Browse Definitions:
Definition

non-disclosure agreement (NDA)

A non-disclosure agreement (NDA), also known as a confidentiality agreement, is a legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time. NDAs are used to protect sensitive information and intellectual property (IP) by outlining in detail what information must remain private and what information can be shared or released to the public.

NDAs are typically signed at the beginning of a business relationship. The information covered by a NDA can be unlimited, ranging from test results to system specifications to customer lists and sales figures. If the NDA is broken and information is leaked, it is considered a breach of contract.

Key elements of a NDA include:

  • Identification of the participants
  • Definition of what is considered to be confidential
  • Duration of the confidentiality commitment
  • Exclusions from confidential protection

NDAs are commonly used at technology companies when products are jointly developed. In such a case, the NDA is often mutual or two-way. An NDA can also be useful when a company seeks venture capital from potential backers. In this scenario, the NDA ensures that investors can access the information they need to make a financial decision, but not exploit it.

In addition to an NDA, potential investors may be asked to sign a non-compete agreement (NCA) which prevents the investor from using information acquired during negotiation to gain a competitive advantage. Such considerations are especially important when patents have been applied for but have not yet been issued.

This was last updated in April 2017

Continue Reading About non-disclosure agreement (NDA)

Join the conversation

4 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Have you experienced a breach of a non-disclosure agreement? What happened?
Cancel
Do this mean that if receive something and do sign a non-disclosed agreement and agree not speak about for ten years, do this mean that it can't be taken from me unless I speak about.
Cancel
Timely blog post - I was fascinated by the info , Does anyone know where my business might find a template HBS Non-Disclosure Agreement example to work with ?
Cancel



Do you have any lucrative business idea or existing business that needs funding? We help individuals and companies to obtain funds for business expanding and to setup a new business ranging any amount. Get funded at affordable interest rate of 3%,for more info contact us via email: dominionloanfirm.ltd@outlook.com
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close