Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Sharing great ideas is part of doing business - pitching to a client, getting a supplier on board, or briefing a new hire. But if that information lands in the wrong hands, you can lose your competitive edge fast.
That’s where “Commercial in Confidence” comes in. It’s a common label that signals information is secret and valuable to your business, but the label alone won’t protect you. To really safeguard your sensitive data in Australia, you need the right mix of contracts, policies, and practical processes.
In this guide, we break down what “Commercial in Confidence” means, where it applies, and - most importantly - how to protect your confidential information in the real world.
What Does “Commercial In Confidence” Mean In Australia?
“Commercial in Confidence” (sometimes written as “Commercial-In-Confidence” or C-I-C) is a way of marking information as confidential in a business context. You’ll see it on proposals, pricing sheets, roadmaps, and tender documents.
However, simply stamping a document “Commercial in Confidence” doesn’t create legal rights by itself. Confidentiality is protected by contract law, equity (the common law duty of confidence), and sometimes by statute - not by a label alone.
It also helps to understand the difference between privacy and confidentiality. Privacy relates to personal information and the Privacy Act. Confidentiality covers commercially sensitive business information (like pricing, source code, or strategies) and is typically protected by agreements and common law duties.
Where Businesses Commonly Use Commercial-In-Confidence Information
Almost every business handles confidential information. Common examples include:
- New product designs, specifications, formulas and source code
- Pricing models, margin analysis, business plans and go-to-market strategies
- Client lists, sales pipelines and CRM data
- Supplier terms, discount structures and tender submissions
- M&A due diligence materials and financial reports
- Internal policies, training materials and HR files
The risk is straightforward: if this information is disclosed or misused, your business could suffer reputational harm, lost revenue, or a weakened negotiating position. That’s why a proactive protection plan matters.
How To Protect Confidential Information In Practice
1) Identify And Classify What’s Confidential
Start by mapping the types of sensitive information you hold and who needs access. Classify them (for example, “internal”, “confidential”, “restricted”) and document how each class should be handled. Clear definitions help your team make consistent decisions.
2) Use The Right Contracts (Before You Share)
Put a Non-Disclosure Agreement (NDA) in place before you share your secret sauce with anyone outside your business. The NDA should define what’s confidential, how it can be used, who it can be shared with (if anyone), and for how long the obligations last.
For ongoing relationships, don’t rely on standalone NDAs alone. Bake confidentiality clauses into your main contracts to avoid gaps down the track.
3) Lock It Into Employment And Contractor Terms
Team members access your most sensitive information day-to-day. Ensure every hire signs an Employment Contract with robust confidentiality, IP ownership, return-of-materials and post-employment obligations (like non-solicitation).
For external talent, a tailored Contractor Agreement should cover confidentiality, data security requirements, and what happens at the end of the engagement. This is essential when contractors work remotely or use their own devices.
4) Establish Policies And Training
Contracts set expectations, but policies drive everyday behaviour. An Information Security Policy can set rules around passwords, access controls, encryption, removable media, and remote work. Train your team on how to recognise confidential information and how to handle it safely.
Make confidentiality a standard part of onboarding, and include regular refreshers. Culture matters here - when leaders model good data hygiene, teams follow.
5) Apply Practical, Technical Controls
- Use “need-to-know” access and role permissions in your systems.
- Protect shared files with expiring links, watermarks and view-only modes where appropriate.
- Keep clean audit trails (e.g. data room logs) for due diligence and investor processes.
- Mark documents “Commercial in Confidence” and include a short confidentiality footer to set expectations.
- Have a clear offboarding process: revoke access, retrieve devices, confirm return or destruction of confidential materials.
6) Plan For Incidents (Because They Happen)
Despite best efforts, mistakes and breaches can happen - an email sent to the wrong recipient, a lost laptop, or a compromised account. A tested incident plan will save you time and stress.
For personal information, Australia’s Notifiable Data Breaches (NDB) scheme may apply. A written Data Breach Response Plan sets out how to assess, contain and notify in line with the Privacy Act’s requirements.
Key Australian Laws That Support Confidentiality
Several areas of Australian law help protect Commercial-In-Confidence information:
- Contract Law: Confidentiality obligations in NDAs and master agreements are legally enforceable. This is your first line of defence.
- Equitable Duty Of Confidence: Even without a contract, courts can restrain misuse of information that was shared in circumstances importing an obligation of confidence (for example, sensitive information disclosed in a pitch).
- Privacy Act 1988 (Cth): If confidential information includes personal information, the Australian Privacy Principles (APPs) apply. You’ll usually need a Privacy Policy and, in many cases, a Privacy Collection Notice to meet transparency requirements.
- Notifiable Data Breaches (NDB) Scheme: Where an eligible data breach occurs, you may need to notify affected individuals and the OAIC. This is where your Data Breach Response Plan is crucial.
- Intellectual Property: Trade secrets are protected by confidentiality, not registration. For brand elements (like your logo and product names), consider trade mark protection to discourage copycats and reduce confusion in the market.
- Employment Law: Staff owe duties of fidelity. Well-drafted post-employment clauses (like non-solicitation) can limit harm if someone leaves with sensitive know-how. Pair these with structured offboarding.
- Whistleblower Protections: Certain disclosures are protected by law even if a contract says “keep this confidential.” Design your internal reporting process to be safe and compliant.
Essential Documents To Put In Place
Most businesses won’t need every document below on day one, but many will need several. The key is to tailor them to how your business actually operates.
- Non-Disclosure Agreement: Sets out what’s confidential, how it can be used and for how long. Use before sharing sensitive information with external parties.
- Employment Contract: Builds confidentiality and IP ownership into your relationship with staff, and sets clear return-of-materials obligations when employment ends.
- Contractor Agreement: Mirrors your employment protections for contractors, including confidentiality and data security standards.
- Privacy Policy: Explains how your business collects, uses and stores personal information - essential if you handle customer or employee personal data.
- Information Security Policy: Sets technical and procedural safeguards for devices, systems and data handling across your organisation.
- Data Breach Response Plan: A playbook for assessing and responding to incidents, including your obligations under the NDB scheme.
- Confidentiality Clauses In Customer/Supplier Contracts: Include clear confidentiality, permitted use and return/destroy provisions in your terms and key agreements.
- Offboarding Checklist: A practical list to remove access, retrieve equipment and verify deletion/return of confidential materials from departing staff or vendors.
Depending on your model, you may also use secure data room protocols for funding rounds or tenders, and add tailored confidentiality schedules to your enterprise contracts.
Handling Confidentiality With Third Parties And In Deals
Confidentiality risk increases when more people get involved. A few proven practices can keep you safe while you grow.
Investor Pitches And Vendor Demos
Send a short deck first. If the conversation progresses, move to a signed NDA and only then share sensitive details or live access. Keep a record of what was shared, when, and to whom.
Tenders And Procurement
Use a secure portal with controlled, time-limited access and download restrictions where possible. Mark documents “Commercial in Confidence” and ensure your submission terms don’t waive confidentiality.
Due Diligence And Data Rooms
Set strict access rules, watermark documents, and segment folders on a “need-to-know” basis. Keep an exportable audit trail to help you trace any leaks quickly.
Cross-Border Considerations
If overseas recipients need access, confirm where the data will be stored and which laws apply. Align your contracts and security standards to the highest risk profile, not the lowest.
What Happens If Confidentiality Is Breached?
Act fast and follow a calm, structured approach.
- Contain: Revoke access, change credentials, and secure affected systems and accounts.
- Assess: Identify what information was accessed, by whom, and the potential harm. If personal information is involved, assess whether the breach is likely to cause serious harm (NDB test).
- Notify: Where required, notify affected individuals and the OAIC under the NDB scheme. Use your response plan to stay on track.
- Enforce: Consider legal options such as a cease-and-desist, urgent undertakings, or an injunction to stop further disclosure or misuse. Your contracts and evidence trail are crucial here.
- Remediate: Close gaps, retrain staff, and adjust policies or vendor arrangements so it doesn’t happen again.
The right preparation means you can respond quickly, limit harm, and demonstrate compliance to regulators, customers and partners.
Key Takeaways
- “Commercial in Confidence” is a helpful label, but real protection comes from contracts, policies and consistent practices.
- Use a layered approach: NDAs before sharing, confidentiality in core agreements, and clear internal policies with training and access controls.
- Australian law supports confidentiality through contract, common law duties, the Privacy Act and the NDB scheme - know which apply to your scenario.
- Have the essentials in place: an NDA, robust employment and contractor terms, a Privacy Policy, an Information Security Policy and a Data Breach Response Plan.
- When working with investors, vendors or tenders, use secure portals, limit access, watermark documents and keep audit logs.
- If a breach occurs, contain it quickly, assess impacts, meet notification requirements and consider urgent enforcement to stop misuse.
If you’d like tailored advice on protecting Commercial-In-Confidence information in your business, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.








