SlideShare a Scribd company logo
NDA not enough to protect
confidential information
Sometimes, during these meetings, details of confidential
information have to be revealed in order to progress your
objectives.
Non-disclosure agreements (NDAs) are an excellent legal tool to
help provide some protection for any confidential information that
you may have to share in such meetings, in addition to other
intellectual property protection options such as patents and
copyrights.
What steps should you take to protect
confidential information?
Step 1: Read the NDA
Make sure that you understand the terms and consequences of any
NDA that you use and/or sign.
If you don’t wish to use a marking procedure for your confidential
information, i.e. all information marked as "Confidential" is
confidential, then don’t include this requirement in your NDA.
Step 2: Make sure your definition of confidential
information matches your information
Make sure that your definition of confidential information fits the
information that you intend to share.
If you do intend to mark your confidential information as "Confidential,"
then consider inserting a clause that states that your confidential
information needs to be kept confidential anyway and not misused, even
if you omit to mark or confirm in writing.
Step 3: Have good procedures in place for marking
information as "Confidential"
Marking confidential information is indeed helpful for clear identification
of confidential information, but it can be burdensome.
Also, if in doubt, it makes more sense to mark a piece of information as
confidential rather than to allow confidential information to be disclosed
without protection. The consequences are much worse in the second
option.
Step 4: Mark your presentation directly
Customer Lifetime Value in Digital Marketing (1) where the words
“Confidential & Proprietary” are used in the whole presentation’s index:
Sarawak Energy (2) where the word “Confidential” is included in the
title of the presentation and in the index of the presentation itself, the
words “Private & Confidential - Do not duplicate or distribute
without written permission” is used:
(1) Link to http://www.slideshare.net/mediocz/customer-lifetime-value-in-digital-marketing?qid=a919f41c-5e7d-4e26-9596-b00ee8a94532&v=&b=&from_search=22
(2) Link to http://www.slideshare.net/altugauw/sarawak-energy-confidential?qid=a919f41c-5e7d-4e26-9596-b00ee8a94532&v=&b=&from_search=28
Step 5: Regularly review your procedures to ensure
compliance
Because of this, it’s important that you review your procedures with
members of your staff periodically to ensure compliance with the
terms of your NDA.
The necessity to review your agreement and procedures also apply to
all other types of intellectual property agreements as well.
Step 6: Don't assume that the other party will act
with integrity
Although you should always seek to partner with companies that
operate with integrity, you should also ensure that your intellectual
property rights are properly protected.
There's no guarantee that initial discussions will result in a future
working relationship together.
NDA Not Enough to Protect Confidential Information

More Related Content

Similar to NDA Not Enough to Protect Confidential Information

NDA agreement to protect information disclosed by email
NDA agreement to protect information disclosed by emailNDA agreement to protect information disclosed by email
NDA agreement to protect information disclosed by email
EveryNDA
 
Effective Instrumentation Strategies for Data-driven Product Management
 Effective Instrumentation Strategies for Data-driven Product Management  Effective Instrumentation Strategies for Data-driven Product Management
Effective Instrumentation Strategies for Data-driven Product Management
Pawan Kumar Adda
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
Search Engine Journal
 
IRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a ProfileIRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET Journal
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
Kavika Roy
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
evonnehoggarth79783
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
Robert 'Bob' Reyes
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
secratic
 
Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
CloudFronts Technologies LLP.
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
Sharing Slides Training
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
sharing notes123
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
Giulio Coraggio
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
TrustArc
 
Trusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management ResearchTrusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management Research
guestba832ad
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Steven Meister
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
CloudLock
 
Navigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowNavigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to Know
ShyamMishra72
 
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdfDemystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Prolitus Technologies
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
TrustArc
 

Similar to NDA Not Enough to Protect Confidential Information (20)

NDA agreement to protect information disclosed by email
NDA agreement to protect information disclosed by emailNDA agreement to protect information disclosed by email
NDA agreement to protect information disclosed by email
 
Effective Instrumentation Strategies for Data-driven Product Management
 Effective Instrumentation Strategies for Data-driven Product Management  Effective Instrumentation Strategies for Data-driven Product Management
Effective Instrumentation Strategies for Data-driven Product Management
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
IRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a ProfileIRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a Profile
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
 
Trusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management ResearchTrusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management Research
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
Navigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowNavigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to Know
 
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdfDemystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 

More from EveryNDA

The missing NDA and the Facebook Story
The missing NDA and the Facebook StoryThe missing NDA and the Facebook Story
The missing NDA and the Facebook Story
EveryNDA
 
Trade Secret Agreements v. NDAs
Trade Secret Agreements v. NDAs Trade Secret Agreements v. NDAs
Trade Secret Agreements v. NDAs
EveryNDA
 
The 5 No's of Confidentiality Agreements
The 5 No's of Confidentiality AgreementsThe 5 No's of Confidentiality Agreements
The 5 No's of Confidentiality Agreements
EveryNDA
 
Non-disclosure for Work In Progress (WIP)
Non-disclosure for Work In Progress (WIP)Non-disclosure for Work In Progress (WIP)
Non-disclosure for Work In Progress (WIP)
EveryNDA
 
12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused
EveryNDA
 
Update your NDA to include the new DTSA Act
Update your NDA to include the new DTSA ActUpdate your NDA to include the new DTSA Act
Update your NDA to include the new DTSA Act
EveryNDA
 
Non-compete vs. Non-disclosure
Non-compete vs. Non-disclosureNon-compete vs. Non-disclosure
Non-compete vs. Non-disclosure
EveryNDA
 
4 tools you can use to sign NDA's online
4 tools you can use to sign NDA's online4 tools you can use to sign NDA's online
4 tools you can use to sign NDA's online
EveryNDA
 
Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?
EveryNDA
 
10 clauses to have in Non-Disclosure Agreements (NDA)
10 clauses to have in Non-Disclosure Agreements (NDA)10 clauses to have in Non-Disclosure Agreements (NDA)
10 clauses to have in Non-Disclosure Agreements (NDA)
EveryNDA
 

More from EveryNDA (10)

The missing NDA and the Facebook Story
The missing NDA and the Facebook StoryThe missing NDA and the Facebook Story
The missing NDA and the Facebook Story
 
Trade Secret Agreements v. NDAs
Trade Secret Agreements v. NDAs Trade Secret Agreements v. NDAs
Trade Secret Agreements v. NDAs
 
The 5 No's of Confidentiality Agreements
The 5 No's of Confidentiality AgreementsThe 5 No's of Confidentiality Agreements
The 5 No's of Confidentiality Agreements
 
Non-disclosure for Work In Progress (WIP)
Non-disclosure for Work In Progress (WIP)Non-disclosure for Work In Progress (WIP)
Non-disclosure for Work In Progress (WIP)
 
12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused
 
Update your NDA to include the new DTSA Act
Update your NDA to include the new DTSA ActUpdate your NDA to include the new DTSA Act
Update your NDA to include the new DTSA Act
 
Non-compete vs. Non-disclosure
Non-compete vs. Non-disclosureNon-compete vs. Non-disclosure
Non-compete vs. Non-disclosure
 
4 tools you can use to sign NDA's online
4 tools you can use to sign NDA's online4 tools you can use to sign NDA's online
4 tools you can use to sign NDA's online
 
Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?
 
10 clauses to have in Non-Disclosure Agreements (NDA)
10 clauses to have in Non-Disclosure Agreements (NDA)10 clauses to have in Non-Disclosure Agreements (NDA)
10 clauses to have in Non-Disclosure Agreements (NDA)
 

Recently uploaded

1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 

Recently uploaded (20)

1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 

NDA Not Enough to Protect Confidential Information

  • 1. NDA not enough to protect confidential information
  • 2. Sometimes, during these meetings, details of confidential information have to be revealed in order to progress your objectives. Non-disclosure agreements (NDAs) are an excellent legal tool to help provide some protection for any confidential information that you may have to share in such meetings, in addition to other intellectual property protection options such as patents and copyrights.
  • 3. What steps should you take to protect confidential information?
  • 4. Step 1: Read the NDA Make sure that you understand the terms and consequences of any NDA that you use and/or sign. If you don’t wish to use a marking procedure for your confidential information, i.e. all information marked as "Confidential" is confidential, then don’t include this requirement in your NDA.
  • 5. Step 2: Make sure your definition of confidential information matches your information Make sure that your definition of confidential information fits the information that you intend to share. If you do intend to mark your confidential information as "Confidential," then consider inserting a clause that states that your confidential information needs to be kept confidential anyway and not misused, even if you omit to mark or confirm in writing.
  • 6. Step 3: Have good procedures in place for marking information as "Confidential" Marking confidential information is indeed helpful for clear identification of confidential information, but it can be burdensome. Also, if in doubt, it makes more sense to mark a piece of information as confidential rather than to allow confidential information to be disclosed without protection. The consequences are much worse in the second option.
  • 7. Step 4: Mark your presentation directly Customer Lifetime Value in Digital Marketing (1) where the words “Confidential & Proprietary” are used in the whole presentation’s index: Sarawak Energy (2) where the word “Confidential” is included in the title of the presentation and in the index of the presentation itself, the words “Private & Confidential - Do not duplicate or distribute without written permission” is used: (1) Link to http://www.slideshare.net/mediocz/customer-lifetime-value-in-digital-marketing?qid=a919f41c-5e7d-4e26-9596-b00ee8a94532&v=&b=&from_search=22 (2) Link to http://www.slideshare.net/altugauw/sarawak-energy-confidential?qid=a919f41c-5e7d-4e26-9596-b00ee8a94532&v=&b=&from_search=28
  • 8.
  • 9.
  • 10. Step 5: Regularly review your procedures to ensure compliance Because of this, it’s important that you review your procedures with members of your staff periodically to ensure compliance with the terms of your NDA. The necessity to review your agreement and procedures also apply to all other types of intellectual property agreements as well.
  • 11. Step 6: Don't assume that the other party will act with integrity Although you should always seek to partner with companies that operate with integrity, you should also ensure that your intellectual property rights are properly protected. There's no guarantee that initial discussions will result in a future working relationship together.