is securities fraud, not merely a contract breach.

Technology and SaaS: Technology contracts present the broadest spectrum of confidentiality issues: source code, API documentation, security architecture, user data, proprietary algorithms, and machine learning training data. Source code confidentiality is particularly sensitive — it contains the disclosing party's entire technological investment and, once disclosed, cannot be "un-disclosed." Contracts involving user data bring privacy law overlays: CCPA, GDPR, and state data protection laws impose independent confidentiality obligations for personal data that interact with contractual provisions.

Consulting and Professional Services: Knowledge workers in consulting face unique confidentiality challenges because their professional value is built on the accumulation of industry knowledge across multiple client engagements. The residuals clause (Section 09) is particularly important in consulting contracts. Additionally, consulting firms serving competitors must implement information barrier procedures that can withstand scrutiny if a use restriction breach is alleged.

Government Contracting: Federal government contracts involving classified information, Controlled Unclassified Information (CUI), or other sensitive government information are subject to the National Industrial Security Program (NISP), Defense Federal Acquisition Regulation Supplement (DFARS), and specific agency regulations. Confidentiality obligations in government contracts go far beyond commercial standards — violation can result in suspension or debarment from government contracting, criminal liability, and civil False Claims Act exposure.

What to do

Identify which regulatory frameworks apply to the information you will be handling under the contract. For healthcare clients, confirm a BAA is in place before any PHI is shared. For financial services, verify compliance with privacy regulations and information barrier requirements before accepting confidential market-sensitive information. For technology contracts, ensure your confidentiality clause specifically addresses source code (perpetual protection is warranted), user data (privacy law compliance requirements), and security architecture. For government contracts, engage counsel familiar with CUI requirements and DFARS cybersecurity obligations before signing.

15

State-by-State Enforcement: How Jurisdiction Affects Confidentiality Clauses

High

Common contract language

"This Agreement shall be governed by and construed in accordance with the laws of the State of Delaware, without regard to its conflict of laws principles. Any dispute arising under or relating to this Agreement shall be resolved in the state or federal courts located in the State of Delaware."

Confidentiality clause enforceability is heavily influenced by the governing law of the contract and where litigation would occur. While federal law (DTSA) establishes a baseline for trade secret protection, state laws vary significantly in their approach to confidentiality obligations, non-compete restrictions packaged as confidentiality clauses, and remedies for breach.

California: Business and Professions Code Section 16600 broadly prohibits contractual restrictions on the right to engage in a lawful profession, trade, or business. In 2024, the California Supreme Court reaffirmed in Barker v. Insight Global, LLC that Section 16600 applies broadly to any contractual restriction on professional mobility — including those packaged as confidentiality clauses. Confidentiality clauses must be carefully limited to specific confidential data and trade secrets; general knowledge and professional skill restrictions are unenforceable.

Texas: Texas enforces confidentiality agreements broadly in commercial contexts under the Texas Uniform Trade Secrets Act (TUTSA, Tex. Civ. Prac. & Rem. Code § 134A). Courts regularly grant TROs in trade secret and confidentiality breach cases. Texas's Covenants Not to Compete Act (Tex. Bus. & Com. Code § 15.50) requires non-competes to be ancillary to an enforceable agreement and supported by consideration — overly broad confidentiality clauses that function as non-competes have been analyzed under this statute.

New York: New York enforces confidentiality agreements in commercial settings and has a sophisticated body of trade secret law under common law (New York has not adopted UTSA). Courts construe ambiguous provisions against the drafter. New York courts will grant preliminary injunctions in appropriate confidentiality breach cases with strong factual records.

Illinois: Illinois adopted the Illinois Trade Secrets Act (765 ILCS 1065), which preempts common law misappropriation claims but provides consistent protection for qualifying trade secrets. Illinois courts have been skeptical of confidentiality clauses that operate as de facto non-competes. The Illinois Freedom to Work Act (820 ILCS 90) restricts non-competes for employees earning below specified thresholds.

Florida: Florida has one of the strongest enforcement frameworks for confidentiality and trade secret protections in the U.S. Florida Statute § 688.001 (Florida Uniform Trade Secrets Act) provides robust trade secret protection. Courts actively enforce injunctive relief provisions in confidentiality cases, with the burden shifting to defendants to show enforcement is unreasonable.

Washington: Washington adopted the Uniform Trade Secrets Act (RCW 19.108) and provides DTSA-consistent trade secret protection. Washington's Non-Compete Act (2020) significantly restricts restrictive covenants for employees earning below a specified threshold. Confidentiality clauses that restrict professional knowledge face scrutiny under this framework.

Colorado: Colorado revised its non-compete statute (C.R.S. § 8-2-113) significantly in 2022. The statute now requires that any restrictive covenant — including broadly drafted confidentiality provisions that restrain trade — be supported by adequate consideration, be no broader than necessary to protect a legitimate business interest, and not harm the public interest.

Massachusetts: Massachusetts courts actively enforce confidentiality agreements and trade secret protections under M.G.L. c. 93, § 42. Preliminary injunctions are regularly granted in trade secret cases. Massachusetts's Non-Competition Agreement Act (2018) restricts non-competes for employees, requiring garden-leave pay or other consideration and a one-year maximum duration.

Minnesota: Minnesota effectively banned non-competes for employees in 2023 (Minn. Stat. § 181.988). Courts apply significant scrutiny to broadly drawn confidentiality provisions that function as non-competes. Trade secrets remain protected under the Minnesota Uniform Trade Secrets Act (Minn. Stat. § 325C).

Delaware: Delaware is the preferred governing law for commercial contracts between business entities. Courts enforce confidentiality provisions with strong fidelity to the written agreement text and sophisticated commercial analysis from the Court of Chancery. Delaware law is frequently chosen for its predictability — provisions that would face enforceability challenges elsewhere are typically enforced in Delaware when clearly and specifically drafted.

Georgia: Georgia enforces confidentiality agreements broadly under the Georgia Trade Secrets Act (O.C.G.A. § 10-1-760) and the Georgia Restrictive Covenants Act (O.C.G.A. § 13-8-50). Georgia courts apply a "blue pencil" approach — rewriting overbroad provisions rather than invalidating them — which gives disclosing parties some flexibility even when original drafting is overreaching.

Pennsylvania: Pennsylvania's common law trade secret framework (Pennsylvania has not adopted UTSA) requires proof of novelty and appropriation under a misappropriation theory. Pennsylvania courts enforce confidentiality agreements but require precision in drafting — overbroad provisions are scrutinized under the state's reasonableness standard for restrictive covenants.

Virginia: Virginia adopted the Virginia Trade Secrets Act (Va. Code § 59.1-336) and enforces confidentiality agreements commercially. Virginia courts have historically been receptive to non-compete and confidentiality enforcement, though recent legislative changes have increased scrutiny for employee agreements.

New Jersey: New Jersey enforces confidentiality agreements under a reasonableness standard. Courts examine whether the restriction is no broader than necessary to protect a legitimate business interest, imposes no undue hardship on the employee/contractor, and does not injure the public. New Jersey does not have a comprehensive non-compete statute, so courts apply this three-part common law test.

Ohio: Ohio adopted the Ohio Uniform Trade Secrets Act (O.R.C. § 1333.61) and enforces confidentiality agreements in commercial contexts. Courts apply a reasonableness analysis to any restriction that functions as a competitive restraint. Ohio courts will modify overbroad provisions rather than void them entirely in many cases.

What to do

When evaluating the governing law clause, consider the enforcement posture of the selected state. Disclosing parties often choose Delaware, Texas, or Florida for strong commercial enforcement. Receiving parties in California, Colorado, Minnesota, or Washington have meaningful state law protections against overly broad confidentiality provisions that operate as de facto non-competes. If the governing law is unfavorable, request a change — and consider that your home state's courts may apply local law on grounds of public policy even when a contract specifies a foreign governing law.

16

How to Negotiate a Confidentiality Clause: Practical Strategies

Medium

Common contract language

"The confidentiality obligations set forth herein shall be commercially reasonable in scope and duration and shall not be construed to restrict Receiving Party from using general professional knowledge, skills, and experience gained in the normal course of performing services hereunder."

Confidentiality clauses are negotiable, even in contracts presented as standard or non-negotiable. Most corporate counterparties have internal templates that are drafted with only their interests in mind; negotiated changes are regularly accepted when framed as commercially standard protections rather than one-sided demands. Effective negotiation requires knowing what to prioritize and how to frame each request.

Prioritize the Highest-Impact Terms: In order of typical commercial impact, prioritize: (1) mutual vs. one-way structure; (2) definition of confidential information (marking requirement or reasonableness standard); (3) duration; (4) DTSA immunity notice (for employment/contractor contexts); (5) whistleblower carve-out (for public company contexts); (6) residuals clause (if you are a knowledge worker); (7) standard exclusions; (8) legal process carve-out.

Frame Requests as Industry Standard: The most effective negotiating posture is to describe your proposed changes as "commercially standard" or "consistent with market practice" rather than as requests unique to your situation. "My professional advisors have flagged that mutual confidentiality is market standard for services agreements of this type" is more persuasive than "I want to protect my information too."

Use a Redline, Not a Letter: Submit proposed changes as a redlined version of the agreement rather than a letter describing what you want. A redline requires the other party to respond to specific language, which is faster and produces less ambiguity than negotiating in generalities. Provide brief explanatory comments for each significant change so the counterparty's reviewer understands the rationale without needing to ask.

Trade-Offs and Package Negotiations: When a counterparty refuses individual changes, propose a package: "I can accept the broader definition of Confidential Information if we make the obligation mutual and add the standard exclusions." Linking changes creates trades rather than unilateral requests, which is psychologically easier for the other side to accept.

The One-Call Rule: For each significant change you request, identify in advance what you will accept if the counterparty pushes back. Going to two rounds of negotiation on each point signals that your "final position" is never final, which weakens your negotiating credibility. Know your walk-away point before the first call.

When to Accept Standard Language: Not every confidentiality clause needs extensive negotiation. If the contract involves a single, defined project with no ongoing information flow, the financial stakes are modest, the other party is a well-known commercial entity with a strong reputational interest in honoring contracts, and the information you are sharing is genuinely not sensitive, extensive negotiation may not be worth the friction it creates. Reserve your negotiating capital for agreements with significant financial exposure or material confidentiality risk.

After Signing: Operational compliance with confidentiality obligations is as important as the negotiated terms. Implement internal procedures for: logging confidential information received (what, when, from whom, for what purpose); limiting internal circulation to need-to-know personnel; obtaining written confidentiality agreements from contractors before disclosure; tracking return-and-destruction obligations; and documenting independent development activities that might later be challenged as misappropriation.

What to do

Before entering negotiation, identify your three highest-priority changes and your walk-away position on each. Submit changes as a redline rather than a letter. Frame requests as commercially standard. When facing resistance, propose package trades that link related provisions. After the agreement is signed, implement compliance procedures for each operative obligation — tracking what confidential information you received, who had access to it, and how it was ultimately disposed of. The best-negotiated confidentiality clause provides no protection if internal compliance procedures do not support it.

Landmark Case Law: 5 Cases That Shaped Confidentiality and Trade Secret Law

These five cases are foundational to understanding how courts apply confidentiality obligations and trade secret protections. Each represents a distinct doctrinal principle that continues to influence how confidentiality clauses are drafted and enforced.

Inevitable Disclosure Doctrine

PepsiCo, Inc. v. Redmond, 54 F.3d 1262 (7th Cir. 1995)

The Seventh Circuit upheld a preliminary injunction preventing a senior PepsiCo executive from taking a similar role at a competitor (Quaker Oats / Gatorade), finding that the executive would "inevitably" disclose PepsiCo's trade secrets — including strategic plans, pricing, and distribution strategies — in the course of his new responsibilities. The court found that even without evidence of actual misappropriation or bad faith, the structural similarity of the roles made trade secret disclosure inevitable. Significance: established the inevitable disclosure doctrine as a basis for injunctive relief without proof of actual misappropriation. Rejected by California; applied in some form in approximately 25 states.

Trade Secret Misappropriation — Indirect Acquisition

Silvaco Data Systems v. Intel Corp., 184 Cal. App. 4th 210 (Cal. Ct. App. 2010)

The California Court of Appeal examined trade secret misappropriation claims involving software that allegedly contained misappropriated trade secrets. The court addressed whether a company that acquired software knowing it might contain another party's trade secrets could be liable for misappropriation. The case clarified the California UTSA's application to indirect misappropriation — a recipient who has reason to know that information was acquired through improper means can be liable even if they did not personally misappropriate it. Significance: underscores the risk of receiving confidential information from third parties who may have obtained it improperly, even without direct solicitation.

Reasonable Measures to Maintain Secrecy

Rockwell Graphic Systems, Inc. v. DEV Industries, Inc., 925 F.2d 174 (7th Cir. 1991)

Judge Posner's analysis established an economic framework for evaluating the 'reasonable measures' requirement for trade secret status. The court held that the test is not whether the owner took every possible precaution, but whether the measures taken were reasonable in light of the costs of greater protection and the value of the secret. The case involved piece-part drawings for printing press parts; the court found that the company's selective controls, though imperfect, were sufficient to maintain trade secret status. Significance: practical articulation of the reasonable measures standard — courts examine a cost-benefit analysis of the owner's actual protective measures, not perfection.

Improper Means — Industrial Espionage

E.I. du Pont de Nemours & Co. v. Christopher, 431 F.2d 1012 (5th Cir. 1970)

The Fifth Circuit held that aerial photography of a chemical plant under construction — to discover trade secret manufacturing processes being installed — constituted 'improper means' under trade secret law, even though the photography was conducted from public airspace and did not involve trespass. The case established that 'improper means' extends beyond theft, fraud, and breach of confidence to encompass any method that falls below generally accepted standards of commercial morality. Significance: the broad 'improper means' concept from du Pont was incorporated into both the UTSA and the DTSA definition of misappropriation, and remains the benchmark for what constitutes illegitimate acquisition of trade secrets.

Trade Secret Misappropriation — Digital Theft

Waymo LLC v. Uber Technologies, Inc., No. 3:17-cv-00939 (N.D. Cal. 2018)

Google's autonomous vehicle unit (Waymo) sued Uber after a former employee downloaded approximately 14,000 confidential files before leaving to found a competing company (Otto) that Uber subsequently acquired. The case settled for approximately $245 million in equity before trial. The case is significant for several reasons: it demonstrated the scale of damages potentially available in trade secret cases involving senior technical employees; it illustrated the evidentiary power of digital access logs and forensic analysis; and it highlighted how the DTSA's ex parte seizure provision (18 U.S.C. § 1836(b)(2)) operates in practice. Significance: underscores the importance of monitoring file access and downloads for departing employees with access to trade secrets, and illustrates the DTSA's application to high-value technology misappropriation.

Negotiation Priority Matrix

This 12-issue matrix maps each negotiable confidentiality term against what the disclosing party typically wants, what the receiving party typically resists, and the commercially standard approach that tends to resolve the gap.

IssueDiscloser WantsRecipient ResistsMarket Approach
Definition scope (marking vs. reasonableness)Broad reasonableness standard — no marking requiredMarking requirement or written confirmation within 30 daysCompromise: reasonableness standard plus 30-day follow-up for oral disclosures
Mutual vs. one-way structureOne-way, protecting only discloserFull mutual reciprocityAccept one-way only if recipient shares nothing of value; otherwise insist on mutual
Duration for general confidential informationPerpetual1-2 years3-5 years post-termination; perpetual only for trade secrets
Independent development exclusionNarrow — require proof and personnel segregationBroad — include general knowledge and skillsStandard UTSA language: no reference to or use of discloser's CI
Residuals clauseExclude entirelyBroad — cover general professional knowledgeLimited to unaided memory; exclude trade secrets; exclude intentional memorization
Return and destruction scopeAll copies including backups; certification requiredActive storage only; backup exception; legally required retention exceptionActive storage + commercially reasonable backup purge; legally required retention carve-out
Permitted disclosures (affiliates)Employees only, no affiliatesInclude all affiliates without flow-downNamed affiliates or controlled affiliates; flow-down requirement applies to all
Injunctive relief / no-bond waiverFull stipulated irreparability; no bond; no proof of actual damagesStrike entirely or require proofStipulated irreparability language only; preserve right to contest actual bond amount
Liquidated damagesHigh per-breach penaltyStrike entirelyReasonable estimate tied to actual harm; cap at fixed amount; limited to willful breach
DTSA § 1833(b) immunity noticeInclude (required for exemplary damages)Not typically resistedInclude in all employment and contractor agreements; no negotiation needed
Regulatory / whistleblower carve-outNarrow — require notice before disclosureBroad — no restriction on regulatory reportingSEC/CFTC reporting expressly excluded; other regulators with notice requirement
Governing lawDelaware, Texas, or Florida (strong enforcement)Recipient's home state (public policy protection)Neutral state with predictable commercial courts (Delaware for B2B); home state for employment

7 Common Confidentiality Mistakes

These are the errors that generate the most disputes, the most preventable liability, and the most operational exposure in confidentiality clause compliance. Most occur not from bad faith but from inattention or misunderstanding of what the clause actually requires.

01

Failing to read the confidential information definition before signing

The definition determines everything that follows — your secrecy duties, use restrictions, return obligations, and breach liability. A "reasonably understood to be confidential" standard with no marking requirement can sweep up years of informal business conversations. Most signatories read the headline confidentiality clause without reading the defined terms section first, where the scope is actually set. Always read the definition before the operative obligations.

02

Assuming mutual NDA protection when the contract is one-way

The prior NDA you signed during sales conversations likely has an integration clause — meaning the services contract supersedes it. The services contract may be one-way (protecting only the client), leaving all your shared methodologies, pricing, and proposals unprotected. Never assume mutual NDA protection carries forward. Re-read the confidentiality clause in every new agreement, even with the same counterparty.

03

Sharing confidential information with subcontractors before obtaining a flow-down agreement

The permitted disclosures provision requires that subcontractors and contractors be "bound by confidentiality obligations no less restrictive" before you share client confidential information with them. Sharing before obtaining that written agreement is a technical breach of the confidentiality clause — even if the subcontractor subsequently signs. The obligation runs to the moment of disclosure, not just the existence of an eventual agreement.

04

Failing to track return-and-destruction obligations

Return-and-destruction obligations trigger on contract termination, and many parties simply forget them. Two years after an engagement ends, client data still sits in email archives, shared drives, and project management tools — technically a continuing breach. Implement a contract termination checklist that triggers a return-and-destruction review for every agreement containing a confidentiality clause. Calendar the obligation with a reminder 30 days before each contract expiration.

05

Omitting the DTSA § 1833(b) immunity notice from employee and contractor agreements

This is purely a drafting oversight — the DTSA requires the notice in all agreements with employees and contractors that govern trade secret protection. The consequence is commercially significant: failure to include the notice bars the employer from recovering exemplary damages (up to 2x actual damages) and attorney fees in any DTSA action. Every standard NDA and employment confidentiality agreement should be updated to include the statutory immunity notice if it was drafted before the DTSA's 2016 effective date or without awareness of this requirement.

06

Neglecting independent development documentation

The independent development exclusion is only as good as the documentation supporting it. A software company that develops a product similar to a client's confidential algorithm — without any records showing that development predated or was segregated from the confidential disclosure — will struggle to prove independent development if sued. Maintain contemporaneous development logs, separate development teams from client-facing teams for sensitive projects, and document project timelines with version histories and commit records.

07

Using confidential information beyond the contractual purpose without realizing it

Use restrictions are violated most often innocently — a consultant who learns a client's pricing structure and unconsciously factors it into advice given to a competing client; a developer who applies a proprietary architecture pattern learned on one project to another. These violations are real regardless of intent. Implement cross-client information barriers in professional services contexts, train your team on use restriction obligations at project onboarding, and periodically audit whether information from one client engagement is influencing work for another.

Confidentiality Clause Review Checklist

Use this 16-item checklist when reviewing any contract with a confidentiality provision. Each item corresponds to a term that frequently creates significant compliance obligations or legal exposure when overlooked. Check all items before signing any contract that contains a confidentiality clause.

ItemPriority
Confidential Information DefinitionRequired
Standard ExclusionsRequired
Mutual vs. One-Way StructureRequired
DurationRequired
Legal Process Carve-OutRequired
DTSA § 1833(b) Immunity NoticeRequired
Whistleblower / SEC Carve-OutRequired
Permitted DisclosuresRequired
Return and DestructionRequired
Use RestrictionsRequired
Residuals ClauseRecommended
Survival Clause ConsistencyRequired
Injunctive Relief LanguageRecommended
Knowledge/Skill RestrictionsRed Flag
Unlimited Information DefinitionRed Flag
Perpetual Duration for All InformationRed Flag

State Enforcement at a Glance: 15-State Comparison

Confidentiality clause enforceability varies significantly by state, particularly where clauses operate as de facto non-competes or restrict professional mobility. The summaries below reflect general statutory and judicial trends and are not legal advice for any specific contract or situation.

CA

California

Business and Professions Code Section 16600 broadly prohibits contractual restrictions on the right to engage in a lawful profession, trade, or business. Confidentiality clauses are enforceable when limited to specific trade secrets and confidential data, but provisions that restrict use of professional knowledge, skills, or general experience face significant enforceability challenges. The residuals clause concept originated partly from California's restrictions on post-employment knowledge restrictions. Trade secret protection available under the California Uniform Trade Secrets Act (Cal. Civ. Code § 3426). Rejects the inevitable disclosure doctrine.

TX

Texas

Texas enforces confidentiality agreements broadly in commercial contexts under the Texas Uniform Trade Secrets Act (TUTSA, Tex. Civ. Prac. & Rem. Code § 134A). Courts regularly grant TROs in trade secret and confidentiality breach cases. Texas's Covenants Not to Compete Act (Tex. Bus. & Com. Code § 15.50) requires non-competes to be ancillary to an enforceable agreement and supported by adequate consideration. Overly broad confidentiality clauses that function as non-competes have been analyzed under this statute in some cases.

NY

New York

New York enforces confidentiality agreements in commercial settings and has a sophisticated body of trade secret law under common law (New York has not adopted UTSA). Courts construe ambiguous provisions against the drafter. New York's Freelance Isn't Free Act expansion (2024) strengthened payment protections for freelancers but did not directly regulate confidentiality clauses. New York courts will grant preliminary injunctions in appropriate confidentiality breach cases with strong factual records. Applies the inevitable disclosure doctrine in limited circumstances.

IL

Illinois

Illinois adopted the Illinois Trade Secrets Act (765 ILCS 1065), which preempts common law misappropriation claims but provides UTSA-consistent protection for qualifying trade secrets. Illinois courts have been skeptical of confidentiality clauses that operate as de facto non-competes. The Illinois Freedom to Work Act (820 ILCS 90) restricts non-competes for employees earning below specified thresholds and has been applied to broadly drafted confidentiality provisions. Adopted the inevitable disclosure doctrine in PepsiCo v. Redmond (7th Cir., applying Illinois law).

FL

Florida

Florida has one of the strongest enforcement frameworks for confidentiality and trade secret protections in the U.S. Florida Statute § 688.001 (Florida Uniform Trade Secrets Act) provides robust trade secret protection. Courts actively enforce injunctive relief provisions in confidentiality cases, with the burden shifting to defendants to show enforcement is unreasonable. Florida's non-compete statute (Fla. Stat. § 542.335) provides a separate framework for enforcing post-employment restrictions when supported by a legitimate business interest.

WA

Washington

Washington adopted the Uniform Trade Secrets Act (RCW 19.108) and provides DTSA-consistent trade secret protection. Washington's Non-Compete Act (2020) significantly restricts restrictive covenants for employees earning below a specified threshold and imposes notice, consideration, and geographic limitations on all non-competes. Confidentiality clauses that restrict professional knowledge face scrutiny under this framework — courts examine substance over form.

CO

Colorado

Colorado revised its non-compete statute (C.R.S. § 8-2-113) significantly in 2022. The statute now requires that any restrictive covenant — including broadly drafted confidentiality provisions that restrain trade — be supported by adequate consideration, be no broader than necessary to protect a legitimate business interest, and not harm the public interest. Courts apply a strict necessity standard. Overly broad confidentiality provisions in employment and services agreements face meaningful enforceability risk.

MA

Massachusetts

Massachusetts courts actively enforce confidentiality agreements and trade secret protections under M.G.L. c. 93, § 42. Preliminary injunctions are regularly granted in trade secret cases. Massachusetts's Non-Competition Agreement Act (2018) restricts non-competes for employees, requiring garden-leave pay or other consideration, a one-year maximum duration, and geographic/activity limitations — but these restrictions do not apply to narrowly drawn confidentiality clauses that do not restrain trade.

MN

Minnesota

Minnesota effectively banned non-competes for employees in 2023 (Minn. Stat. § 181.988). Courts apply significant scrutiny to broadly drawn confidentiality provisions that function as non-competes by restricting professional mobility. Trade secrets remain protected under the Minnesota Uniform Trade Secrets Act (Minn. Stat. § 325C) when the information meets the statutory requirements. Receiving parties in Minnesota have meaningful protections against overly broad confidentiality clauses in employment contexts.

DE

Delaware

Delaware is the preferred governing law for commercial contracts between business entities. Courts enforce confidentiality provisions with strong fidelity to the written agreement text and sophisticated commercial analysis from the Court of Chancery. Delaware has no general statute restricting confidentiality clauses in commercial contexts. Delaware's Delaware Uniform Trade Secrets Act (6 Del. C. § 2001) provides standard UTSA-based protection. Delaware law is frequently chosen for its predictability in enforcing clearly drafted commercial provisions.

GA

Georgia

Georgia enforces confidentiality agreements broadly under the Georgia Trade Secrets Act (O.C.G.A. § 10-1-760) and the Georgia Restrictive Covenants Act (O.C.G.A. § 13-8-50). Georgia courts apply a 'blue pencil' approach — rewriting overbroad provisions rather than invalidating them — which gives disclosing parties some flexibility even when original drafting is overreaching. The blue pencil doctrine is particularly relevant for broadly drawn confidentiality clauses that a Georgia court might narrow to enforce rather than void.

PA

Pennsylvania

Pennsylvania uses a common law trade secret framework (Pennsylvania has not adopted UTSA), requiring proof of novelty and appropriation under a misappropriation theory. Pennsylvania courts enforce confidentiality agreements but require precision in drafting — overbroad provisions are scrutinized under the state's reasonableness standard. Pennsylvania courts will grant injunctive relief in trade secret cases with strong factual records, but typically require clear and convincing evidence of misappropriation.

VA

Virginia

Virginia adopted the Virginia Trade Secrets Act (Va. Code § 59.1-336) and enforces confidentiality agreements commercially. Virginia courts have historically been receptive to confidentiality enforcement, and the state's workforce concentration in federal contracting and defense industries means trade secret issues frequently arise in sophisticated contexts. Recent legislative changes have increased judicial scrutiny of overbroad non-compete provisions in employee agreements.

NJ

New Jersey

New Jersey enforces confidentiality agreements under a reasonableness standard. Courts examine whether the restriction is no broader than necessary to protect a legitimate business interest, imposes no undue hardship on the employee or contractor, and does not injure the public. New Jersey does not have a comprehensive non-compete statute, so courts apply this three-part common law test. New Jersey courts have struck confidentiality provisions that effectively operated as non-competes without corresponding consideration.

OH

Ohio

Ohio adopted the Ohio Uniform Trade Secrets Act (O.R.C. § 1333.61) and enforces confidentiality agreements in commercial contexts. Courts apply a reasonableness analysis to any restriction that functions as a competitive restraint. Ohio courts will frequently modify overbroad provisions rather than void them entirely — similar to Georgia's blue pencil approach — which means disclosing parties in Ohio have some court-side protection against drafting overreach.

Mutual vs. One-Way Confidentiality: Side-by-Side

The structural choice between mutual and one-way confidentiality has significant practical consequences. Understanding the differences helps you evaluate whether the clause serves both parties' interests or exclusively protects one side.

FeatureMutualOne-Way
Who has obligationsBoth parties owe confidentiality to the otherOnly the Receiving Party has obligations
Whose information is protectedBoth parties' confidential informationOnly the Disclosing Party's information
When appropriateBoth parties share sensitive informationInformation flows only in one direction
Common inTechnology partnerships, consulting agreements, joint venturesStandard enterprise vendor contracts, employment agreements
Red flag if used whenRarely a red flag on its ownThe other party will receive your sensitive proposals, methodologies, or pricing
Key negotiationEnsure duration, exclusions, and carve-outs are symmetricPush for mutual if you are sharing anything of confidential value

The Five Most Dangerous Confidentiality Provisions

These five provisions, alone or in combination, create the greatest risk for service providers, freelancers, and knowledge workers. If your contract contains any of them, treat revision as a priority before signing.

  1. 1

    Perpetual confidentiality for all information with no trade secret carve-out

    Permanent obligations for general business information — not just trade secrets — are overbroad and create compliance burdens that follow you indefinitely.

  2. 2

    Knowledge and skill restrictions packaged as confidentiality

    Provisions barring use of 'knowledge, skill, or experience' gained during the engagement are de facto non-competes that courts in many states (especially California) will not enforce — but enforcing that right requires litigation.

  3. 3

    One-way obligation when you are sharing proprietary methodologies, pricing, or proposals

    Your pricing intelligence, proprietary approaches, and competitive information are unprotected while the other party can use them freely.

  4. 4

    No standard exclusions for publicly available, independently developed, or prior-possession information

    Without these exclusions, you can be held liable for disclosing information that was never genuinely confidential — or that you developed yourself.

  5. 5

    No legal process carve-out and no whistleblower protection

    Without the ability to comply with court orders, regulatory requirements, and SEC whistleblower reporting obligations, you face impossible conflicts between contract compliance and legal compliance.

Signs of a Well-Balanced Confidentiality Clause

When you see these elements in a contract's confidentiality clause, you are looking at a provision drafted with commercial balance — or one that has been negotiated to a fair result.

  • Mutual obligations — both parties keep the other's information confidential
  • Bounded definition — "reasonably understood to be confidential" or a marking requirement
  • All four standard exclusions present: public domain, prior possession, third-party receipt, independent development
  • Finite duration for general confidential information (3-5 years post-termination)
  • Indefinite protection only for information qualifying as trade secrets under DTSA/UTSA
  • Legal process carve-out with notice, cooperation, and minimum disclosure requirements
  • DTSA § 1833(b) immunity notice included (required for employment and contractor agreements)
  • Explicit SEC/regulatory whistleblower carve-out (public company or securities contexts)
  • Permitted disclosures covering employees, contractors, and professional advisors with flow-down requirement
  • Return-and-destruction exception for legally required retention and routine backups
  • Residuals clause protecting professional knowledge internalized during the engagement (knowledge worker contexts)
  • Use restrictions matched to the actual contractual purpose — broad enough to cover all planned activities

Have a contract with a confidentiality clause to review?

Get an instant AI-powered review that identifies overbroad definitions, one-way obligations, perpetual duration, missing DTSA notices, missing whistleblower carve-outs, and knowledge restrictions — with plain-English guidance on exactly what to negotiate. Just $4.99.

Check My Contract Free →

No account needed · Results in ~2 minutes · Contract never stored

Frequently Asked Questions

What is the difference between a confidentiality clause and a standalone NDA?

A confidentiality clause is a provision embedded within a broader contract — a services agreement, employment contract, or vendor agreement — that restricts disclosure and use of specific information shared during contract performance. A standalone NDA is a separate contract whose sole purpose is confidentiality, typically signed before any other contractual relationship exists, to cover exploratory conversations, due diligence, or preliminary business discussions.

The practical difference is timing and scope. The standalone NDA covers what is shared before the deal is struck; the confidentiality clause in your services contract covers what is shared during performance. When a broader contract contains its own confidentiality clause, it typically contains an integration clause that supersedes any prior standalone NDA — meaning the services contract's potentially narrower or different confidentiality terms now control.

Always verify which agreement controls the confidentiality of information shared at each phase of a business relationship. If you signed an NDA that was more protective than the services agreement's confidentiality clause, the services agreement's terms now govern information shared after its execution date — which may leave important information less protected than you assumed.

What is the Defend Trade Secrets Act (DTSA) and how does it relate to a confidentiality clause?

The Defend Trade Secrets Act (18 U.S.C. § 1836), enacted in 2016, created a federal civil cause of action for trade secret misappropriation available in federal court across all 50 states. It operates independently of and alongside any contractual confidentiality clause.

The DTSA is significant because it applies even without a contract — a party can sue for trade secret misappropriation under the DTSA even if no NDA or confidentiality clause exists. For parties with confidentiality clauses, the DTSA adds an important supplementary layer: DTSA remedies include actual damages, unjust enrichment, and — for willful and malicious misappropriation — exemplary damages up to twice the actual damages plus attorney fees.

The DTSA also contains two critical provisions often missing from confidentiality agreements: (1) the § 1833(b) whistleblower immunity, which protects disclosure of trade secrets to government officials or attorneys for reporting legal violations; and (2) an authorization for ex parte seizure orders in extraordinary circumstances. Confidentiality agreements with employees and contractors must include the § 1833(b) immunity notice, or the employer loses the right to seek exemplary damages and attorney fees in any DTSA action.

What qualifies as a trade secret under the DTSA and state law?

Under the Defend Trade Secrets Act (18 U.S.C. § 1839(3)), a trade secret is information that: (1) the owner has taken reasonable measures to keep secret; and (2) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, another person who can obtain economic value from its disclosure or use.

State laws under the Uniform Trade Secrets Act (UTSA) use essentially identical standards. The critical requirement is that the owner must have taken reasonable measures to maintain secrecy — courts have denied trade secret status to companies that failed to implement basic access controls, failed to require NDAs with contractors, or freely circulated supposedly secret information internally without restriction.

Common categories that qualify include: customer lists compiled through substantial effort; proprietary software source code and algorithms; pricing models not publicly available; manufacturing processes providing competitive advantage; clinical trial data; and strategic business plans. Information that generally does not qualify: general industry knowledge; skills known throughout a trade; information easily reverse-engineered from publicly available products; and information the company fails to protect internally. The contract can call anything 'Confidential Information,' but that label alone does not create trade secret status — statutory requirements must be independently satisfied.

What is the DTSA whistleblower immunity and must it be in my employment agreements?

Under 18 U.S.C. § 1833(b), an individual is immune from federal and state trade secret liability when disclosing a trade secret: (1) in confidence to a federal, state, or local government official, or to an attorney, solely for the purpose of reporting or investigating a suspected legal violation; or (2) in a complaint or other document filed in a lawsuit, provided it is filed under seal.

The DTSA requires employers to provide notice of this immunity in any agreement with an employee or contractor that governs the use of trade secrets or other confidential information. This can be done by including the statutory notice directly in the agreement or by cross-referencing a policy document that contains the notice.

The consequence of omission is financially significant: if an employer fails to include the notice, it cannot recover exemplary damages (up to 2x actual damages) or attorney fees in any subsequent DTSA action against that employee or contractor — even if the misappropriation was willful and malicious. Every employment and contractor confidentiality agreement drafted before or without awareness of the DTSA should be audited and updated to include this notice. This is not optional and not merely best practice.

Can a confidentiality clause prevent me from reporting a securities violation to the SEC?

No. Under Section 21F of the Securities Exchange Act (15 U.S.C. § 78u-6), added by the Dodd-Frank Act, it is unlawful for any person to take action to impede an individual from communicating with the SEC about a possible securities law violation, including through the use of confidentiality agreements. SEC Rule 21F-17 codifies this prohibition and specifically prohibits any agreement that requires an employee to get prior approval before reporting to the SEC, or that prohibits SEC reporting entirely.

The SEC has brought multiple enforcement actions against companies for using confidentiality provisions that chilled employee SEC reporting — including cases where the agreements did not explicitly prohibit SEC reporting but were drafted in a way that a reasonable employee would believe they could not report. Civil monetary penalties in these cases have been substantial.

Any confidentiality clause in an employment agreement for a public company, financial institution, or securities industry participant should explicitly state that the employee retains the right to report potential violations to the SEC and other regulatory agencies, without prior notice to the employer. The same principle extends to CFTC whistleblower reporting under Dodd-Frank § 748 and other federal agency whistleblower programs.

How long should a confidentiality clause last?

Duration depends on the type of information and the nature of the relationship. For general confidential business information — financial data, business plans, pricing, client lists — a finite term of 3-5 years after contract termination is commercially standard in most services and consulting agreements. For genuine trade secrets, indefinite protection is appropriate and consistent with the DTSA and state trade secret statutes, which protect trade secrets for as long as they retain their secret character and economic value.

Industry norms vary: technology and software agreements often specify 3-5 years for general confidential information; M&A and financial due diligence NDAs often run 2-3 years; pharmaceutical agreements dealing with drug development data may run perpetually; consulting agreements commonly use 3 years. Employment agreements frequently carve out trade secrets for perpetual protection while giving finite terms to other confidential information.

Perpetual confidentiality obligations for all information — not just trade secrets — are overbroad, practically unmanageable over a career, and should be resisted. Always verify that the confidentiality clause duration is consistent with the survival clause's language — inconsistencies between these two provisions are a frequent source of disputes.

What is a residuals clause and do I need one?

A residuals clause permits a receiving party to use information retained in the unaided memory of its personnel — concepts, skills, methodologies, general knowledge — even after confidentiality obligations apply, provided the information was not intentionally memorized for subsequent use. It distinguishes between specific confidential data (which remains protected) and general professional knowledge legitimately internalized during an engagement.

Knowledge workers — consultants, developers, designers, advisors — who will be exposed to a client's confidential technical or business methodologies should request a residuals clause. Without one, a confidentiality clause could theoretically restrict the use of professional skills developed or reinforced during a client engagement. This restriction is commercially unreasonable and unenforceable in many jurisdictions (particularly California), but establishing that requires litigation.

The compromise position most disclosing parties will accept: a residuals clause limited to information retained in unaided memory (no documents or copies), excluding information qualifying as trade secrets, and excluding information deliberately memorized for subsequent use. This addresses the disclosing party's core concern — protection of specific proprietary data and trade secrets — while preserving the receiving party's professional mobility.

What are the four standard exclusions from confidential information?

The four standard exclusions that should appear in every confidentiality clause are: (1) information that is or becomes publicly available through no fault of the receiving party; (2) information already in the receiving party's possession before the disclosure, as evidenced by written records predating the disclosure; (3) information rightfully received from a third party without restriction on its disclosure or use; and (4) information independently developed by the receiving party without reference to or use of the disclosing party's confidential information.

These exclusions are commercially reasonable limitations that reflect legal reality — courts generally will not enforce confidentiality obligations for genuinely public, previously known, or independently created information. The key qualifiers matter: the public domain exclusion requires the information became public through no act of the receiving party; the prior possession exclusion requires written proof (not mere assertion); the third-party receipt exclusion requires the third party to have shared without restriction; and the independent development exclusion requires no reference to the discloser's information.

Their absence from a contract is a significant red flag. The independent development exclusion is particularly important for knowledge workers and technology firms that frequently develop similar solutions for multiple clients — without it, any similar work could theoretically be challenged as misappropriation.

Can I be required to destroy all documents with confidential information after a contract ends?

Contracts routinely require return or destruction of confidential information upon termination, but this obligation has practical and legal limits. Well-drafted return-and-destruction clauses include exceptions for: documents required to be retained by applicable law or regulation (tax records, regulatory filings, employment records, litigation hold materials); information embedded in deliverables already returned to the disclosing party; backup copies retained in the ordinary course of business until their normally scheduled rotation; and information needed to defend against potential legal claims.

If a return-and-destruction clause lacks these exceptions, negotiate them before signing — compliance with an unqualified destruction requirement can itself create legal compliance problems. A company that destroys financial records to comply with a confidentiality clause may face separate legal liability for the destruction of those records.

For electronic data specifically, push for 'commercially reasonable efforts to purge' language rather than an absolute destruction requirement, with an explicit exception for backup systems through their next scheduled rotation. Require a reasonable timeline (30-60 days) rather than 'immediately' for destruction, and ensure the certification requirement is limited to actual active-storage destruction rather than certifying the impossibility of all residual electronic copies.

What can happen if I breach a confidentiality clause?

Breach of a confidentiality clause can result in multiple forms of liability that compound quickly. Contractual remedies include money damages (compensating the disclosing party for actual losses, including lost profits, remediation costs, and reputational harm); liquidated damages if specified in the contract; and — most immediately — preliminary injunctive relief.

Most confidentiality clauses contain a provision allowing the disclosing party to seek a temporary restraining order (TRO) within days of discovering the breach, based on the receiving party's pre-signed acknowledgment that monetary damages are inadequate. Courts can issue TROs within 24-72 hours of a filing, before you have an opportunity to be heard.

If the information qualifies as a trade secret under the DTSA, additional remedies include unjust enrichment damages, exemplary damages up to twice actual damages for willful and malicious misappropriation, and attorney fees. Criminal liability under 18 U.S.C. § 1832 is possible for willful trade secret theft for economic benefit. For breaches involving personal data, regulatory fines and class action exposure may be separately triggered. The practical message: a confidentiality breach is not simply a contract dispute — it can quickly become a multi-front legal crisis.

Is a confidentiality clause enforceable if it restricts my professional knowledge and skills?

Confidentiality clauses that purport to restrict a person's use of professional knowledge, skills, and general experience gained during an engagement — as distinct from protecting specific confidential data — are de facto non-competes that most courts will scrutinize closely or refuse to enforce.

California Business and Professions Code Section 16600 broadly invalidates such restrictions for California-based workers — the California Supreme Court has consistently applied this rule to provisions packaged as confidentiality clauses that functionally restrict professional mobility. Other states apply varying levels of scrutiny depending on how broadly the restriction is drawn and whether it is supported by adequate consideration.

A clause that says 'you cannot use knowledge, skill, or experience gained in performing services for us in any other engagement' goes far beyond legitimate confidentiality protection. Courts distinguish between: (1) restrictions on disclosing or using specific confidential data (legitimate and enforceable); and (2) restrictions on applying professional knowledge and skills developed during an engagement (a non-compete requiring separate justification and limitations). If you see this language, flag it before signing and insist on replacing it with a standard residuals clause.

What is the 'inevitable disclosure' doctrine and how does it affect confidentiality obligations?

The inevitable disclosure doctrine is a legal theory that allows a court to restrict a person's employment based on the conclusion that they would inevitably disclose their former employer's trade secrets in their new role — even without proof of actual misappropriation. The landmark case is PepsiCo, Inc. v. Redmond, 54 F.3d 1262 (7th Cir. 1995), in which the Seventh Circuit upheld an injunction preventing a senior PepsiCo executive from working for a competitor, finding that the similarity of his new responsibilities made trade secret disclosure inevitable.

The doctrine has been adopted in some jurisdictions (particularly in the Midwest and South) and rejected in others. California expressly rejects inevitable disclosure as inconsistent with Business and Professions Code Section 16600. New York applies it in limited circumstances. The doctrine's significance for confidentiality clause purposes: even if a confidentiality clause contains all the right language and exceptions, courts can in some jurisdictions impose additional restrictions based on what a person 'inevitably' knows — which goes beyond the four corners of the contract.

For employees accepting new jobs with competitors, the inevitable disclosure risk is highest when the new role is substantially similar to the former role and involves the same markets, customers, or technologies. Employees in this position should consult with employment counsel before accepting the new role, regardless of whether they have signed a non-compete.

If I receive a subpoena or court order for confidential information, what should I do?

Under the standard legal process carve-out in confidentiality clauses, you must: (1) give the disclosing party prompt written notice of the compelled disclosure requirement, to the extent you are legally permitted to do so; (2) cooperate with the disclosing party if it seeks a protective order or other relief to prevent or limit the disclosure; and (3) disclose only the minimum amount legally required.

Before disclosing confidential information under legal compulsion, consult with legal counsel immediately. The disclosing party's right to seek a protective order is meaningful — courts often grant confidential treatment or in camera review for genuinely sensitive commercial information in litigation. Giving adequate notice is the key step that preserves the disclosing party's ability to protect its information.

In some circumstances — particularly government investigations under seal, grand jury subpoenas, or national security-related demands — you may be legally prohibited from notifying the disclosing party of the subpoena. In that case, the notice obligation is legally excused, but you should still limit disclosure to the minimum legally required and document the legal basis for your inability to give notice. Provide notice to the disclosing party as soon as the legal prohibition on notification lapses.

Does the governing law clause matter for a confidentiality provision?

Governing law significantly affects confidentiality clause enforceability, particularly for provisions that border on non-compete territory or restrict professional mobility. States vary widely in their enforcement postures.

California broadly restricts confidentiality provisions that function as restraints on professional mobility under Business and Professions Code § 16600. Texas and Florida enforce commercial confidentiality agreements broadly with strong injunctive relief traditions and clear statutory frameworks. Minnesota effectively banned non-competes in 2023 and applies scrutiny to broadly drawn confidentiality provisions. Colorado significantly tightened its restrictive covenant framework in 2022. Delaware is the preferred governing law for commercial B2B agreements because its courts enforce provisions with strong fidelity to written text and commercial sophistication.

The governing law choice also determines whether the UTSA or common law applies to trade secret claims — New York still uses common law; 48 states have adopted UTSA frameworks. When a contract specifies a governing law that is unfavorable to your interests, courts in your home state may apply local law if enforcement would violate local public policy — but establishing that exception requires litigation. Negotiating a more favorable governing law is far less expensive than litigating public policy exceptions.

What should I do to comply with a confidentiality clause after signing?

Operational compliance with confidentiality obligations requires active procedures, not passive avoidance. Key practices: (1) document what confidential information you received — what it was, when you received it, from whom, and for what purpose; (2) restrict internal access to need-to-know personnel and document who has access; (3) obtain written confidentiality agreements from all contractors who will have access before sharing any information; (4) avoid forwarding confidential materials to personal email accounts or unauthorized systems; (5) maintain separation between confidential information received from different clients in competitive industries; (6) document independent development activities that might later be challenged as misappropriation; (7) track your return-and-destruction obligations so you can fulfill them on termination; and (8) for employment agreements, ensure you have received and understand the DTSA § 1833(b) immunity notice.

These records are also your evidence in any dispute about whether you complied. A well-maintained confidentiality compliance log — documenting what you received, how you used it, who had access, and when you destroyed it — can be dispositive in a misappropriation claim. The best-negotiated confidentiality clause provides no protection if internal compliance procedures do not support it.

Related Guides