Browse Definitions:
Definition

non-compete agreement (NCA)

Contributor(s): Ivy Wigmore

A non-compete agreement (NCA) is a legally binding restrictive covenant designed to prevent the signee from exploiting competitive advantages gained through association with the other party in the agreement. The agreement usually stipulates a period of time that the NCA will be in effect and a geographic area that it includes.

The purpose of an NCA is protecting the employer's business assets. At its simplest, an NCA might prevent a former employee from starting a business that would compete with the employer or accepting employment with a current competitor. That stipulation is designed to prevent a competitor from benefiting from information the former employee gained through his term with the company. Examples of such information include trade secrets, product designs and other intellectual property, as well as sensitive information including customer data, operational data and marketing plans.

Employees usually gain expertise the systems they work with over the term of their employment, and that expertise is not subject to restriction. A network administrator, for example, may leave a company with more skills than he or she had at the start of the job. An NCA cannot prevent the employee from using general skills gained while they were with the company.

A well-crafted NCA should adequately protect the company without unduly hampering the employee's future. Overly restrictive NCAs can effectively make it impossible for the signee to find a job in their chosen field that doesn't require them to relocate.

Commonly, an NCA is signed by an employee as part of a severance agreement, although some businesses require new hires to sign them. Non-compete agreements signed in one jurisdiction may or may not be binding in another, depending on local laws.

See also: non-disclosure agreement (NDA)

This was last updated in March 2017

Continue Reading About non-compete agreement (NCA)

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Does your company require employees to sign non-compete agreements?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close