Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Confidential information is often the beating heart of a small business - your customer lists, pricing models, product roadmaps, recipes, algorithms or supplier terms can give you a real edge.
When that information slips out, the consequences can be serious. Lost deals, competitors getting ahead, reputational damage and costly disputes can follow.
The good news? With the right contracts, policies and practical steps, you can reduce your risk dramatically - and if a breach of confidence does happen, there are clear options to respond quickly and effectively.
In this guide, we’ll explain what a breach of confidence is under Australian law, common scenarios to watch for, how to prevent issues with simple legal tools, and the steps to take if something goes wrong.
What Is A Breach Of Confidence?
A “breach of confidence” is when someone uses or discloses information that is confidential, in circumstances where they knew (or should have known) it was confidential, without permission and in a way that causes detriment.
In practical terms, courts in Australia generally look for three things:
- The information has the necessary quality of confidence - it’s not public, and it has commercial value because it’s secret.
- The information was shared in circumstances importing an obligation of confidence - for example, under a contract, NDA, or a business relationship where confidentiality is expected.
- There was unauthorised use or disclosure that caused (or could cause) harm to the business that owns the information.
Confidentiality and privacy are related but different concepts. Privacy laws deal with personal information about individuals, whereas confidentiality can protect a broad range of commercially sensitive business information. If you’re weighing up the difference, it helps to keep in mind the difference between privacy and confidentiality when deciding which frameworks apply to your situation.
Common Business Scenarios Where Breaches Happen
Most breaches aren’t headline-grabbing leaks - they’re everyday moments where controls are weak or expectations are unclear. Watch for these situations:
1) Onboarding Or Offboarding Staff
Employees often access client lists, internal playbooks and strategy documents. Without clear confidentiality terms and offboarding checklists, information can walk out the door when someone changes roles or leaves.
2) Pitching To Partners, Suppliers Or Investors
You might share prototypes, pricing models or forecasts during a pitch or pilot. If you don’t set ground rules up front (ideally in writing), you’re relying on trust rather than enforceable obligations.
3) Contractors And Freelancers
External specialists often get deep access quickly. If your contractor agreement doesn’t include robust confidentiality and IP provisions, it’s hard to control how information is handled or returned.
4) Cloud Tools, Shared Drives And Email
Accidental sharing happens - a misaddressed email, open access links, or shared folders without permissions. These slip-ups can still amount to a breach with real consequences.
5) Product Launches And Marketing
It’s easy to reveal “too much” in case studies, social posts or demos. Even a screenshot can give away unreleased features, internal metrics or sensitive customer details.
How Do You Prevent A Breach Of Confidence In Your Business?
Prevention starts with two pillars: clear legal obligations and sensible operational controls. Here’s a practical framework you can apply right away.
Put The Right Contracts In Place
- Non-Disclosure Agreement (NDA): Use an Non-Disclosure Agreement before sharing sensitive information with potential partners, suppliers, advisors or investors. A tailored NDA clarifies what is confidential, how it can be used, and how long obligations last.
- Employment Contract: Ensure your Employment Contract includes strong confidentiality obligations, post-employment restrictions on use of confidential information, and clear return-of-property requirements.
- Contractor Agreements: Apply similar confidentiality and IP ownership clauses to contractors and freelancers. If they create material for you, make sure your business owns it (and it stays confidential).
- Customer and Supplier Contracts: Add confidentiality clauses to service agreements and supply terms so both sides know what they can and can’t disclose.
Set Clear Internal Policies And Access Controls
- Information Handling Policy: Define what your business considers “confidential,” how it should be labeled, stored, shared and retained. Keep it simple and actionable.
- Need-to-Know Access: Use “least privilege” access on shared drives and tools. Limit sensitive folders to those who need them to do their job.
- Onboarding And Offboarding: Include confidentiality acknowledgements at onboarding, and ensure accounts are disabled and files returned on exit.
- Training And Culture: Run short refreshers so everyone knows how to handle client data, internal docs and third-party secrets entrusted to your business.
Plan For Incidents In Advance
Even well-run businesses have slip-ups. A simple playbook helps you move fast and reduce harm.
- Data Breach Response: If you handle personal information, build a practical Data Breach Response Plan so your team knows who to notify, how to contain an incident and when reporting obligations apply.
- Customer Transparency: If personal information is involved, be clear in your Privacy Policy about what you collect and how you protect it. This isn’t a substitute for confidentiality, but it reinforces trust and compliance.
What Should You Do If A Breach Of Confidence Happens?
Stay calm, act quickly and create a short paper trail of what you did and when. Here’s a practical sequence we often recommend to small businesses.
1) Contain And Preserve Evidence
- Identify what information was accessed or shared, by whom, and how (email, shared folder, messaging app, verbal).
- Limit further access immediately - revoke permissions, change passwords and disable accounts if needed.
- Secure evidence: save emails, chat logs, audit trails and screenshots. Avoid editing original files; keep copies instead.
2) Assess The Risk And Impact
- Is the information now public or in the hands of a competitor?
- What’s the commercial value and sensitivity of the information?
- Is personal information involved (which may trigger privacy and notification obligations)?
3) Enforce Your Rights
- Reach out quickly to the person or business involved, explain the obligations, and demand they stop using or sharing the information.
- Send a formal letter where appropriate. Many businesses choose to issue a carefully worded cease and desist letter to preserve their position and seek undertakings.
- If there’s an urgent risk (e.g. looming publication), urgent court orders may be available - speak with a lawyer about interim injunctions and preserving confidentiality.
4) Consider Contractual Claims Too
Often, the breach of confidence overlaps with a contractual breach (for example, breaking a confidentiality clause in a services agreement). It can be helpful to assess your position under both confidentiality and contract frameworks and decide which path (or combination) best meets your goals. Our overview of breach of contract sets out how those claims typically work for Australian businesses.
5) Manage Stakeholders And Compliance
- If customers or partners are affected, prepare a factual, calm update to help maintain trust.
- If personal information is involved, follow your Data Breach Response Plan to assess whether to notify regulators or individuals, and in what timeframe.
- Record what happened and the steps you took. This documentation is useful for legal strategy and future prevention.
What Remedies Are Available Under Australian Law?
Remedies aim to stop the damage and compensate for loss. Depending on the facts, the court may grant one or more of the following:
- Injunctions: Orders stopping someone from using or disclosing your confidential information, including urgent interim orders if there’s an immediate risk.
- Delivery Up/Destruction Orders: Requiring return or destruction of documents, devices or files containing your confidential information.
- Damages: Compensation for the loss your business suffered because of the breach. This can include lost profit or other measurable harm.
- Account Of Profits: In some cases, the wrongdoer may be required to hand over the profits they made from misusing your confidential information.
- Declarations And Costs: A formal declaration that a breach occurred and, where appropriate, an order that the other party contributes to your legal costs.
Often, businesses resolve these matters without going to court - for example, by securing immediate undertakings to stop the conduct, return materials and pay costs. Early legal advice helps you choose a strategy that balances speed, cost and outcome.
Practical Tips To Strengthen Confidentiality Day-To-Day
Small changes add up. Here are simple measures that make a real difference.
- Label Sensitive Material: Mark files and slides “Confidential” so there’s no ambiguity about status and handling expectations.
- Use Clean Sharing: Avoid emailing attachments when possible. Share access-controlled links and revoke access after the project wraps up.
- Control Screens And Rooms: Be mindful of whiteboards, glass meeting rooms and background screens during calls and events.
- Keep Pitches Tight: In early discussions, share only what’s necessary, and put an NDA in place before you go deep on strategy, pricing or product architecture.
- Refresh Contracts: As your business evolves, check your employment, contractor and partner contracts still reflect how you operate (and what must stay confidential).
- Close The Loop On Exit: Confirm return or deletion of confidential information when staff, contractors or suppliers move on. A simple “confirmation of deletion/return” email helps.
Frequently Asked Questions
Does Information Have To Be Marked “Confidential” To Be Protected?
No - labelling helps, but it’s not essential. What matters is that the information is not public, has value because it’s secret, and was shared in circumstances importing an obligation of confidence.
Do I Always Need A Written NDA?
Obligations of confidence can arise without a written contract (for example, through the nature of the relationship and circumstances), but a written Non-Disclosure Agreement gives clarity and makes enforcement easier. It’s a low-cost, high-impact protection tool for small businesses.
How Is Confidentiality Different From Privacy?
Confidentiality protects business secrets and commercially sensitive information. Privacy law protects personal information about individuals. The frameworks often overlap in practice; start with your Privacy Policy for personal data, and use contracts and internal controls for broader commercial confidentiality. For more context, this overview of the difference between privacy and confidentiality is a helpful primer.
What If The Breach Was An Accident?
Intent isn’t always required for a breach of confidence. If confidential information is disclosed without authorisation and causes detriment, remedies may still apply. That said, quick containment and cooperative steps can often resolve matters commercially.
Can I Share Confidential Information With My Lawyer Or Accountant?
Generally yes - disclosures to advisers for the purpose of getting professional advice are typically carved out in NDAs and confidentiality clauses. Check your contracts and share only what’s reasonably necessary.
Key Legal Documents To Have In Place
Every business is different, but most small businesses should consider the following documents as part of their confidentiality toolkit:
- Non-Disclosure Agreement (NDA): Before you pitch, explore partnerships or let contractors into your systems, set clear rules with an NDA.
- Employment Contract: Include confidentiality, IP ownership and post-employment obligations in your Employment Contract.
- Contractor Agreement: Mirror the same confidentiality and IP protections with external providers.
- Customer/Supplier Terms: Add confidentiality clauses to your service terms and procurement templates so sensitive information flows safely in both directions.
- Privacy Policy: If you collect personal information, publish a clear Privacy Policy and back it up with strong internal practices.
- Incident Playbook: A short Data Breach Response Plan helps your team act quickly if something goes wrong.
Key Takeaways
- A breach of confidence occurs when confidential information is misused or disclosed without permission in circumstances importing an obligation of confidence and causing detriment.
- Most risks arise in everyday moments - onboarding/offboarding, pitching to partners, contractor access and casual over-sharing in tools or marketing.
- Prevention starts with strong contracts (NDA, employment and contractor terms), sensible access controls and short, practical policies and training.
- If a breach happens, act fast: contain, preserve evidence, assess impact, enforce obligations and manage stakeholders and compliance.
- Remedies can include injunctions, delivery up/destruction, damages and account of profits, often resolved commercially with undertakings.
- Combine confidentiality tools with your privacy framework: use a clear Privacy Policy for personal information and robust contracts for broader commercial secrets.
If you’d like a consultation about preventing or responding to a breach of confidence in your business, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.








