Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
- What Is A Breach Of Confidentiality?
- Common Ways Confidentiality Breaches Happen In Small Businesses
- Key Contracts And Policies That Protect Confidential Information
- When Is Breaking Confidentiality Lawful?
- Are Confidentiality Clauses And NDAs Enforceable?
- Practical Tips For Working With Partners, Contractors And Staff
- What If The Other Side Says “There’s No Contract”?
- How Confidentiality Interacts With Privacy And Cybersecurity
- Key Takeaways
Confidential information is often one of your most valuable business assets. Whether it’s client lists, pricing models, supplier terms, product roadmaps or source code, keeping your information secret can be the difference between growth and losing your competitive edge.
But what happens when there’s a breach of confidentiality? As a small business owner, it’s important to understand what counts as a confidentiality breach, what you should do in the first 24-72 hours, and how to reduce the risk of it happening again.
In this guide, we’ll walk through the practical steps to manage a breach, the legal options that may be available to you in Australia, and the contracts and policies that help keep your information safe from day one.
What Is A Breach Of Confidentiality?
A breach of confidentiality (also called a confidentiality breach or breaking confidentiality) is when someone improperly uses or discloses information that is meant to be kept secret.
In a business context, there are three main legal pathways that protect confidential information in Australia:
- Contract: Your confidentiality obligations written into a contract (for example, a Non-Disclosure Agreement or an Employment Contract).
- Equity (duty of confidence): Courts can protect information shared in circumstances importing an obligation of confidence, even without a contract (e.g. pitching to a potential partner who knows the information is confidential).
- Statute: Specific laws may apply depending on the type of information, such as the Privacy Act for personal information and the Notifiable Data Breaches (NDB) scheme, or sector-specific obligations.
Not every piece of information is “confidential” in law. Generally, it needs to be secret (not public), valuable to the business, and shared under circumstances of confidence. Labelling documents “Confidential” helps, but context and contract terms matter most.
Common Ways Confidentiality Breaches Happen In Small Businesses
Most breaches aren’t Hollywood-style hacks. They’re everyday slip-ups or avoidable decisions. Some common examples include:
- Former employees taking client lists, templates, or code to a competitor, despite contractual obligations.
- Suppliers or contractors reusing your IP in other jobs, contrary to your agreement.
- Team members sharing internal pricing or margin info with friends or on social media.
- Emails or documents sent to the wrong recipient (auto-complete mishaps are common).
- Poor access controls, shared passwords, or lost devices containing sensitive files.
- Pitches or demos where confidential details are shared without a clear Non-Disclosure Agreement.
It’s also worth distinguishing a confidentiality breach from a “data breach.” If personal information is involved, you may have separate reporting obligations under the Privacy Act and the NDB scheme. That’s why it’s smart to keep a living Data Breach Response Plan alongside your confidentiality processes.
What Should You Do If A Confidentiality Breach Occurs?
Speed matters. The first 24-72 hours can determine whether you contain the risk or lose control of your information. Here’s a structured approach that small businesses can follow.
1) Contain The Breach
- Disable or restrict access for any accounts involved (e.g. suspend user logins, revoke third-party access keys).
- Secure devices (remote wipe if possible), reset passwords, and tighten sharing settings on storage tools.
- Pull down mistakenly shared posts or files and request deletion or return of documents where appropriate.
2) Preserve Evidence
- Save emails, screenshots, system logs, and audit trails that show who accessed what and when.
- Keep a timeline of events and decisions. This will help your legal team assess your options quickly.
- Avoid tipping off a third party in a way that could prompt wider dissemination before you seek advice.
3) Assess What Was Disclosed
- Identify the type of information (trade secrets, financials, customer lists, source code).
- Check the contractual position: do you have an NDA, confidentiality clause, or IP ownership clause in place?
- Confirm whether personal information is involved (Privacy Act/NDB scheme may apply).
4) Get Legal Advice Early
- If you act promptly, options like cease-and-desist letters, undertakings, or urgent court orders (injunctions) may be more accessible.
- Where there’s a contract in place, legal remedies for breach of contract could include damages or an account of profits.
- In many cases, you can resolve matters commercially via a Deed of Settlement that secures the return or destruction of materials and prevents further use.
5) Consider Notifications And Communications
- If personal information was compromised, consider whether you must notify affected individuals under the NDB scheme.
- Prepare clear internal messaging to avoid speculation and ensure staff know the next steps.
- For significant incidents, manage external communications carefully to protect your brand.
6) Remediate And Learn
- Review access permissions, offboarding processes, and contractor controls.
- Update your workplace policies and training, and ensure critical terms are in your contracts.
- Roll out practical security improvements (MFA, role-based access, secure file-sharing, device encryption).
How To Prevent A Breach Of Confidentiality In Your Business
Prevention is about people, process and paperwork. Small, consistent improvements create strong protection over time.
People: Culture And Training
- Onboard staff with a clear explanation of what is confidential, why it matters, and how to handle it.
- Run short refresher sessions (even 15 minutes quarterly) to keep confidentiality top-of-mind.
- Limit access to “need to know.” Not everyone needs every folder or customer list.
Process: Practical Controls
- Implement multi-factor authentication (MFA) and strong passwords.
- Use role-based access in cloud platforms and review permissions regularly.
- Adopt clean offboarding procedures: retrieve devices, revoke access, and remind departing staff of continuing obligations.
- Keep a step-by-step incident playbook and pair it with your Data Breach Response Plan.
Paperwork: Contracts And Policies
- Use targeted NDAs when sharing sensitive information with potential partners, investors or suppliers.
- Ensure every employee and contractor agreement includes robust confidentiality, IP ownership and post-employment obligations.
- Maintain clear internal policies (confidentiality, BYOD, social media, offboarding) so expectations are understood and enforceable.
Key Contracts And Policies That Protect Confidential Information
The right documents make it much easier to prevent issues and enforce your rights if something goes wrong. Consider the following:
- Non-Disclosure Agreement (NDA): A targeted NDA sets out what information is confidential, how it can be used, and what must happen if there’s a leak. Use an NDA when exploring partnerships, pitching, or giving third parties access.
- Employment Contract: Include clear confidentiality and IP ownership clauses, plus reasonable post-employment obligations that deter misuse of information. A tailored Employment Contract is essential from day one.
- Contractor Agreement: For freelancers or vendors, mirror confidentiality and IP terms so your rights aren’t left to chance.
- Workplace Policies: A practical, plain-English workplace policy helps your team understand day-to-day expectations (access, sharing, devices, exits).
- IP Assignment: Make sure creators formally transfer IP to your business where needed-an IP Assignment can avoid ownership disputes later.
- Privacy Policy: If you collect personal information (most businesses do), your Privacy Policy explains how you handle it and supports compliance with the Privacy Act.
- Deed Of Settlement: If a breach occurs, a negotiated Deed of Settlement can secure return or destruction of materials, undertakings and compensation without going to court.
Not every business needs all of these documents immediately, but most growing businesses will need several. Ensuring they’re tailored to your operations will maximise protection and enforceability.
When Is Breaking Confidentiality Lawful?
There are limited situations where disclosing confidential information may be lawful or justified, for example:
- Where disclosure is required by law, a court order, or to prevent a serious threat to life, health, or safety.
- Where the recipient already knew the information or it’s in the public domain (and not because they disclosed it).
- Where a person makes a protected disclosure under whistleblowing regimes. Larger companies and certain entities may also require a compliant Whistleblower Policy.
These exceptions are narrow. If you’re unsure whether an exception applies, it’s best to get advice before acting-both to protect your rights and to avoid making an allegation that doesn’t hold up legally.
Are Confidentiality Clauses And NDAs Enforceable?
Generally, yes-if they’re well-drafted and reasonable. Courts are more likely to enforce clauses that:
- Define “Confidential Information” with enough clarity and include sensible exclusions (e.g. information already public).
- Limit use to a clear purpose (e.g. evaluating a proposal) and restrict disclosure to those who genuinely need to know.
- Set out obligations on return or destruction of information when the relationship ends.
- Avoid being overly broad in scope or duration (unreasonable restraints may be challenged).
Where there’s a breach, the remedies depend on your legal basis (contract, equity, or statute) and the harm suffered. Remedies can include injunctions (urgent orders to stop use or disclosure), damages, delivery up or destruction of materials, and in some cases, an account of profits.
Practical Tips For Working With Partners, Contractors And Staff
Most confidentiality risks arise through everyday relationships. A few practical habits go a long way:
- Use an NDA before early-stage discussions where strategy, pricing, or technical detail will be shared.
- Share in stages-don’t hand over the “secret sauce” until you need to, and only to authorised people.
- Control file access with expiring links and view-only permissions where possible.
- Record who you shared information with and why. A simple register can save time if something goes wrong.
- Include clear confidentiality and IP terms in supplier and contractor agreements, not just employment documents.
- On exit, remind departing team members of their continuing obligations and collect written acknowledgements.
What If The Other Side Says “There’s No Contract”?
All is not lost. Even without a signed NDA, you may still be protected by the equitable duty of confidence if the information was shared in circumstances importing confidence (for example, during a pitch where you marked slides as “Confidential” and explained the sensitivity).
The strength of your position usually improves with contemporaneous records: emails, meeting notes, slide footers, access logs, and the way information was presented (e.g. limited access, need-to-know basis). That said, having the right contract in place makes enforcement faster and clearer-so it’s worth building NDAs and confidentiality clauses into your standard operating rhythm.
How Confidentiality Interacts With Privacy And Cybersecurity
Confidentiality is about keeping business secrets and commercially sensitive data protected. Privacy laws focus on how you collect, use and secure personal information about individuals. In practice, they overlap:
- If a confidentiality breach involves personal information, you may also have a “data breach.” Your Data Breach Response Plan should set out how you assess and notify under the NDB scheme.
- Strong privacy hygiene-like a clear Privacy Policy, data minimisation and access controls-reduces both privacy and confidentiality risk.
- Cybersecurity measures (MFA, endpoint protection, backups) are key operational layers that support your legal obligations.
Thinking about these areas together helps you respond coherently if something goes wrong.
Key Takeaways
- A breach of confidentiality happens when someone improperly uses or discloses secret business information; you can protect it via contracts, equity, and in some cases statute.
- Act fast if a breach occurs: contain access, preserve evidence, assess what was disclosed, seek legal advice early, and communicate carefully.
- Prevention is about people, process and paperwork-limit access, train your team, and embed robust confidentiality terms in your agreements and policies.
- Core documents that help include an NDA, tailored Employment Contract, practical workplace policies, an IP Assignment where relevant, and a Privacy Policy.
- Where appropriate, commercial resolution through a Deed of Settlement can secure undertakings and avoid lengthy disputes.
- Getting advice early improves your chances of quick containment, effective remedies, and long-term risk reduction.
If you’d like a consultation on managing or preventing a breach of confidentiality in your business, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.








