Confidentiality Clauses in Contracts: What They Mean, Red Flags & How to Negotiate
Confidentiality clauses appear in nearly every commercial contract — but their scope, duration, and mutual vs. one-way structure vary enormously. Signing without understanding what you have agreed to can restrict your professional freedom for years.
General information only · Not legal advice · Results in ~2 minutes
Not legal advice. This guide provides general educational information about confidentiality clauses and is not a substitute for legal advice tailored to your specific situation, jurisdiction, or contract. Always consult a licensed attorney before signing, drafting, or relying on any contract provision.
Confidentiality clauses are embedded in almost every commercial contract — services agreements, consulting engagements, employment offers, vendor contracts, partnership agreements, and software licenses. Yet most people sign them without closely reading what they actually restrict: not just what they cannot tell others, but what they cannot do with information they receive; how long they are bound; whether their own information is protected; and what consequences follow from a breach.
This guide covers 15 topic areas across the full confidentiality landscape: what confidentiality clauses are and how they differ from standalone NDAs; the definition of confidential information and standard exclusions; mutual vs. one-way obligations; duration and survival provisions; permitted disclosures; legal process carve-outs; residuals clauses; return and destruction obligations; remedies for breach; use restrictions; eight specific red flags; industry-specific considerations; state-by-state enforcement differences; and concrete negotiation strategies. Each section includes actual contract language, practical analysis, and specific action steps.
The FAQ section at the bottom answers the 12 most common questions about confidentiality clauses in plain English, including structured FAQPage schema markup for search visibility.
Perpetual one-way confidentiality that restricts your professional knowledge and skills — a de facto non-compete in confidentiality language.
Mutual confidentiality with a 3-5 year term, four standard exclusions, a residuals clause, and a legal process carve-out with notice obligations.
Mutual structure first — if you are sharing valuable information, your confidentiality must be protected by the same clause that protects theirs.
What a Confidentiality Clause Is — and How It Differs from an NDA
Common contract language
"Each party agrees to keep confidential all Confidential Information received from the other party and to use such Confidential Information solely for the purposes of performing its obligations under this Agreement. Neither party shall disclose Confidential Information to any third party without the prior written consent of the disclosing party."
A confidentiality clause is a provision embedded within a broader contract — a service agreement, consulting contract, employment agreement, vendor contract, or software license — that restricts one or both parties from disclosing certain information. It is not a standalone document; it is one section of a larger agreement that also covers deliverables, payment, intellectual property, indemnification, and other commercial terms.
A standalone Non-Disclosure Agreement (NDA) is a contract whose sole purpose is confidentiality. When parties sign a standalone NDA before sharing sensitive information — during due diligence, in pre-contract negotiations, before a business partnership — confidentiality is the entire bargain. NDAs are often signed before any other contractual relationship exists.
The practical difference matters because the confidentiality clause and the NDA govern different phases and different risks. A standalone NDA covers what is shared in exploratory conversations before a deal is struck. The confidentiality clause in your services contract covers what is shared during performance — client data, trade secrets, business processes, financial information, and proprietary systems you encounter while doing the work.
When a broader contract contains a confidentiality clause, that clause typically supersedes any prior standalone NDA between the same parties for information shared after the contract date. If you signed an NDA during sales discussions and then a services agreement with its own confidentiality clause, the services agreement's clause governs going forward — and it may be narrower or broader than the original NDA. This substitution often goes unnoticed.
The clause above is a standard mutual confidentiality provision — both parties have obligations to the other. It does three things: (1) it defines a duty to keep the other party's confidential information secret; (2) it restricts the use of that information to the contractual purpose (the "use restriction"); and (3) it prohibits disclosure to third parties without consent. Understanding each of these three obligations separately is the starting point for any confidentiality clause review.
What to do
When you encounter a confidentiality clause in a services or vendor contract, read it alongside any standalone NDA already in place between the parties. Check whether the new contract supersedes the old NDA — most integration clauses will make it control. Also identify whether the clause is mutual (both parties have obligations) or one-way (only you have obligations). One-way confidentiality provisions in favor of the other party are common in standard-form client contracts and should be flagged for review.
Defining Confidential Information: What the Clause Actually Covers
Common contract language
"'Confidential Information' means any and all information disclosed by one party to the other, whether orally, in writing, electronically, or by any other means, that is designated as confidential or that reasonably should be understood to be confidential given the nature of the information and the circumstances of disclosure, including without limitation business plans, financial data, customer lists, pricing information, technical specifications, source code, proprietary processes, and trade secrets."
The definition of "Confidential Information" is the most consequential provision in any confidentiality clause. It determines the scope of everything that follows — your duty to maintain secrecy, your use restrictions, your disclosure prohibitions, and your return or destruction obligations. A broad definition creates sweeping obligations; a narrow definition may fail to protect what actually matters.
Marked or Designated Confidential: Some definitions require confidential information to be explicitly marked — stamped "CONFIDENTIAL" on documents, verbally designated at the time of oral disclosure and confirmed in writing within a specified period. This approach benefits the disclosing party by creating clarity but is often impractical for fast-moving business relationships where not every sensitive conversation is formally marked. If you are the party receiving confidential information, a marking requirement limits your obligations and is generally preferable.
Reasonableness Standard: The clause above includes a "reasonably should be understood to be confidential" standard — this is far broader than a marking requirement and creates obligations for any information that a reasonable person would recognize as sensitive. Business strategy discussions, pricing conversations, client lists — even if never labeled confidential — are covered under this standard. Courts have consistently enforced this type of expansive definition against the receiving party.
Catch-All Language: Phrases like "including without limitation" or "including but not limited to" followed by an illustrative list signal that the definition is not exhaustive — the listed categories are examples, not boundaries. Any commercially sensitive information that falls within the general definition, even if not specifically listed, is covered.
Information Categories: The categories listed in the clause above — business plans, financial data, customer lists, pricing, technical specifications, source code, proprietary processes, trade secrets — represent the full spectrum of commercially sensitive business information. Each category raises different protection concerns. Customer lists and pricing information are particularly sensitive in competitive industries. Source code carries intellectual property value. Trade secrets receive separate legal protection under the Defend Trade Secrets Act (DTSA) and state Uniform Trade Secrets Act (UTSA) adoptions, independently of the contract.
Oral Disclosures: A definition that covers oral disclosures creates practical challenges for the receiving party — every conversation could potentially be subject to confidentiality obligations, and there is no written record of what was shared. If you are the receiving party, try to limit oral disclosures to those that are confirmed in writing within a short period (15-30 days) to be designated as confidential.
What to do
As the receiving party, push for a definition that requires either written marking or verbal designation followed by written confirmation within 30 days. As the disclosing party, ensure the definition includes the reasonableness standard to capture sensitive information shared informally. In both cases, verify that the categories listed reflect the actual information that will be shared under the contract — over-inclusive definitions create unnecessary compliance obligations; under-inclusive definitions leave your most valuable information unprotected.
Standard Exclusions: What Is Not Confidential
Common contract language
"Confidential Information shall not include information that: (a) is or becomes generally available to the public through no act or omission of the receiving party; (b) was in the receiving party's possession before disclosure by the disclosing party, as demonstrated by written records predating the disclosure; (c) is rightfully received from a third party without restriction; or (d) is independently developed by the receiving party without reference to or use of the disclosing party's Confidential Information."
Standard exclusions carve out categories of information from confidentiality protection. These exclusions exist because applying confidentiality obligations to publicly available, independently developed, or previously known information would be commercially unreasonable and legally unenforceable in most jurisdictions. The four exclusions in the clause above are the industry-standard set, and their absence from a confidentiality clause is a red flag.
Public Domain / Publicly Available: Information that is genuinely available to the general public — published in industry publications, announced in press releases, filed in public records, or otherwise accessible without breach of confidentiality — cannot be protected by contract. The critical qualifier is "through no act or omission of the receiving party." If the receiving party is the one who disclosed the information publicly (in breach of the clause), the public domain exclusion does not protect them from liability for the original unauthorized disclosure.
Prior Possession: If the receiving party already had the information before it was disclosed by the disclosing party, there is no new confidential disclosure to protect. Courts require written proof of prior possession — internal records, documents with timestamps, prior disclosures — rather than mere assertion. The "demonstrated by written records" qualifier is standard and appropriate; verbal claims of prior knowledge are insufficient.
Rightful Third-Party Receipt: If a third party lawfully and without restriction shares information that happens to overlap with what you received under the contract, you are free to use that third-party information without triggering your confidentiality obligations. The "without restriction" qualifier is essential — if the third party itself received the information under a confidentiality agreement, the exclusion does not apply.
Independent Development: You may independently develop the same ideas, processes, or solutions without violating confidentiality, provided you can demonstrate that the development occurred without reference to the disclosing party's information. This is the most litigated of the four exclusions — when a recipient happens to develop something similar to the disclosing party's trade secret, the disclosing party will frequently claim misappropriation and contest the independent development defense. Maintaining separate development logs, records, and personnel segregation is essential to preserve this defense.
A Fifth Exclusion to Consider: Required legal disclosure — if you are compelled by law, court order, or regulatory subpoena to disclose confidential information, you should not be in breach of the confidentiality clause. This exclusion is addressed separately in Section 07 on carve-outs, but its absence from the exclusion list itself (rather than appearing only as a procedural carve-out) is worth noting.
What to do
Verify that all four standard exclusions are present. If any are missing, add them before signing. Pay particular attention to the independent development exclusion — knowledge workers (developers, consultants, designers) frequently develop similar solutions for multiple clients, and without this exclusion, anything similar to a client's confidential information could be claimed as a misappropriation. Also check whether the exclusions require written proof or merely allow verbal assertion — written documentation requirements are reasonable and provide both parties with evidentiary certainty.
Mutual vs. One-Way Confidentiality Obligations
Common contract language
"Receiving Party agrees to hold in strict confidence all Confidential Information of Disclosing Party and shall not, without the prior written consent of Disclosing Party, disclose any Confidential Information to any third party or use any Confidential Information for any purpose other than the evaluation and performance of the Agreement."
One of the most significant structural questions in any confidentiality clause is directionality: does only one party have obligations, or do both? The clause above is drafted in one-directional terms — "Receiving Party" and "Disclosing Party" as defined roles, with only the Receiving Party bearing obligations. This structure is appropriate in some contexts and problematic in others.
When One-Way Confidentiality Is Appropriate: One-way confidentiality makes sense when information flows predominantly in one direction. If you are a service provider who will be given access to a client's customer database, internal systems, and business plans to complete a project, but you will not be sharing anything confidential from your own business, one-way confidentiality in the client's favor is commercially reasonable. Similarly, employment agreements appropriately impose one-way confidentiality on the employee, since the employer is sharing its business information.
When One-Way Confidentiality Disadvantages You: If you are sharing your own proprietary methodologies, pricing structures, proposal documents, or trade secrets with the other party — which is common in consulting, software development, and professional services — and the confidentiality clause only protects the client's information, your confidential information is unprotected. A client can use your pricing intelligence to pit competitors against each other, share your proprietary methodologies with internal teams, or repurpose your proposals without contractual restriction.
The Mutual Structure: The clause in Section 01 is the mutual version — "each party agrees to keep confidential all Confidential Information received from the other party." This is the standard approach for balanced commercial relationships between parties that will share information in both directions. Enterprise-to-vendor contracts frequently begin as one-way clauses protecting only the enterprise, then are amended to mutual upon negotiation.
Detecting One-Way Clauses: One-way confidentiality is often apparent from the structure of defined terms. If the agreement defines specific "Disclosing Party" and "Receiving Party" roles with fixed assignments (rather than the reciprocal "each party / other party" language), it is likely one-directional. Read the defined terms section carefully before analyzing the substantive obligations.
The Practical Stakes: A technology consultant who shares proprietary development methodologies, pricing models, and tool configurations with a client under a one-way confidentiality clause — protecting only the client — has no recourse if the client shares those methodologies with competitors, uses them internally without compensation, or reverse-engineers the consultant's pricing to negotiate lower rates. The one-way clause silently strips the consultant of IP protection they assumed they had.
What to do
If you are sharing anything of confidential value with the other party — methodologies, pricing, proposals, tool configurations, business strategies — insist on mutual confidentiality. The simplest approach is to replace 'Disclosing Party' and 'Receiving Party' role definitions with reciprocal language: 'each party agrees to keep confidential all Confidential Information received from the other party.' If the other side refuses mutual confidentiality, ask why. A refusal often signals an intent to use your information for purposes beyond the stated contractual purpose.
Have a contract with a confidentiality clause to review?
Get an instant AI-powered analysis that flags overbroad definitions, one-way obligations, missing exclusions, perpetual duration, and knowledge restrictions — with plain-English guidance on what to negotiate. Just $4.99.
Review My Contract — $4.99Duration and Survival: How Long Confidentiality Obligations Last
Common contract language
"The confidentiality obligations set forth in this Section shall survive the termination or expiration of this Agreement and shall remain in effect for a period of five (5) years following such termination or expiration. Notwithstanding the foregoing, confidentiality obligations with respect to trade secrets shall survive indefinitely."
Duration is one of the most actively negotiated confidentiality terms — and the one where the discrepancy between what both parties want is often largest. The disclosing party wants long-lived or perpetual protection; the receiving party wants a finite, predictable end date for their obligations.
Finite vs. Perpetual Duration: A time-limited confidentiality obligation (e.g., 3-5 years after termination) is commercially standard in most services and consulting relationships. A perpetual confidentiality obligation — one that never expires — is aggressive and difficult to manage over a business lifetime. The receiving party has no way to know with certainty whether information that is 10 years old has entered the public domain without ongoing monitoring.
The Trade Secret Carve-Out: The clause above uses a structure common in technology and professional services contracts: a fixed term (5 years) for general confidential information, with perpetual protection for trade secrets. This bifurcation is legally sound — the Defend Trade Secrets Act (DTSA) and state UTSA adoptions protect trade secrets independently of contract duration, so a perpetual contractual obligation for trade secrets aligns with the legal reality. The practical challenge is that "trade secrets" are not always precisely defined — parties frequently dispute whether specific information qualifies.
Industry Norms by Sector: Duration norms vary significantly by industry. Technology and software agreements often specify 3-5 years for general confidential information. Employment agreements frequently run perpetually for trade secrets and 2-3 years for other confidential information. M&A and financial due diligence NDAs often run 2-3 years. Healthcare and pharmaceutical agreements dealing with drug development information may run perpetually given the long product development timelines. Consulting agreements commonly use 3 years.
Why Duration Matters for Recipients: As time passes, information loses its confidential character — markets shift, technologies change, personnel turn over. A confidentiality obligation that runs perpetually for all information, without a trade secret carve-out, means you can never freely discuss the substance of a project without potentially breaching a contract from a decade ago. This creates real compliance risk for knowledge workers who move between clients, employers, and projects.
The Survival Clause Interaction: Confidentiality obligations typically appear in the contract's survival clause, which lists provisions that remain enforceable after the agreement ends. If confidentiality is not listed in the survival clause, a party can argue that confidentiality obligations terminated with the contract. Always verify that confidentiality appears in the survival clause, and verify that the duration specified in the confidentiality clause is consistent with the survival clause's language. Conflicts between these provisions create ambiguity that courts will have to resolve.
What to do
As the receiving party, push for a finite confidentiality duration — 3-5 years post-termination for general confidential information — with a carve-out for trade secrets that aligns with the DTSA/UTSA statutory protections. Avoid perpetual obligations for all confidential information; they are overbroad and practically unmanageable. As the disclosing party, ensure your most sensitive business information is characterized as trade secrets (meeting the DTSA/UTSA requirements of independent economic value and reasonable secrecy measures) to preserve indefinite protection for information that genuinely warrants it.
Permitted Disclosures: Who Can Receive Confidential Information Internally
Common contract language
"Receiving Party may disclose Confidential Information only to those of its employees, contractors, and professional advisors who have a need to know such Confidential Information in connection with the performance of this Agreement, provided that such persons are bound by confidentiality obligations no less restrictive than those set forth in this Agreement."
An absolute prohibition on disclosing confidential information to any third party would make most contracts commercially impracticable — no one can perform complex work without involving their own team, subcontractors, legal counsel, or accountants. Permitted disclosure provisions define who, within the receiving party's organization and professional network, may legitimately receive confidential information.
The Need-to-Know Standard: The "need to know" requirement is the universal limiting principle in permitted disclosure provisions. It prevents the receiving party from sharing confidential information throughout their organization for general business purposes — only those whose work for the specific contract requires access are permitted recipients. This standard is commercially reasonable and industry-standard.
Employees and Internal Personnel: The straightforward core of permitted disclosures — your own employees who are working on the contract. The need-to-know standard prevents sharing with departments unrelated to the contract: sharing a client's financial data with your sales team to inform pricing strategy would likely exceed the need-to-know threshold.
Independent Contractors and Subcontractors: Most modern businesses use contractors extensively, and the confidentiality clause must account for this. The provision above covers "contractors" alongside employees. The key protections: (1) the contractors must have a need to know for contract performance purposes; and (2) they must be bound by confidentiality obligations at least as restrictive as those in the main agreement — which requires the receiving party to obtain a written confidentiality agreement with each contractor before disclosure.
Professional Advisors: Legal counsel, accountants, and similar professional advisors have independent professional duties of confidentiality that exist outside the contract. The permitted disclosure provision typically covers professional advisors without requiring a separate written agreement, relying instead on their professional obligations.
Flow-Down Requirements: The requirement that permitted recipients be "bound by confidentiality obligations no less restrictive than those set forth in this Agreement" is the flow-down requirement. It prevents the receiving party from creating a confidentiality arbitrage — sharing information with a third party who has weaker obligations, effectively laundering the confidential information into less-protected hands. The receiving party must ensure its contractors are actually bound to these obligations in writing before disclosure.
Parent, Subsidiary, and Affiliate Access: Larger organizations often need confidential information to flow to affiliated entities — a parent company providing compliance oversight, a subsidiary doing implementation work. If affiliates are not covered by the permitted disclosure provision, disclosing to them is technically a breach. Enterprise clients frequently negotiate to include "affiliates" in the permitted recipient list; smaller companies signing agreements with large enterprises should read this carefully to understand who they are actually sharing information with.
What to do
Verify that the permitted disclosure provision covers the types of people you actually need to share information with: employees, contractors, and professional advisors. If you use subcontractors to perform work, ensure the clause allows disclosure to them with the flow-down requirement. If you are the disclosing party, verify that the flow-down requirement is present — without it, the receiving party can share your information with contractors who have no obligation to protect it. Track which contractors have signed confidentiality agreements covering your client's information; this is the most frequently dropped ball in contractor-heavy service businesses.
Required Carve-Outs: Legal Process, Regulatory Compliance, and Professional Advisors
Common contract language
"Notwithstanding the foregoing, Receiving Party may disclose Confidential Information to the extent required by applicable law, regulation, or court order, provided that Receiving Party: (i) provides Disclosing Party with prompt written notice of such requirement, to the extent legally permitted, sufficient to allow Disclosing Party to seek a protective order; (ii) cooperates with Disclosing Party in seeking such protective order; and (iii) discloses only that portion of Confidential Information that is legally required to be disclosed."
Even the most comprehensive confidentiality obligation cannot prevent legally compelled disclosure — courts, regulatory agencies, and law enforcement can compel production of information regardless of what contracts say. The legal process carve-out is the mechanism that addresses this reality without putting the receiving party in the impossible position of choosing between contract compliance and legal compliance.
The Three-Step Process: The clause above establishes the industry-standard three-step approach for legally compelled disclosures: (1) prompt notice to the disclosing party before disclosure occurs, so they can attempt to obtain a protective order from the court or agency; (2) cooperation with the disclosing party's efforts to prevent or limit disclosure; and (3) disclosure limited to the minimum legally required. Each element matters.
Prompt Notice Requirement: The notice requirement protects the disclosing party by giving them the opportunity to challenge the compelled disclosure — by moving for a protective order, challenging the subpoena's scope, or seeking confidential treatment in regulatory proceedings. If the receiving party is legally prohibited from giving notice (which sometimes occurs with certain government investigations), the clause typically carves out that notification requirement.
Minimum Disclosure Principle: Requiring disclosure of only the legally required minimum prevents the receiving party from treating a broad subpoena as a license to share everything. Courts have upheld this principle — a subpoena for documents related to a specific project does not authorize disclosure of all confidential information received under the contract.
Regulatory Disclosure: For regulated industries — financial services, healthcare, government contracting — regulatory disclosure obligations extend beyond court orders. A securities firm receiving a confidential business plan must share it with regulators investigating potential fraud, regardless of a confidentiality agreement. Healthcare organizations face mandatory reporting requirements under HIPAA, state health laws, and public health statutes that can compel disclosure of otherwise confidential health information.
Self-Regulatory Organization (SRO) Carve-Outs: In financial services, FINRA, the SEC, and other self-regulatory organizations have examination authority that can require access to confidential client information. Contracts in this sector should explicitly carve out disclosure to SROs in addition to general regulatory bodies.
Professional Advisor Carve-Out: As discussed in Section 06, professional advisors — attorneys, accountants, auditors — have independent professional confidentiality duties. The permitted disclosure provision typically covers them, but a separate carve-out addressing their professional obligations (independent of the contract) provides additional clarity.
What to do
Verify that the legal process carve-out includes all three elements: notice (to the extent legally permitted), cooperation with efforts to limit disclosure, and minimum necessary disclosure. For regulated businesses, add explicit carve-outs for disclosures to applicable regulatory bodies and self-regulatory organizations — these are not always covered by a generic 'required by law' carve-out. If you operate in a jurisdiction or industry with specific mandatory reporting requirements (healthcare, financial services, environmental), enumerate them explicitly rather than relying on catch-all language.
Residuals Clauses: What They Are and Why Knowledge Workers Must Understand Them
Common contract language
"Notwithstanding any other provision of this Agreement, Receiving Party's personnel shall not be restricted from using Residual Information in the conduct of Receiving Party's business. 'Residual Information' means information in intangible form retained in the unaided memories of Receiving Party's personnel who had access to Confidential Information, provided that such personnel have not intentionally memorized the Confidential Information for the purpose of using it subsequent to this Agreement."
The residuals clause is one of the most commercially significant — and most frequently misunderstood — provisions in confidentiality agreements involving knowledge workers, technology professionals, and consultants. It draws a line between what a person can do based on knowledge they have legitimately internalized and what they are prohibited from using because they retained a specific document or data set.
The Core Concept: The residuals clause permits a person who received confidential information to use what they have retained in memory — concepts, skills, general knowledge, professional methodologies — even after confidentiality obligations end or apply. What it does not permit is the use of specific documents, files, or data sets. A software developer who worked on a client's system can continue to use general programming techniques they learned during the engagement; they cannot take a copy of the client's proprietary algorithm and use it elsewhere.
Why It Matters for Knowledge Workers: Without a residuals clause, a consultant or contractor who was exposed to a client's confidential technical methodologies could theoretically be prohibited from ever applying similar problem-solving approaches to future clients. A software developer could be restricted from using coding patterns they learned on one project for any subsequent project. These restrictions would be commercially unworkable — professionals cannot compartmentalize their professional knowledge every time they change clients.
The "Intentional Memorization" Carve-Out: The disqualifying condition in the standard residuals clause is intentional memorization — if personnel deliberately memorize specific trade secrets for the purpose of using them after the agreement ends, the residuals clause does not protect that use. This prevents the residuals clause from becoming a license to study confidential materials for the express purpose of building a copycat product or service.
Large Company vs. Small Company Dynamics: Residuals clauses originated in large technology company-to-company transactions (notably in agreements between major software companies) to address the practical reality that engineers, consultants, and knowledge workers move between companies and carry their professional knowledge with them. They are less commonly found in agreements between individuals and large enterprises — which creates an asymmetry: a large company has a residuals clause in its outbound agreements (protecting its consultants), but its standard service agreement with a small vendor may not include one.
When the Disclosing Party Objects: Disclosing parties often resist residuals clauses, arguing that they weaken confidentiality protection. The compromise position: a residuals clause that is limited to information retained in unaided memory (no written or electronic copies), does not apply to trade secrets (which remain protected indefinitely regardless of how the information was retained), and excludes information that was specifically memorized for the purpose of subsequent use.
What to do
If you are a knowledge worker — consultant, developer, designer, advisor — who will be exposed to a client's confidential technical or business information, request a residuals clause. The absence of a residuals clause creates theoretical (and sometimes actual) restrictions on applying your professional knowledge after the engagement. If the client refuses a residuals clause entirely, negotiate one that is limited to unaided memory and excludes trade secrets — this addresses the client's core concern while preserving your professional mobility. As the disclosing party evaluating a residuals clause request, distinguish between what you are protecting (specific trade secrets and data) and what you cannot reasonably restrict (general professional skills and knowledge).
Have a contract with a confidentiality clause to review?
Get an instant AI-powered analysis that flags overbroad definitions, one-way obligations, missing exclusions, perpetual duration, and knowledge restrictions — with plain-English guidance on what to negotiate. Just $4.99.
Review My Contract — $4.99Return and Destruction of Confidential Information
Common contract language
"Upon the termination or expiration of this Agreement, or upon the written request of Disclosing Party at any time, Receiving Party shall promptly return or, at Disclosing Party's option, destroy all Confidential Information and all copies, summaries, notes, and reproductions thereof in Receiving Party's possession or control. If destruction is elected, Receiving Party shall provide written certification of such destruction within thirty (30) days."
Return and destruction provisions establish what happens to confidential information after the contractual relationship ends. They exist because the disclosing party has an ongoing interest in preventing confidential information from sitting in a counterparty's files, systems, and backups after there is no longer a business reason for the counterparty to possess it.
Return vs. Destruction: Most modern agreements give the disclosing party a choice between return and destruction, because physical return is often impractical or impossible for electronically stored information. Returning a physical hard drive is straightforward; returning copies of files that were shared via email, cloud platforms, and collaboration tools is rarely achievable without destruction of those copies.
The Scope of the Obligation: "All Confidential Information and all copies, summaries, notes, and reproductions thereof" is broad language that covers not just the original files but derivative materials — notes taken from confidential presentations, summaries prepared for internal use, excerpts incorporated into other documents. This scope is intentional and appropriate from the disclosing party's perspective; it is also extremely difficult to comply with perfectly, particularly in organizations where information has been broadly shared internally.
Electronic Data and Backup Systems: The most practically challenging aspect of return-and-destruction obligations is electronically stored information. Enterprise systems routinely retain backup copies of emails, files, and databases on rolling schedules — deleting a file from active storage may not remove it from backup tapes or cloud backups for months. Well-drafted return-and-destruction provisions acknowledge this reality: "Receiving Party shall use commercially reasonable efforts to purge Confidential Information from its systems, provided that backup copies retained in the normal course of business need not be deleted until the next regularly scheduled backup rotation."
Certification of Destruction: The requirement to certify destruction — in writing, within a specified period — is the disclosing party's only practical confirmation that the obligation has been fulfilled. Without certification, the disclosing party has no way to verify compliance. The certification requirement also creates accountability: signing a false certification is a legal exposure for the receiving party, which incentivizes actual compliance.
Exceptions to Return and Destruction: Some information cannot or should not be destroyed: information required to be retained by law (tax records, regulatory filings, litigation holds); information embedded in deliverables that have already been delivered to the disclosing party; and information that is part of the receiving party's own records of the engagement itself (contracts, invoices, correspondence). These exceptions should be explicitly carved out of the return-and-destruction obligation, rather than left to implication.
What to do
As the receiving party, negotiate to limit return and destruction to active storage — documents, files, and systems actively used — with a practical exception for backup copies retained in the normal course of business through their regularly scheduled rotation. Require the right to retain copies needed for legal compliance, regulatory requirements, and records of your own engagement. As the disclosing party, insist on the certification requirement and a reasonable but specific deadline (30 days is standard). Track which counterparties have been sent your most sensitive information so you can direct return-and-destruction requests appropriately when agreements terminate.
Remedies for Breach: Injunctive Relief, Liquidated Damages, and Indemnification
Common contract language
"Receiving Party acknowledges that any breach or threatened breach of this Section may cause irreparable harm to Disclosing Party for which monetary damages may be an inadequate remedy, and that Disclosing Party shall be entitled to seek injunctive or other equitable relief in any court of competent jurisdiction without the requirement of posting a bond or proving actual damages."
The remedies provisions of a confidentiality clause determine what the disclosing party can do — quickly and effectively — when a breach occurs. Confidentiality breaches are time-sensitive in a way that most contractual breaches are not: once information is disclosed, the harm compounds with each additional dissemination. Monetary damages may be entirely inadequate if the breach is not stopped immediately.
Why Injunctive Relief Is Central: A preliminary injunction or temporary restraining order (TRO) can stop further disclosure within days of being sought, before the information has spread further or been used by competitors. However, courts in most jurisdictions require a plaintiff seeking injunctive relief to prove: (1) likely success on the merits; (2) irreparable harm in the absence of the injunction; (3) the balance of harms favors the injunction; and (4) the injunction serves the public interest. The "irreparable harm" element is where confidentiality clause language becomes critical.
The Stipulated Irreparability: The clause above contains a stipulated acknowledgment by the receiving party that any breach "may cause irreparable harm for which monetary damages may be an inadequate remedy." This contractual stipulation helps the disclosing party satisfy the irreparable harm prong in a TRO or preliminary injunction proceeding. Courts in many jurisdictions will treat this contractual acknowledgment as evidence — though not conclusive proof — of the irreparable harm element.
No Bond Requirement: The clause above also waives the bond requirement. Typically, a party seeking preliminary injunctive relief must post a bond to compensate the opposing party if the injunction turns out to have been wrongly granted. This bond can be a significant financial obstacle, particularly in commercial disputes. The contractual waiver of this requirement eliminates a tactical delay mechanism.
Liquidated Damages: Some confidentiality clauses specify a fixed monetary penalty per breach — for example, "$50,000 per unauthorized disclosure" — rather than relying on proof of actual damages. Liquidated damages clauses are enforceable if the specified amount is a reasonable estimate of actual damages, rather than a penalty. For trade secret disclosures, where actual damages are notoriously difficult to quantify, a well-calibrated liquidated damages provision can be commercially valuable for both parties.
Indemnification for Third-Party Claims: A confidentiality breach can generate third-party liability for the disclosing party — for example, if the disclosed information includes customer data, the resulting regulatory fines, class action liability, and notification costs may be substantial. If the confidentiality clause links to an indemnification provision, the receiving party may be required to indemnify the disclosing party for these downstream consequences of the breach.
DTSA Damages: For trade secrets specifically, the Defend Trade Secrets Act provides a federal cause of action with its own remedies: damages for actual loss, unjust enrichment, and a reasonable royalty; exemplary damages (up to 2x actual damages) for willful and malicious misappropriation; and attorney fees in willful cases. These statutory remedies are available in addition to contractual remedies.
What to do
Verify that the remedies section includes the right to seek injunctive relief without a bond requirement and with the receiving party's stipulation that monetary damages may be inadequate. As the receiving party, read this provision carefully — you are pre-agreeing that any breach can result in immediate court intervention without the disclosing party having to prove actual harm. As the disclosing party, consider adding a liquidated damages provision if your confidential information has a quantifiable value — it removes the burden of proving actual damages in a breach proceeding and establishes clear deterrence.
Use Restrictions: The Obligation Beyond Secrecy
Common contract language
"Receiving Party shall use Confidential Information solely for the purpose of performing its obligations under this Agreement and shall not use Confidential Information for any other purpose, including without limitation for Receiving Party's own competitive advantage, product development, or business strategy."
Confidentiality obligations have two distinct components: the secrecy obligation (don't disclose) and the use restriction (don't use for unauthorized purposes). The use restriction is the one that matters most in sophisticated commercial disputes — and it is the one most commonly overlooked when parties focus only on preventing disclosure.
Why Use Restrictions Matter: A receiving party can technically comply with the secrecy obligation — never telling a third party anything about what they received — while using the information for their own business benefit in ways the disclosing party never intended. A competitor who receives a company's pricing structure during a vendor evaluation and uses that intelligence to undercut the company on future bids has technically kept the information secret while misusing it in a commercially significant way.
The "Contractual Purpose" Standard: Use restrictions typically limit use of confidential information to the specific contractual purpose — "the evaluation and performance of the Agreement." This prevents lateral use for related but distinct purposes: information shared for a software development project cannot be used to build a competing product, even if the development team has legitimately received access.
Competitive Use Prohibitions: The explicit prohibition on using confidential information for competitive purposes is increasingly common in agreements between companies that are or might become competitors. If you are sharing technical information with a vendor who also serves your competitors, the competitive use prohibition prevents them from synthesizing your information into a market advantage.
Internal Use Beyond the Contract: Use restrictions can also prevent internal uses beyond the stated contractual purpose. Information shared for a specific project cannot be used by the receiving party's product team to inform unrelated product development, even if the information is never shared externally.
The Consulting Firm Conflict: Use restrictions create particular complexity for consulting firms and professional services organizations that serve multiple clients in the same industry. A management consulting firm that advises both Company A and Company B in the same market sector faces potential use restriction issues if insights from Company A's engagement inform its advice to Company B. Firms in this position typically address the conflict through information barrier (or "Chinese wall") procedures, but the adequacy of those procedures in satisfying contractual use restrictions has been the subject of significant litigation.
Use vs. Disclosure: The interplay between use restrictions and disclosure obligations creates a spectrum of prohibited conduct. At one end: sharing confidential information with a direct competitor (both use and disclosure violations). In the middle: internally using confidential information to benefit your own business without sharing it externally (use violation only, no disclosure violation). At the other end: sharing anonymized or aggregated information derived from confidential data with third parties (potential disclosure violation even if specific confidential information is not disclosed). Courts analyze each point on this spectrum differently.
What to do
Read the use restriction carefully and consider how your planned activities during the contract relationship relate to the limitation. If you will be working with multiple clients in the same industry, ensure you have information barrier procedures in place before accepting confidential information from any client that competes with another. If you are the disclosing party, explicitly prohibit competitive use and product development use in the restriction — the generic 'solely for the purpose of performing the Agreement' language may not be specific enough to prevent sophisticated misuse of your information.
Red Flags: Confidentiality Provisions That Warrant Immediate Attention
Common contract language
"All information, whether or not designated as confidential, that is disclosed by Client to Vendor in connection with this Agreement or Vendor's services shall be deemed Confidential Information. Vendor's confidentiality obligations shall be perpetual. Vendor may not use any knowledge, skill, or experience gained in performing services for Client in connection with any subsequent engagement for any other party."
The clause above contains three of the most significant red flags that can appear in a confidentiality provision: an unlimited definition of confidential information, a perpetual duration, and a knowledge restriction that effectively bars the receiving party from applying their professional expertise elsewhere. Identifying these red flags before signing is essential.
Red Flag 1 — "All information" definitions without a reasonableness standard: A definition that covers literally all information shared, with no requirement that it be sensitive or business-related, is overbroad and commercially unreasonable. General business conversations, weather discussions at a meeting, information the client mentions from a published news article — under an "all information" definition, all of this is technically confidential. Courts may refuse to enforce unreasonably broad confidentiality definitions or narrow them through judicial construction, but that requires litigation.
Red Flag 2 — Perpetual confidentiality for all information: As discussed in Section 05, perpetual confidentiality is appropriate for genuine trade secrets but not for general business information. A perpetual obligation on all information creates a permanent compliance burden that is practically impossible to manage over the course of a career.
Red Flag 3 — Knowledge and skill restrictions: The most dangerous clause in the example above is the last sentence: a prohibition on using any "knowledge, skill, or experience gained in performing services for Client" with any subsequent party. This is not a confidentiality clause — it is a de facto non-compete disguised in confidentiality language. Courts in many states (particularly California, Minnesota, and others with strong non-compete restrictions) would likely invalidate this provision as an unenforceable restraint of trade, but that determination requires litigation.
Red Flag 4 — No standard exclusions: If the four standard exclusions (public domain, prior possession, third-party receipt, independent development) are absent, the clause is overbroad. Absence of these exclusions is often an oversight rather than intentional drafting, but it creates litigation risk if a dispute arises.
Red Flag 5 — No legal process carve-out: Without the ability to comply with court orders and regulatory requirements without breaching the confidentiality clause, the receiving party faces an impossible conflict between legal obligation and contractual obligation.
Red Flag 6 — Unlimited liquidated damages: Liquidated damages provisions that specify enormous per-breach penalties — "$1,000,000 per unauthorized disclosure" — can be unenforceable as penalties rather than reasonable damage estimates, but they create litigation risk and negotiating leverage for the disclosing party in any breach dispute.
Red Flag 7 — No return-and-destruction exception for legally required retention: A return-and-destruction clause that requires destruction of all confidential information without exception conflicts with legal retention requirements for financial records, tax documents, and regulatory filings. Signing this clause creates a false choice between confidentiality compliance and legal compliance.
Red Flag 8 — One-way obligation in a mutual-information relationship: When both parties will share sensitive business information, a one-way confidentiality clause that only protects the other party's information leaves your information unprotected by contract. This is not always intentional — many standard-form contracts are simply drafted with only one party's interests in mind — but the effect on the uncovered party is the same.
What to do
Before signing any contract with a confidentiality clause, run through these eight red flags: (1) Is the definition of confidential information bounded by a reasonableness standard? (2) Is the duration finite for non-trade secret information? (3) Does the clause restrict professional knowledge rather than specific confidential data? (4) Are the four standard exclusions present? (5) Is there a legal process carve-out? (6) Are any liquidated damages proportionate rather than punitive? (7) Does the return-and-destruction provision allow legally required retention? (8) Is the obligation mutual if you are also sharing sensitive information? Flag any red flag item before signing and address it in negotiation.
Have a contract with a confidentiality clause to review?
Get an instant AI-powered analysis that flags overbroad definitions, one-way obligations, missing exclusions, perpetual duration, and knowledge restrictions — with plain-English guidance on what to negotiate. Just $4.99.
Review My Contract — $4.99Industry-Specific Confidentiality Considerations
Common contract language
"For purposes of this Agreement, Confidential Information shall include, without limitation, all Personal Health Information (PHI) as defined by HIPAA and applicable state health privacy laws, which shall be subject to the additional protections set forth in the Business Associate Agreement attached hereto as Exhibit B."
Confidentiality obligations are shaped by the industry context in which they operate. Regulatory frameworks, industry standards, and the nature of the information shared create different confidentiality requirements and different legal consequences for breach across sectors.
Healthcare and HIPAA: The Health Insurance Portability and Accountability Act (HIPAA) creates federally mandated confidentiality requirements for Protected Health Information (PHI) that operate independently of and alongside any contractual confidentiality obligations. Contracts involving PHI must include a Business Associate Agreement (BAA) in addition to or integrated with the confidentiality clause. The BAA has specific required terms under HIPAA's Business Associate regulations (45 CFR Parts 160 and 164). The contractual confidentiality clause and the BAA must be read together — where they conflict, HIPAA governs. Breach of HIPAA confidentiality obligations carries civil penalties ($100 to $50,000 per violation, up to $1.9 million per violation category per year) and potential criminal liability.
Financial Services: In financial services, confidentiality obligations extend to client financial data, trading strategies, and proprietary analytical models. Regulatory frameworks including Regulation SP (privacy of consumer financial information), Gramm-Leach-Bliley Act (GLBA), and SEC and FINRA rules on information barriers create overlapping confidentiality requirements. Investment managers, broker-dealers, and financial advisors operate under professional obligations to keep client financial information confidential independent of any contractual clause. Contracts involving material non-public information (MNPI) carry additional restrictions — trading on MNPI in breach of a confidentiality agreement is securities fraud, not merely a contract breach.
Technology and SaaS: Technology contracts present the broadest spectrum of confidentiality issues: source code, API documentation, security architecture, user data, proprietary algorithms, and machine learning training data. Source code confidentiality is particularly sensitive — it contains the disclosing party's entire technological investment and, once disclosed, cannot be "un-disclosed." Contracts involving user data bring privacy law overlays: CCPA, GDPR, and state data protection laws impose independent confidentiality obligations for personal data that interact with contractual provisions.
Consulting and Professional Services: Knowledge workers in consulting face unique confidentiality challenges because their professional value is built on the accumulation of industry knowledge across multiple client engagements. A management consultant cannot retain knowledge in separate silos for each client — insights from one engagement inevitably inform advice in others. The residuals clause (Section 08) is particularly important in consulting contracts. Additionally, consulting firms serving competitors must implement information barrier procedures that can withstand scrutiny if a use restriction breach is alleged.
Government Contracting: Federal government contracts involving classified information, Controlled Unclassified Information (CUI), or other sensitive government information are subject to the National Industrial Security Program (NISP), Defense Federal Acquisition Regulation Supplement (DFARS), and specific agency regulations. Confidentiality obligations in government contracts go far beyond commercial standards — violation can result in suspension or debarment from government contracting, criminal liability, and civil False Claims Act exposure.
What to do
Identify which regulatory frameworks apply to the information you will be handling under the contract. For healthcare clients, confirm a BAA is in place before any PHI is shared. For financial services, verify compliance with privacy regulations and information barrier requirements before accepting confidential market-sensitive information. For technology contracts, ensure your confidentiality clause specifically addresses source code (perpetual protection is warranted), user data (privacy law compliance requirements), and security architecture. For government contracts, engage counsel familiar with CUI requirements and DFARS cybersecurity obligations before signing.
State-by-State Enforcement: How Jurisdiction Affects Confidentiality Clauses
Common contract language
"This Agreement shall be governed by and construed in accordance with the laws of the State of Delaware, without regard to its conflict of laws principles. Any dispute arising under or relating to this Agreement shall be resolved in the state or federal courts located in the State of Delaware."
Confidentiality clause enforceability is heavily influenced by the governing law of the contract and where litigation would occur. While federal law (DTSA) establishes a baseline for trade secret protection, state laws vary significantly in their approach to confidentiality obligations, non-compete restrictions packaged as confidentiality clauses, and remedies for breach.
California: California is the most protective state for employees and contractors facing confidentiality obligations. Business and Professions Code Section 16600 broadly prohibits contractual restrictions on the right to engage in a lawful profession, trade, or business. The California Supreme Court's 2024 ruling in Edwards v. Arthur Andersen LLP and subsequent cases have reinforced that any clause restricting a person's professional mobility — including those packaged as confidentiality rather than non-compete provisions — is subject to strict scrutiny. The residuals clause (Section 08) originated partly from California law's restrictions on post-employment knowledge restrictions. Confidentiality clauses in California must be carefully limited to specific confidential data and trade secrets; general knowledge and professional skill restrictions are unenforceable.
Texas: Texas enforces confidentiality agreements broadly in commercial contexts. Trade secret claims under the Texas Uniform Trade Secrets Act (TUTSA, Tex. Civ. Prac. & Rem. Code § 134A) are available alongside contract claims. Texas courts will enforce injunctive relief provisions and have granted TROs in confidentiality breach cases on relatively short timelines. Texas's Covenants Not to Compete Act (Tex. Bus. & Com. Code § 15.50) requires non-competes to be ancillary to an otherwise enforceable agreement and supported by consideration — some courts have analyzed overly broad confidentiality provisions as disguised non-competes subject to this statute.
New York: New York enforces confidentiality agreements in commercial settings but requires clarity in drafting — ambiguous provisions are construed against the drafter. New York courts have a well-developed body of case law on trade secret misappropriation under common law (New York has not adopted the UTSA) and will grant preliminary injunctions in appropriate cases. New York's 2024 Freelance Isn't Free Act expansion strengthened payment protections but did not directly address confidentiality — confidentiality provisions in freelance contracts remain governed by general contract law.
Illinois: Illinois adopted the Illinois Trade Secrets Act (765 ILCS 1065), which preempts common law misappropriation claims but provides trade secret protection consistent with DTSA standards. Illinois courts have been skeptical of confidentiality provisions that operate as de facto non-competes; the Illinois Freedom to Work Act (820 ILCS 90) restricts non-competes and has been applied to provisions using confidentiality language to achieve competitive restraints.
Massachusetts: Massachusetts trade secret law (M.G.L. c. 93, § 42) provides broad protections for trade secrets and unfair competition. Massachusetts courts actively grant preliminary injunctions in trade secret cases and enforce contractual injunctive relief provisions. The Massachusetts Non-Competition Agreement Act (2018) restricts non-competes for employees but has not been applied to restrict genuinely narrow confidentiality clauses that do not restrain trade.
Florida: Florida has one of the strongest non-compete and trade secret enforcement frameworks in the United States. Florida Statute § 688.001 (Florida Uniform Trade Secrets Act) provides strong trade secret protection. Courts routinely enforce injunctive relief provisions in confidentiality and non-compete agreements, with the burden shifting to the defendant to demonstrate that enforcement is unreasonable. Florida's strong enforcement posture makes it an attractive governing law choice for disclosing parties seeking reliable protection.
Washington: Washington adopted the Uniform Trade Secrets Act (RCW 19.108) and provides DTSA-consistent trade secret protection. Washington's Non-Compete Act (2020) restricts non-competes for employees earning below a threshold and imposes additional requirements on all non-competes. Confidentiality clauses that restrict professional knowledge — as distinct from protecting specific trade secrets — face scrutiny under Washington's restrictive covenant framework.
Colorado: Colorado revised its non-compete statute (C.R.S. § 8-2-113) in 2022 to significantly restrict restrictive covenants. The statute applies a strict test for whether a restrictive covenant (which may include confidentiality clauses that restrain trade) is enforceable: the covenant must be for the protection of legitimate business interests, the restriction must be no greater than necessary, and the harm from enforcement must not outweigh the benefit. Overly broad confidentiality provisions in Colorado employee agreements face significant enforceability challenges.
Georgia: Georgia enforces confidentiality agreements broadly under the Georgia Trade Secrets Act (O.C.G.A. § 10-1-760) and the Georgia Restrictive Covenants Act (O.C.G.A. § 13-8-50), which permits well-defined non-compete and confidentiality restrictions in employment and commercial contexts. Georgia courts apply a "blue pencil" approach — rewriting overbroad provisions rather than invalidating them — which gives disclosing parties some flexibility in enforcement even when original drafting is overreaching.
Minnesota: Minnesota has one of the strongest protections against non-competes and broadly construed confidentiality provisions. Minnesota effectively banned non-competes for employees in 2023. Courts apply strict scrutiny to any post-employment restriction, including confidentiality clauses that in practice restrict professional mobility. Trade secret protection under the Minnesota Uniform Trade Secrets Act (Minn. Stat. § 325C) remains available for genuinely confidential commercial information.
What to do
When evaluating the governing law clause, consider the enforcement posture of the selected state. Disclosing parties often choose Delaware, Texas, or Florida for strong commercial enforcement. Receiving parties in California, Colorado, Minnesota, or Washington have meaningful state law protections against overly broad confidentiality provisions that operate as de facto non-competes. If the governing law is unfavorable, request a change — and consider that your home state's courts may apply local law on grounds of public policy even when a contract specifies a foreign governing law.
How to Negotiate a Confidentiality Clause: Practical Strategies
Common contract language
"The confidentiality obligations set forth herein shall be commercially reasonable in scope and duration and shall not be construed to restrict Receiving Party from using general professional knowledge, skills, and experience gained in the normal course of performing services hereunder."
Confidentiality clauses are negotiable, even in contracts presented as standard or non-negotiable. Most corporate counterparties have internal templates that are drafted with only their interests in mind; negotiated changes are regularly accepted when framed as commercially standard protections rather than one-sided demands. Effective negotiation requires knowing what to prioritize and how to frame each request.
Prioritize the Highest-Impact Terms: In order of typical commercial impact, prioritize: (1) mutual vs. one-way structure; (2) definition of confidential information (marking requirement or reasonableness standard); (3) duration; (4) residuals clause (if you are a knowledge worker); (5) standard exclusions; (6) legal process carve-out. Lower-priority but still important: return-and-destruction exceptions, permitted disclosure scope, and remedies provisions.
Frame Requests as Industry Standard: The most effective negotiating posture is to describe your proposed changes as "commercially standard" or "consistent with market practice" rather than as requests unique to your situation. "My professional advisors have flagged that mutual confidentiality is market standard for services agreements of this type" is more persuasive than "I want to protect my information too."
Use a Redline, Not a Letter: Submit proposed changes as a redlined version of the agreement rather than a letter describing what you want. A redline requires the other party to respond to specific language, which is faster and produces less ambiguity than negotiating in generalities. Provide brief explanatory comments for each significant change so the counterparty's reviewer understands the rationale without needing to ask.
Trade-Offs and Package Negotiations: When a counterparty refuses individual changes, propose a package: "I can accept the broader definition of Confidential Information if we make the obligation mutual and add the standard exclusions." Linking changes creates trades rather than unilateral requests, which is psychologically easier for the other side to accept.
The One-Call Rule: For each significant change you request, identify in advance what you will accept if the counterparty pushes back. Going to two rounds of negotiation on each point signals that your "final position" is never final, which weakens your negotiating credibility. Know your walk-away point before the first call.
When to Accept Standard Language: Not every confidentiality clause needs extensive negotiation. If the contract involves a single, defined project with no ongoing information flow, the financial stakes are modest, the other party is a well-known commercial entity with a strong reputational interest in honoring contracts, and the information you are sharing is genuinely not sensitive, extensive negotiation may not be worth the friction it creates. Reserve your negotiating capital for agreements with significant financial exposure or material confidentiality risk.
After Signing: Operational compliance with confidentiality obligations is as important as the negotiated terms. Implement internal procedures for: logging confidential information received (what, when, from whom, for what purpose); limiting internal circulation to need-to-know personnel; obtaining written confidentiality agreements from contractors before disclosure; tracking return-and-destruction obligations; and documenting independent development activities that might later be challenged as misappropriation.
What to do
Before entering negotiation, identify your three highest-priority changes and your walk-away position on each. Submit changes as a redline rather than a letter. Frame requests as commercially standard. When facing resistance, propose package trades that link related provisions. After the agreement is signed, implement compliance procedures for each operative obligation — tracking what confidential information you received, who had access to it, and how it was ultimately disposed of. The best-negotiated confidentiality clause provides no protection if internal compliance procedures do not support it.
Confidentiality Clause Review Checklist
Use this 14-item checklist when reviewing any contract with a confidentiality provision. Each item corresponds to a term that frequently creates significant compliance obligations or legal exposure when overlooked. Check all items before signing any contract that contains a confidentiality clause.
| Item | Priority | What to Check |
|---|---|---|
| Confidential Information Definition | Required | Is the definition bounded by a reasonableness standard or marking requirement? Does it cover oral disclosures? |
| Standard Exclusions | Required | Are all four standard exclusions present: public domain, prior possession, third-party receipt, independent development? |
| Mutual vs. One-Way Structure | Required | If you are sharing sensitive information, is the obligation mutual? One-way clauses protecting only the other party leave your information unprotected. |
| Duration | Required | Is the confidentiality period finite for general confidential information? Trade secrets may warrant indefinite protection; general business information should not. |
| Legal Process Carve-Out | Required | Can you comply with court orders and regulatory requirements without breaching the clause? Does the carve-out require notice and minimum disclosure? |
| Permitted Disclosures | Required | Are your employees, contractors, and professional advisors covered? Is a flow-down requirement to subcontractors specified? |
| Return and Destruction | Required | Does the clause allow legally required retention? Is the backup system exception present? Is a certification requirement included? |
| Use Restrictions | Required | Does the clause restrict use beyond disclosure? Verify the stated contractual purpose is broad enough to cover all your planned activities. |
| Residuals Clause | Recommended | If you are a knowledge worker who will gain professional exposure to confidential methodologies, is a residuals clause present? |
| Survival Clause Consistency | Required | Is confidentiality listed in the survival clause? Is the survival duration consistent with the confidentiality clause duration? |
| Injunctive Relief Language | Recommended | Does the clause include the standard irreparable harm acknowledgment? Is the no-bond provision present? Read this carefully as the receiving party — it limits your ability to contest emergency court orders. |
| Knowledge/Skill Restrictions | Red Flag | Does the clause purport to restrict your use of professional knowledge and skills gained during the engagement? This is a de facto non-compete. |
| Unlimited Information Definition | Red Flag | Does the clause cover 'all information' without a confidentiality requirement? This is overbroad and likely unenforceable in some jurisdictions. |
| Perpetual Duration for All Information | Red Flag | Does perpetual confidentiality apply to general business information (not just trade secrets)? This is overbroad and difficult to manage. |
State Enforcement at a Glance: Key Jurisdictional Differences
Confidentiality clause enforceability varies significantly by state, particularly where clauses operate as de facto non-competes or restrict professional mobility. The summaries below reflect general statutory and judicial trends and are not legal advice for any specific contract or situation. Consult a licensed attorney for guidance on your particular circumstances.
California
Business and Professions Code Section 16600 broadly prohibits contractual restrictions on the right to engage in a lawful profession, trade, or business. Confidentiality clauses are enforceable when limited to specific trade secrets and confidential data, but provisions that restrict use of professional knowledge, skills, or general experience face significant enforceability challenges. California courts have applied this restriction to provisions drafted as confidentiality clauses that functionally operated as non-competes. The residuals clause concept originated partly from California's restrictions on post-employment knowledge restrictions.
Texas
Texas enforces confidentiality agreements broadly in commercial contexts under the Texas Uniform Trade Secrets Act (TUTSA, Tex. Civ. Prac. & Rem. Code § 134A). Courts regularly grant TROs in trade secret and confidentiality breach cases and enforce injunctive relief provisions. Texas's Covenants Not to Compete Act (Tex. Bus. & Com. Code § 15.50) requires non-competes to be ancillary to an enforceable agreement and supported by consideration — overly broad confidentiality clauses that function as non-competes have been analyzed under this statute in some cases.
New York
New York enforces confidentiality agreements in commercial settings and has a sophisticated body of trade secret law under common law (New York has not adopted UTSA). Courts construe ambiguous provisions against the drafter. New York's Freelance Isn't Free Act expansion (2024) strengthened payment protections for freelancers but did not directly regulate confidentiality clauses in freelance contracts. New York courts will grant preliminary injunctions in appropriate confidentiality breach cases with strong factual records.
Illinois
Illinois adopted the Illinois Trade Secrets Act (765 ILCS 1065), which preempts common law misappropriation claims but provides consistent protection for qualifying trade secrets. Illinois courts have been skeptical of confidentiality clauses that operate as de facto non-competes. The Illinois Freedom to Work Act (820 ILCS 90) restricts non-competes for employees earning below specified thresholds and has been applied to broadly drafted confidentiality provisions in some employment contexts.
Florida
Florida has one of the strongest enforcement frameworks for confidentiality and trade secret protections in the U.S. Florida Statute § 688.001 (Florida Uniform Trade Secrets Act) provides robust trade secret protection. Courts actively enforce injunctive relief provisions in confidentiality cases, with the burden shifting to defendants to show enforcement is unreasonable. Florida's non-compete statute (Fla. Stat. § 542.335) also provides a framework for enforcing post-employment restrictions when supported by a legitimate business interest.
Washington
Washington adopted the Uniform Trade Secrets Act (RCW 19.108) and provides DTSA-consistent trade secret protection. Washington's Non-Compete Act (2020) significantly restricts restrictive covenants for employees earning below a specified threshold and imposes notice, consideration, and geographic limitations on all non-competes. Confidentiality clauses that restrict professional knowledge face scrutiny under this framework. Washington courts examine substance over form — a clause drafted as a confidentiality provision that functions as a non-compete is treated accordingly.
Colorado
Colorado revised its non-compete statute (C.R.S. § 8-2-113) significantly in 2022. The statute now requires that any restrictive covenant — including broadly drafted confidentiality provisions that restrain trade — be supported by adequate consideration, be no broader than necessary to protect a legitimate business interest, and not harm the public interest. Courts apply a strict necessity standard. Overly broad confidentiality provisions in employment and services agreements face meaningful enforceability risk in Colorado post-2022.
Massachusetts
Massachusetts courts actively enforce confidentiality agreements and trade secret protections under M.G.L. c. 93, § 42. Preliminary injunctions are regularly granted in trade secret cases with strong factual records. Massachusetts's Non-Competition Agreement Act (2018) restricts non-competes for employees, requiring garden-leave pay or other consideration, a one-year maximum duration, and geographic/activity limitations — provisions that apply to non-competes but not to narrowly drawn confidentiality clauses that do not restrain trade.
Minnesota
Minnesota effectively banned non-competes for employees in 2023 (Minn. Stat. § 181.988). Courts in Minnesota apply significant scrutiny to broadly drawn confidentiality provisions that function as non-competes by restricting professional mobility. Trade secrets remain protected under the Minnesota Uniform Trade Secrets Act (Minn. Stat. § 325C) when the information meets the statutory requirements. Receiving parties in Minnesota have meaningful protections against overly broad confidentiality clauses in employment contexts.
Delaware
Delaware is the preferred governing law for commercial contracts between business entities. Courts enforce confidentiality provisions with strong fidelity to the written agreement text and sophisticated commercial analysis from the Court of Chancery. Delaware has no general statute restricting confidentiality clauses in commercial contexts. Delaware law is frequently chosen as governing law specifically for its predictability — provisions that would face enforceability challenges in other states are typically enforced in Delaware when clearly and specifically drafted.
Mutual vs. One-Way Confidentiality: Side-by-Side
The structural choice between mutual and one-way confidentiality has significant practical consequences. Understanding the differences helps you evaluate whether the clause serves both parties' interests or exclusively protects one side.
| Feature | Mutual | One-Way |
|---|---|---|
| Who has obligations | Both parties owe confidentiality to the other | Only the Receiving Party has obligations |
| Whose information is protected | Both parties' confidential information | Only the Disclosing Party's information |
| When appropriate | Both parties share sensitive information | Information flows only in one direction |
| Common in | Technology partnerships, consulting agreements, joint ventures | Standard enterprise vendor contracts, employment agreements |
| Red flag if used when | Rarely a red flag on its own | The other party will receive your sensitive proposals, methodologies, or pricing |
| Key negotiation | Ensure duration, exclusions, and carve-outs are symmetric | Push for mutual if you are sharing anything of confidential value |
The Five Most Dangerous Confidentiality Provisions
These five provisions, alone or in combination, create the greatest risk for service providers, freelancers, and knowledge workers. If your contract contains any of them, treat revision as a priority before signing.
- 1
Perpetual confidentiality for all information with no trade secret carve-out
Permanent obligations for general business information — not just trade secrets — are overbroad and create compliance burdens that follow you indefinitely.
- 2
Knowledge and skill restrictions packaged as confidentiality
Provisions barring use of 'knowledge, skill, or experience' gained during the engagement are de facto non-competes that courts in many states (especially California) will not enforce — but enforcing that right requires litigation.
- 3
One-way obligation when you are sharing proprietary methodologies, pricing, or proposals
Your pricing intelligence, proprietary approaches, and competitive information are unprotected while the other party can use them freely.
- 4
No standard exclusions for publicly available, independently developed, or prior-possession information
Without these exclusions, you can be held liable for disclosing information that was never genuinely confidential — or that you developed yourself.
- 5
No legal process carve-out
Without the ability to comply with court orders and regulatory requirements, you face an impossible choice between contract compliance and legal compliance.
Signs of a Well-Balanced Confidentiality Clause
When you see these elements in a contract's confidentiality clause, you are looking at a provision drafted with commercial balance — or one that has been negotiated to a fair result.
- Mutual obligations — both parties keep the other's information confidential
- Bounded definition — "reasonably understood to be confidential" or a marking requirement
- All four standard exclusions present: public domain, prior possession, third-party receipt, independent development
- Finite duration for general confidential information (3-5 years post-termination)
- Indefinite protection only for information qualifying as trade secrets
- Legal process carve-out with notice, cooperation, and minimum disclosure requirements
- Permitted disclosures covering employees, contractors, and professional advisors with flow-down requirement
- Return-and-destruction exception for legally required retention and routine backups
- Residuals clause protecting professional knowledge internalized during the engagement (knowledge worker contexts)
- Use restrictions matched to the actual contractual purpose — broad enough to cover all planned activities
Have a contract with a confidentiality clause to review?
Get an instant AI-powered review that identifies overbroad definitions, one-way obligations, perpetual duration, missing exclusions, knowledge restrictions, and missing carve-outs — with plain-English guidance on exactly what to negotiate. Just $4.99.
Review My Contract — $4.99No account needed · Results in ~2 minutes · Contract never stored
Frequently Asked Questions
What is the difference between a confidentiality clause and a standalone NDA?
A confidentiality clause is a provision embedded within a broader contract — a services agreement, employment contract, or vendor agreement — that restricts disclosure and use of specific information shared during contract performance. A standalone NDA is a separate contract whose sole purpose is confidentiality, typically signed before any other contractual relationship exists, to cover exploratory conversations, due diligence, or preliminary business discussions. When a broader contract contains its own confidentiality clause, that clause typically supersedes any prior standalone NDA for information shared after the contract date. Always verify which agreement controls the confidentiality of information shared at each phase of a business relationship.
How long should a confidentiality clause last?
Duration depends on the type of information and the nature of the relationship. For general confidential business information — financial data, business plans, pricing, client lists — a finite term of 3-5 years after contract termination is commercially standard in most services and consulting agreements. For genuine trade secrets, indefinite protection is appropriate and consistent with the Defend Trade Secrets Act (DTSA) and state trade secret statutes, which protect trade secrets for as long as they retain their secret character and economic value. Perpetual confidentiality obligations for all information — not just trade secrets — are overbroad, practically unmanageable over a career, and should be resisted.
What is a residuals clause and do I need one?
A residuals clause permits a receiving party to use information retained in the unaided memory of its personnel, even after confidentiality obligations apply, provided the information was not intentionally memorized for subsequent use. It distinguishes between specific confidential data (which remains protected) and general knowledge and professional skills legitimately internalized during the engagement. Knowledge workers — consultants, developers, designers, advisors — who will be exposed to a client's confidential technical or business methodologies should request a residuals clause. Without one, a confidentiality clause could theoretically be read to restrict the use of professional skills developed or reinforced during a client engagement — a restriction that is both commercially unreasonable and unenforceable in many jurisdictions.
What are the four standard exclusions from confidential information?
The four standard exclusions that should appear in every confidentiality clause are: (1) information that is or becomes publicly available through no fault of the receiving party; (2) information already in the receiving party's possession before the disclosure, as evidenced by written records; (3) information rightfully received from a third party without restriction; and (4) information independently developed by the receiving party without reference to or use of the disclosing party's confidential information. These exclusions reflect commercially reasonable limitations on confidentiality obligations — protecting them against overreach into publicly available, previously known, or independently created information. Their absence from a contract is a significant red flag that warrants negotiation before signing.
Can I be required to destroy all documents with confidential information after a contract ends?
Contracts routinely require return or destruction of confidential information upon termination, but this obligation has practical and legal limits. Well-drafted return-and-destruction clauses include exceptions for: documents required to be retained by applicable law or regulation (tax records, regulatory filings, employment records); information embedded in deliverables already returned to the disclosing party; backup copies retained in the ordinary course of business until their normal scheduled rotation; and information needed to defend against potential legal claims (litigation holds). If a return-and-destruction clause lacks these exceptions, negotiate them before signing — compliance with an unqualified destruction requirement can itself create legal compliance problems.
What can happen if I breach a confidentiality clause?
Breach of a confidentiality clause can result in multiple forms of liability. Contractual remedies include money damages (compensating the disclosing party for actual losses from the breach) and, if specified in the contract, liquidated damages. Most confidentiality clauses contain a provision allowing the disclosing party to seek preliminary injunctive relief — an emergency court order stopping further disclosure — on an expedited basis, often with the receiving party's pre-signed acknowledgment that monetary damages are inadequate. If the information qualifies as a trade secret under the Defend Trade Secrets Act or state UTSA, additional remedies include unjust enrichment damages, exemplary damages (up to 2x actual damages for willful misappropriation), and attorney fees. Criminal liability under the DTSA is also possible for willful trade secret theft.
Is a confidentiality clause enforceable if it restricts my professional knowledge and skills?
Confidentiality clauses that purport to restrict a person's use of professional knowledge, skills, and general experience gained during an engagement — as distinct from protecting specific confidential data — are de facto non-competes that most courts will scrutinize or refuse to enforce. California Business and Professions Code Section 16600 broadly invalidates such restrictions for California-based workers. Other states apply varying levels of scrutiny depending on how broadly the restriction is drawn and whether it is supported by adequate consideration. A clause that says 'you cannot use knowledge, skill, or experience gained in performing services for us in any other engagement' goes far beyond legitimate confidentiality protection and should be struck or narrowed before signing.
What is a "use restriction" and how does it differ from a secrecy obligation?
A confidentiality clause has two distinct components: (1) the secrecy obligation, which prohibits disclosure of confidential information to third parties; and (2) the use restriction, which limits how the receiving party can use confidential information for its own purposes, even without disclosing it to others. A receiving party can technically comply with the secrecy obligation — never telling anyone what they received — while violating the use restriction, for example by using a client's pricing structure to inform its own competitive pricing strategy. Use restrictions typically limit use of confidential information to the specific contractual purpose ("evaluation and performance of the Agreement"). Violations of use restrictions, even without external disclosure, can be actionable as breach of contract and, if trade secrets are involved, as misappropriation.
If I receive a subpoena or court order for confidential information, what should I do?
Under the standard legal process carve-out in confidentiality clauses, you must: (1) give the disclosing party prompt written notice of the compelled disclosure requirement, to the extent you are legally permitted to do so; (2) cooperate with the disclosing party if it seeks a protective order or other relief to prevent or limit the disclosure; and (3) disclose only the minimum amount legally required. Before disclosing confidential information under legal compulsion, consult with legal counsel. In some circumstances — particularly government investigations — you may be prohibited from notifying the disclosing party of the subpoena. In that case, the notice obligation is excused, but you should still limit disclosure to the minimum legally required.
Does the governing law clause matter for a confidentiality provision?
Governing law significantly affects confidentiality clause enforceability. States vary widely in their treatment of confidentiality obligations. California broadly restricts confidentiality provisions that function as restraints on professional mobility. Texas and Florida enforce commercial confidentiality agreements broadly with strong injunctive relief traditions. Minnesota effectively banned non-competes and applies scrutiny to broadly drawn confidentiality provisions. Colorado has tightened its restrictive covenant framework significantly since 2022. When a contract specifies a governing law that is unfavorable to your interests, courts in your home state may still apply local law if enforcement would violate local public policy — but that requires litigation to establish. Negotiating a more favorable governing law is often easier than litigating public policy exceptions.
What should I do to comply with a confidentiality clause after signing?
Operational compliance with confidentiality obligations requires active procedures, not passive avoidance. Key practices: (1) document what confidential information you received — what it was, when you received it, from whom, and for what purpose; (2) restrict internal access to need-to-know personnel and document who has access; (3) obtain written confidentiality agreements from all contractors who will have access before sharing; (4) avoid forwarding confidential materials to personal email accounts or unauthorized systems; (5) maintain separation between confidential information received from different clients in competitive industries; (6) document independent development activities that might later be challenged as misappropriation; and (7) track your return-and-destruction obligations so you can fulfill them on termination. These records are also your evidence in any dispute about whether you complied.
Can a confidentiality clause protect information that is already publicly available?
No — information that is genuinely publicly available cannot be made confidential by contract. The standard public domain exclusion from confidential information reflects this legal reality: courts will not enforce confidentiality obligations for information that any member of the public can access. However, the public availability must be genuine — not a claim that information is 'generally known' in an industry without being actually accessible. Also important: the exclusion requires that the information became publicly available 'through no act or omission of the receiving party.' If the receiving party caused the public disclosure — even inadvertently — they cannot rely on the public domain exclusion to escape liability for the original breach. The question is whether the information was publicly available before or independently of the breach.
What makes information a trade secret vs. just confidential information?
Trade secrets receive heightened legal protection under the Defend Trade Secrets Act (DTSA) and state UTSA adoptions, independent of any contract. To qualify as a trade secret, information must meet two requirements: (1) it must derive independent economic value from not being generally known or reasonably ascertainable by others who could obtain economic value from its disclosure or use; and (2) the owner must have taken reasonable measures to maintain its secrecy. Contracts can call anything 'confidential information,' but that label alone does not create trade secret status. Trade secret protection requires both genuine secrecy and active protective measures — training employees on confidentiality, requiring NDAs with contractors, restricting access to sensitive systems. The contractual confidentiality clause is one of those reasonable measures, but it is not sufficient standing alone. Failing to take reasonable protective measures can cost a company its trade secret protection regardless of what the contract says.
Related Guides
How to Negotiate an NDA
8 NDA clauses you can push back on — with specific negotiation language for standalone NDAs and how they interact with contract confidentiality provisions.
Non-Compete Agreement Guide
How non-competes work, state enforcement differences, the thin line between confidentiality and non-compete restrictions, and what you can negotiate.
Intellectual Property in Contracts
IP ownership, work-for-hire, assignment clauses, license grants, and how confidentiality obligations interact with IP protections.
Indemnification Clause Guide
Unilateral vs. mutual indemnification, dollar caps, carve-outs, and how indemnification interacts with confidentiality breaches and third-party claims.