SlideShare a Scribd company logo
Can one NDA protect
confidential information
disclosed by email
The most common way to do protect information, either shared through
email or not, is by using a non-disclosure agreement (NDA).
Confidential information can include documents, designs, sketches,
analyses, source codes and marketing plans.
Protecting your confidential information is especially important if you
intend to disclose any trade secrets.
Here's an example of a clause from Coca-Cola describing what consti-
tutes a trade secret (1):
(1) http://www.wikinvest.com/stock/Coca-Cola_Company_(KO)/Agreement_Confidentiality_Non-competition_Non-solicitation
(b) "Trade Secret" means any information, including a
formula, pattern, compilation, program, device, method, technique,
or process, that (i) derives independent economic value, actual or
potential, from not being generally known to, and not being readily
ascertainable by proper means by, other persons who can derive
economic value from its disclosure or use and (ii) is the subject of
efforts that are reasonable under the circumstances to maintain its
secrecy; and
Using email disclosures
If you choose to make confidential disclosures through email,
your NDA agreement can provide legal protection for these
email disclosures if you provide for email disclosures in the
scope/definition of confidential information in your agreement
that you'll sign.
Although it does happen, you should always ensure that you
get the other party to sign your NDA agreement before you
email over any confidential information to ensure that the
other party is formally notified of the requirement for
confidentiality.
Best practices
- Include automatic confidentiality disclaimers in all your emails
Warn the Receiving Party in advance
- Insert “CONFIDENTIAL” in the subject line of your email
- Attachments should be marked as “CONFIDENTIAL”
- Confidentiality obligations for employees, contractors
and third parties
- Encryption software
- Invest in anti-virus software
- Request that Parties delete emails after reading
- Obligations after termination of relationship
Although this strategy is not foolproof, it will at least create awareness
amongst the recipients of your email about the need for confidentiality.
Here are some good examples for different situations from My Signa-
tures Online (2):
(2) http://www.policypatrol.com/
Include automatic confidentiality
disclaimers in all your emails
1. Extensive external disclaimer:
Note: Privileged/Confidential information may be contained in this message and may be subject to legal privilege. Access to this e-mail by anyone other than the
intended is unauthorised. If you are not the intended recipient (or responsible for delivery of the message to such person), you may not use, copy, distribute or
deliver to anyone this message (or any part of its contents) or take any action in reliance on it. In such case, you should destroy this message. and notify us
immediately. If you have received this email in error, please notify us immediately by e-mail or telephone and delete the e-mail from any computer. If you or your
employer does not consent to internet e-mail messages of this kind, please notify us immediately. All reasonable precautions have been taken to ensure no viruses
are present in this e-mail. As our company cannot accept responsibility for any loss or damage arising from the use of this e-mail or attachments we recommend
that you subject these to your virus checking procedures prior to use. The views. opinions. conclusions and other informations expressed in this electronic mail are
not given or endorsed by the company unless otherwise indicated by an author,. representative independent of this message.
2. External disclaimer:
This message is confidential. It may also be privileged or otherwise protected by work product immunity or other legal rules. If you have received it by mistake.
please let us know by e-mail reply and delete it from your system: you may not copy this message or disclose its contents to anyone. Please send us by fax any
message containing deadlines as incoming e-mails are not screened for response deadlines. The integrity and security of this message cannot be guaranteed on
the Internet.
Warn the Receiving Party in advance
You should also warn the Receiving Party in advance to expect your
email before you email them highly confidential stuff.
A simple email to the Receiving Party in advance and asking them to ac-
knowledge receipt of your confidential email should suffice.
Insert “CONFIDENTIAL” in the subject line
of your email
Make it a practice to include the bold word “CONFIDENTIAL” in the
subject line of all your emails containing confidential information.
If the content of your email consists of both a combination of ordinary
and confidential information, you may want to make an extra marking
of “CONFIDENTIAL” next to information or paragraphs that are
confidential to differentiate them from ordinary information.
Attachments should be marked as
“CONFIDENTIAL”
If you intend to include attachments that are confidential, you can in-
clude the word “CONFIDENTIAL” in the naming of the attachment
itself.
Here are some examples from SlideShare presentations that contain
confidential information and how the creators are marking this.
Customer Lifetime Value in Digital Marketing (3) where the words
“Confidential & Proprietary” are used throughout the whole presen-
tation’s index:
and
Sarawak Energy (4) where the word “Confidential” is included in
the title of the presentation and in the index of the presentation
itself, the words “Private & Confidential - Do not duplicate or
distribute without written permission” is used:
(3) http://www.slideshare.net/mediocz/customer-lietime-value-in-digital-marketing?qid=a919f41c-5e7d-4e26-9596-b00ee8a94532&v=&b=&from_search=22
(4) http://www.slideshare.net/altugauw/sarawak-energy-confidential?qid=a919f41c-5e7d-4e26-9596-b00ee8a94532&v=&b=&from_search=28
Customer Lifetime Value in Digital Marketing
1. Confidential 8, ProprietaryConfidential & Proprietary Customer
Lifetime Value in Digital Marketing DATA restart. 22. 4. 2016 Pavel
Jašek (@paveljasek)
2. Confidential & Proprietary CLV: The Holy Grail of Customer Centricity
3 Confidential & Proprietary “Customer centricity is a strategy that aligns
a company's development and delivery of its products and services with
the current and future of a select group of customers in order to maxi-
mize their long- term financial value to the firm”
4. Confidential & Proprietary Focusing on profitable customers % of
Total Customers (sorted by profit) %ofTotalProfit ID 123 When there is a
large heterogenity in your customer base in temis of profits that your
customers bring you or losses you can count. you need to focus on
selecting such segments. Create a Pareto chart like this using Tableau.
5. Confidential & Proprietary “Customer Lifetime Value (CLV) is the
present value of the future (net) cash flows associated with a particular
customer ” “Customer Equity is the sum of customer lifetime values
across a firm's entire customer base” noca.cz/clvbook
6. Confidential & Proprietary When a telco company acquires a custom-
er. cash flow for next 2 years is easily predictable
7. Confidential & Proprietary When an e-commerce acquires a custom-
er. how can you predict future profit?
8. Confidential & Proprietary How easily can you predict customer
behavior? History Present Future Customer 1 Customer 2 Customer 3
Transactions in the learning period
9. Confidential & Proprietary E-commerce settings Focus on end
customers (B2C) Non- contractual settings Non-membership status
Always-a-share (vs. lost-for-good) Continuous buying Variable-spending
environment Partial identification possibilities
Sarawak Energy Confidential (PPT)
1. China — ASEAN Power Coorporation 8, Development
Forum Nanning, Guangxi, China 28th - 29th October 2007
“Chinese Power Plants in Malaysia — Present & Future
Development" by Tan Sri Datuk Amar Abdul Aziz Husain
Group Managing Director Sarawak Energy Berhad
2. Locality Kuching - Nanning SEB China-ASEAN Power
Coorporation & Development Forum China- Chinese Power
Plants in Malaysia — Present & Future Development Slide
No. 2 28 — 29 October 2007. Nanning, China Nanning,
Private & Confidential - Do not duplicate or distribute
without written permission.
3. Friendship Park (Taman Sahabat) SEB Statute of
Admiral Zheng He Malaysia-China Friendship Globe Orang
Utan-Panda Bench China-ASEAN Power Coorporation &
Development Forum China- Chinese Power Plants in
Malaysia — Present & Future Development Slide No. 3 28
— 29 October 2007. Nanning, China Nanning, Private &
Confidential - Do not duplicate or distribute without written
permission.
Confidentiality obligations for employees,
contractors and third parties
Here's an example of a clause in a Mutual Non-Disclosure Agreement
from the website NewAppIdea (5):
(5) http://newappidea.com/
3. Obligations of Receiving Party. Receiving Party shall hold and maintain the Confidential
Information in strictest confidence for the sole and exclusive benefit of the Disclosing Party.
Receiving Party shall carefully restrict access to Proprietary Information to employees,
contractors and third parties as is reasonably required and shall require those persons to sign
nondisclosure restrictions at least as protective as those in this Agreement. Receiving Party shall
not, without prior written approval of Disclosing Party, use for Receiving Party's own benefit,
publish, copy, or otherwise disclose to others, or permit the use by others for their benefit or to
the detriment of Disclosing Party, any Proprietary Information. Receiving Party shall return to
Disclosing Party any and all records, notes, and other written, printed, or tangible materials in its
possession pertaining to Proprietary Information immediately if Disclosing Party requests it in
writing.
Encryption software
Encryption allows you to hide confidential information that you send
over the internet.
Both you and the other party would need to install security certif-
icates on your computers and provide each other with a public key
which are a string of characters, before you can start sending each
other encrypted messages.
For more information about encryption and how to do it on your
own, see this article by PC World on How To Encrypt Your Email (6).
(6) http://www.pcworld.com/article/254338/how_to_encrypt_your_email.html
Invest in anti-virus software
There are many different types of anti-virus software on the
market. The popular ones are Norton Security (7), McAfee (8) and
AVG (9)but there are a lot of other capable players on the market
now as well. You should do your research to find one that suits you
if you haven’t got one already.
(7) http://us.norton.com/norton-security-antivirus
(8) http://www.mcafee.com/us/index.html
(9) http://www.avg.com/eu-en/homepage
Obligations after termination of relationship
For example, you may wish them to return all physical copies of infor-
mation back to you and you may request that they destroy all copies
of information including emails and folders containing your confidential
information and to provide you with evidence that they have done so.
Here's an example of kind of clause from Accuride Corp’s Confidenti-
ality and Non-Disclosure Agreement: (10)
(10) http://www.accuridecorp.com/files/2012/09/ConfidentialityNondisclosureAgreement.pdf
9. OWNERSHIP AND RETURN OF CONFIDENTIAL INFORMATION. All Confidential Information
disclosed to Recipient shall be and remain the property of Accuride. Upon Accuride's written request,
Recipient shall promptly return all Confidential Information (including all originals, copies, reproductions
and summaries of such Confidential Information), or certify its destruction in writing, and keep the same
confidential and secret in accordance with this Agreement.
Can one NDA protect
confidential information
disclosed by email
http://www.everynda/blog/can-one-nda-protect-confidetial-information-disclosed-by-email
Credits
Icon from slide 1 created by icon 54 from Noun Project.

More Related Content

What's hot

Supply Chain Finance The Basic Concept
Supply Chain Finance The Basic ConceptSupply Chain Finance The Basic Concept
Blockchain in FinTech
Blockchain in FinTechBlockchain in FinTech
Blockchain in FinTech
Aurobindo Nayak
 
Top 5 DeFi Applications
Top 5 DeFi ApplicationsTop 5 DeFi Applications
Top 5 DeFi Applications
101 Blockchains
 
Atm simulation program using python
Atm simulation program using pythonAtm simulation program using python
Atm simulation program using python
Happy Nezza Aranjuez
 
Credit Card
Credit CardCredit Card
Credit Card
Harsh Gupta
 
Blockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and consBlockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and cons
Jerin Sebastian
 
Payment Card System Overview
Payment Card System OverviewPayment Card System Overview
Payment Card System Overview
Narudom Roongsiriwong, CISSP
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of Trust
Macha Pujitha
 
The State of Decentralized Perpetual Protocols | CoinGecko
The State of Decentralized Perpetual Protocols | CoinGeckoThe State of Decentralized Perpetual Protocols | CoinGecko
The State of Decentralized Perpetual Protocols | CoinGecko
CoinGecko
 
Marketing Credit card
Marketing Credit cardMarketing Credit card
Marketing Credit card
Subhrasankha Bhattacharjee
 
Trade Based Money Laundering
Trade Based Money LaunderingTrade Based Money Laundering
Trade Based Money Laundering
Saiful Islam
 
Plastic money
Plastic moneyPlastic money
Plastic moneyAMIT ROY
 
Aml & kyc
Aml & kyc Aml & kyc
Aml & kyc
Satyajit Dutta
 
Bank lending system
Bank lending systemBank lending system
Bank lending system
Humsi Singh
 
Income 4 banking
Income 4 bankingIncome 4 banking
Income 4 bankingDharmik
 
Weka bike rental
Weka bike rentalWeka bike rental
Weka bike rental
Pratik Doshi
 
e-cheque
e-chequee-cheque
e-cheque
raksha93
 
Money Laundering and Corruption
Money Laundering and CorruptionMoney Laundering and Corruption
Money Laundering and Corruption
Jubayer Alam Shoikat
 

What's hot (20)

Supply Chain Finance The Basic Concept
Supply Chain Finance The Basic ConceptSupply Chain Finance The Basic Concept
Supply Chain Finance The Basic Concept
 
Blockchain in FinTech
Blockchain in FinTechBlockchain in FinTech
Blockchain in FinTech
 
Top 5 DeFi Applications
Top 5 DeFi ApplicationsTop 5 DeFi Applications
Top 5 DeFi Applications
 
Swiss bank
Swiss bankSwiss bank
Swiss bank
 
Atm simulation program using python
Atm simulation program using pythonAtm simulation program using python
Atm simulation program using python
 
Credit Card
Credit CardCredit Card
Credit Card
 
Blockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and consBlockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and cons
 
Payment Card System Overview
Payment Card System OverviewPayment Card System Overview
Payment Card System Overview
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of Trust
 
The State of Decentralized Perpetual Protocols | CoinGecko
The State of Decentralized Perpetual Protocols | CoinGeckoThe State of Decentralized Perpetual Protocols | CoinGecko
The State of Decentralized Perpetual Protocols | CoinGecko
 
Marketing Credit card
Marketing Credit cardMarketing Credit card
Marketing Credit card
 
Trade Based Money Laundering
Trade Based Money LaunderingTrade Based Money Laundering
Trade Based Money Laundering
 
Plastic money
Plastic moneyPlastic money
Plastic money
 
plastic money
plastic moneyplastic money
plastic money
 
Aml & kyc
Aml & kyc Aml & kyc
Aml & kyc
 
Bank lending system
Bank lending systemBank lending system
Bank lending system
 
Income 4 banking
Income 4 bankingIncome 4 banking
Income 4 banking
 
Weka bike rental
Weka bike rentalWeka bike rental
Weka bike rental
 
e-cheque
e-chequee-cheque
e-cheque
 
Money Laundering and Corruption
Money Laundering and CorruptionMoney Laundering and Corruption
Money Laundering and Corruption
 

Similar to NDA agreement to protect information disclosed by email

SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
Thomas Christopher Ty
 
NDA Not Enough to Protect Confidential Information
NDA Not Enough to Protect Confidential InformationNDA Not Enough to Protect Confidential Information
NDA Not Enough to Protect Confidential Information
EveryNDA
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
Sharing Slides Training
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
sharing notes123
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
Swapnil Jagtap
 
Are you the next target?
Are you the next target?Are you the next target?
Are you the next target?
Strategic Insurance Software
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
Securing Your Business Information - Template from Microsoft
Securing Your Business Information - Template from MicrosoftSecuring Your Business Information - Template from Microsoft
Securing Your Business Information - Template from MicrosoftDavid J Rosenthal
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud provider
HighQ
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
Meg Weber
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
TechSoup
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
evonnehoggarth79783
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
Caroline Johnson
 
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET Journal
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
lmgangi
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
sahil lalwani
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
Watchful Software
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
LinkedIn
 

Similar to NDA agreement to protect information disclosed by email (20)

SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
NDA Not Enough to Protect Confidential Information
NDA Not Enough to Protect Confidential InformationNDA Not Enough to Protect Confidential Information
NDA Not Enough to Protect Confidential Information
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Are you the next target?
Are you the next target?Are you the next target?
Are you the next target?
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Securing Your Business Information - Template from Microsoft
Securing Your Business Information - Template from MicrosoftSecuring Your Business Information - Template from Microsoft
Securing Your Business Information - Template from Microsoft
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud provider
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 

More from EveryNDA

When to Use NDAs
When to Use NDAsWhen to Use NDAs
When to Use NDAs
EveryNDA
 
Protect Software Source Code with an NDA
Protect Software Source Code with an NDAProtect Software Source Code with an NDA
Protect Software Source Code with an NDA
EveryNDA
 
Beware Residuals Clauses in your NDA
Beware Residuals Clauses in your NDABeware Residuals Clauses in your NDA
Beware Residuals Clauses in your NDA
EveryNDA
 
The missing NDA and the Facebook Story
The missing NDA and the Facebook StoryThe missing NDA and the Facebook Story
The missing NDA and the Facebook Story
EveryNDA
 
Trade Secret Agreements v. NDAs
Trade Secret Agreements v. NDAs Trade Secret Agreements v. NDAs
Trade Secret Agreements v. NDAs
EveryNDA
 
The 5 No's of Confidentiality Agreements
The 5 No's of Confidentiality AgreementsThe 5 No's of Confidentiality Agreements
The 5 No's of Confidentiality Agreements
EveryNDA
 
Confidentiality Agreement for Writers and Authors
Confidentiality Agreement for Writers and AuthorsConfidentiality Agreement for Writers and Authors
Confidentiality Agreement for Writers and Authors
EveryNDA
 
Non-disclosure for Work In Progress (WIP)
Non-disclosure for Work In Progress (WIP)Non-disclosure for Work In Progress (WIP)
Non-disclosure for Work In Progress (WIP)
EveryNDA
 
12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused
EveryNDA
 
Update your NDA to include the new DTSA Act
Update your NDA to include the new DTSA ActUpdate your NDA to include the new DTSA Act
Update your NDA to include the new DTSA Act
EveryNDA
 
Non-compete vs. Non-disclosure
Non-compete vs. Non-disclosureNon-compete vs. Non-disclosure
Non-compete vs. Non-disclosure
EveryNDA
 
4 tools you can use to sign NDA's online
4 tools you can use to sign NDA's online4 tools you can use to sign NDA's online
4 tools you can use to sign NDA's online
EveryNDA
 
Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?
EveryNDA
 
10 clauses to have in Non-Disclosure Agreements (NDA)
10 clauses to have in Non-Disclosure Agreements (NDA)10 clauses to have in Non-Disclosure Agreements (NDA)
10 clauses to have in Non-Disclosure Agreements (NDA)
EveryNDA
 

More from EveryNDA (14)

When to Use NDAs
When to Use NDAsWhen to Use NDAs
When to Use NDAs
 
Protect Software Source Code with an NDA
Protect Software Source Code with an NDAProtect Software Source Code with an NDA
Protect Software Source Code with an NDA
 
Beware Residuals Clauses in your NDA
Beware Residuals Clauses in your NDABeware Residuals Clauses in your NDA
Beware Residuals Clauses in your NDA
 
The missing NDA and the Facebook Story
The missing NDA and the Facebook StoryThe missing NDA and the Facebook Story
The missing NDA and the Facebook Story
 
Trade Secret Agreements v. NDAs
Trade Secret Agreements v. NDAs Trade Secret Agreements v. NDAs
Trade Secret Agreements v. NDAs
 
The 5 No's of Confidentiality Agreements
The 5 No's of Confidentiality AgreementsThe 5 No's of Confidentiality Agreements
The 5 No's of Confidentiality Agreements
 
Confidentiality Agreement for Writers and Authors
Confidentiality Agreement for Writers and AuthorsConfidentiality Agreement for Writers and Authors
Confidentiality Agreement for Writers and Authors
 
Non-disclosure for Work In Progress (WIP)
Non-disclosure for Work In Progress (WIP)Non-disclosure for Work In Progress (WIP)
Non-disclosure for Work In Progress (WIP)
 
12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused
 
Update your NDA to include the new DTSA Act
Update your NDA to include the new DTSA ActUpdate your NDA to include the new DTSA Act
Update your NDA to include the new DTSA Act
 
Non-compete vs. Non-disclosure
Non-compete vs. Non-disclosureNon-compete vs. Non-disclosure
Non-compete vs. Non-disclosure
 
4 tools you can use to sign NDA's online
4 tools you can use to sign NDA's online4 tools you can use to sign NDA's online
4 tools you can use to sign NDA's online
 
Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?
 
10 clauses to have in Non-Disclosure Agreements (NDA)
10 clauses to have in Non-Disclosure Agreements (NDA)10 clauses to have in Non-Disclosure Agreements (NDA)
10 clauses to have in Non-Disclosure Agreements (NDA)
 

Recently uploaded

Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 

Recently uploaded (20)

Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 

NDA agreement to protect information disclosed by email

  • 1. Can one NDA protect confidential information disclosed by email
  • 2. The most common way to do protect information, either shared through email or not, is by using a non-disclosure agreement (NDA). Confidential information can include documents, designs, sketches, analyses, source codes and marketing plans. Protecting your confidential information is especially important if you intend to disclose any trade secrets. Here's an example of a clause from Coca-Cola describing what consti- tutes a trade secret (1): (1) http://www.wikinvest.com/stock/Coca-Cola_Company_(KO)/Agreement_Confidentiality_Non-competition_Non-solicitation
  • 3. (b) "Trade Secret" means any information, including a formula, pattern, compilation, program, device, method, technique, or process, that (i) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can derive economic value from its disclosure or use and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy; and
  • 4. Using email disclosures If you choose to make confidential disclosures through email, your NDA agreement can provide legal protection for these email disclosures if you provide for email disclosures in the scope/definition of confidential information in your agreement that you'll sign. Although it does happen, you should always ensure that you get the other party to sign your NDA agreement before you email over any confidential information to ensure that the other party is formally notified of the requirement for confidentiality.
  • 5. Best practices - Include automatic confidentiality disclaimers in all your emails Warn the Receiving Party in advance - Insert “CONFIDENTIAL” in the subject line of your email - Attachments should be marked as “CONFIDENTIAL” - Confidentiality obligations for employees, contractors and third parties - Encryption software - Invest in anti-virus software - Request that Parties delete emails after reading - Obligations after termination of relationship
  • 6. Although this strategy is not foolproof, it will at least create awareness amongst the recipients of your email about the need for confidentiality. Here are some good examples for different situations from My Signa- tures Online (2): (2) http://www.policypatrol.com/ Include automatic confidentiality disclaimers in all your emails
  • 7. 1. Extensive external disclaimer: Note: Privileged/Confidential information may be contained in this message and may be subject to legal privilege. Access to this e-mail by anyone other than the intended is unauthorised. If you are not the intended recipient (or responsible for delivery of the message to such person), you may not use, copy, distribute or deliver to anyone this message (or any part of its contents) or take any action in reliance on it. In such case, you should destroy this message. and notify us immediately. If you have received this email in error, please notify us immediately by e-mail or telephone and delete the e-mail from any computer. If you or your employer does not consent to internet e-mail messages of this kind, please notify us immediately. All reasonable precautions have been taken to ensure no viruses are present in this e-mail. As our company cannot accept responsibility for any loss or damage arising from the use of this e-mail or attachments we recommend that you subject these to your virus checking procedures prior to use. The views. opinions. conclusions and other informations expressed in this electronic mail are not given or endorsed by the company unless otherwise indicated by an author,. representative independent of this message. 2. External disclaimer: This message is confidential. It may also be privileged or otherwise protected by work product immunity or other legal rules. If you have received it by mistake. please let us know by e-mail reply and delete it from your system: you may not copy this message or disclose its contents to anyone. Please send us by fax any message containing deadlines as incoming e-mails are not screened for response deadlines. The integrity and security of this message cannot be guaranteed on the Internet.
  • 8. Warn the Receiving Party in advance You should also warn the Receiving Party in advance to expect your email before you email them highly confidential stuff. A simple email to the Receiving Party in advance and asking them to ac- knowledge receipt of your confidential email should suffice.
  • 9. Insert “CONFIDENTIAL” in the subject line of your email Make it a practice to include the bold word “CONFIDENTIAL” in the subject line of all your emails containing confidential information. If the content of your email consists of both a combination of ordinary and confidential information, you may want to make an extra marking of “CONFIDENTIAL” next to information or paragraphs that are confidential to differentiate them from ordinary information.
  • 10. Attachments should be marked as “CONFIDENTIAL” If you intend to include attachments that are confidential, you can in- clude the word “CONFIDENTIAL” in the naming of the attachment itself. Here are some examples from SlideShare presentations that contain confidential information and how the creators are marking this.
  • 11. Customer Lifetime Value in Digital Marketing (3) where the words “Confidential & Proprietary” are used throughout the whole presen- tation’s index: and Sarawak Energy (4) where the word “Confidential” is included in the title of the presentation and in the index of the presentation itself, the words “Private & Confidential - Do not duplicate or distribute without written permission” is used: (3) http://www.slideshare.net/mediocz/customer-lietime-value-in-digital-marketing?qid=a919f41c-5e7d-4e26-9596-b00ee8a94532&v=&b=&from_search=22 (4) http://www.slideshare.net/altugauw/sarawak-energy-confidential?qid=a919f41c-5e7d-4e26-9596-b00ee8a94532&v=&b=&from_search=28
  • 12. Customer Lifetime Value in Digital Marketing 1. Confidential 8, ProprietaryConfidential & Proprietary Customer Lifetime Value in Digital Marketing DATA restart. 22. 4. 2016 Pavel Jašek (@paveljasek) 2. Confidential & Proprietary CLV: The Holy Grail of Customer Centricity 3 Confidential & Proprietary “Customer centricity is a strategy that aligns a company's development and delivery of its products and services with the current and future of a select group of customers in order to maxi- mize their long- term financial value to the firm” 4. Confidential & Proprietary Focusing on profitable customers % of Total Customers (sorted by profit) %ofTotalProfit ID 123 When there is a large heterogenity in your customer base in temis of profits that your customers bring you or losses you can count. you need to focus on selecting such segments. Create a Pareto chart like this using Tableau. 5. Confidential & Proprietary “Customer Lifetime Value (CLV) is the present value of the future (net) cash flows associated with a particular customer ” “Customer Equity is the sum of customer lifetime values across a firm's entire customer base” noca.cz/clvbook 6. Confidential & Proprietary When a telco company acquires a custom- er. cash flow for next 2 years is easily predictable 7. Confidential & Proprietary When an e-commerce acquires a custom- er. how can you predict future profit? 8. Confidential & Proprietary How easily can you predict customer behavior? History Present Future Customer 1 Customer 2 Customer 3 Transactions in the learning period 9. Confidential & Proprietary E-commerce settings Focus on end customers (B2C) Non- contractual settings Non-membership status Always-a-share (vs. lost-for-good) Continuous buying Variable-spending environment Partial identification possibilities
  • 13. Sarawak Energy Confidential (PPT) 1. China — ASEAN Power Coorporation 8, Development Forum Nanning, Guangxi, China 28th - 29th October 2007 “Chinese Power Plants in Malaysia — Present & Future Development" by Tan Sri Datuk Amar Abdul Aziz Husain Group Managing Director Sarawak Energy Berhad 2. Locality Kuching - Nanning SEB China-ASEAN Power Coorporation & Development Forum China- Chinese Power Plants in Malaysia — Present & Future Development Slide No. 2 28 — 29 October 2007. Nanning, China Nanning, Private & Confidential - Do not duplicate or distribute without written permission. 3. Friendship Park (Taman Sahabat) SEB Statute of Admiral Zheng He Malaysia-China Friendship Globe Orang Utan-Panda Bench China-ASEAN Power Coorporation & Development Forum China- Chinese Power Plants in Malaysia — Present & Future Development Slide No. 3 28 — 29 October 2007. Nanning, China Nanning, Private & Confidential - Do not duplicate or distribute without written permission.
  • 14. Confidentiality obligations for employees, contractors and third parties Here's an example of a clause in a Mutual Non-Disclosure Agreement from the website NewAppIdea (5): (5) http://newappidea.com/
  • 15. 3. Obligations of Receiving Party. Receiving Party shall hold and maintain the Confidential Information in strictest confidence for the sole and exclusive benefit of the Disclosing Party. Receiving Party shall carefully restrict access to Proprietary Information to employees, contractors and third parties as is reasonably required and shall require those persons to sign nondisclosure restrictions at least as protective as those in this Agreement. Receiving Party shall not, without prior written approval of Disclosing Party, use for Receiving Party's own benefit, publish, copy, or otherwise disclose to others, or permit the use by others for their benefit or to the detriment of Disclosing Party, any Proprietary Information. Receiving Party shall return to Disclosing Party any and all records, notes, and other written, printed, or tangible materials in its possession pertaining to Proprietary Information immediately if Disclosing Party requests it in writing.
  • 16. Encryption software Encryption allows you to hide confidential information that you send over the internet. Both you and the other party would need to install security certif- icates on your computers and provide each other with a public key which are a string of characters, before you can start sending each other encrypted messages. For more information about encryption and how to do it on your own, see this article by PC World on How To Encrypt Your Email (6). (6) http://www.pcworld.com/article/254338/how_to_encrypt_your_email.html
  • 17. Invest in anti-virus software There are many different types of anti-virus software on the market. The popular ones are Norton Security (7), McAfee (8) and AVG (9)but there are a lot of other capable players on the market now as well. You should do your research to find one that suits you if you haven’t got one already. (7) http://us.norton.com/norton-security-antivirus (8) http://www.mcafee.com/us/index.html (9) http://www.avg.com/eu-en/homepage
  • 18. Obligations after termination of relationship For example, you may wish them to return all physical copies of infor- mation back to you and you may request that they destroy all copies of information including emails and folders containing your confidential information and to provide you with evidence that they have done so. Here's an example of kind of clause from Accuride Corp’s Confidenti- ality and Non-Disclosure Agreement: (10) (10) http://www.accuridecorp.com/files/2012/09/ConfidentialityNondisclosureAgreement.pdf
  • 19. 9. OWNERSHIP AND RETURN OF CONFIDENTIAL INFORMATION. All Confidential Information disclosed to Recipient shall be and remain the property of Accuride. Upon Accuride's written request, Recipient shall promptly return all Confidential Information (including all originals, copies, reproductions and summaries of such Confidential Information), or certify its destruction in writing, and keep the same confidential and secret in accordance with this Agreement.
  • 20. Can one NDA protect confidential information disclosed by email http://www.everynda/blog/can-one-nda-protect-confidetial-information-disclosed-by-email
  • 21. Credits Icon from slide 1 created by icon 54 from Noun Project.