Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Every successful business has something special under the hood - the recipe that makes your product unique, the code that powers your platform, the supplier terms you’ve negotiated, or the customer insights you’ve spent years building.
These “confidential trade items” (often called trade secrets or confidential information) can be some of your most valuable assets. If they walk out the door, so can your competitive edge.
In this guide, we’ll break down what counts as confidential trade items in Australia, the legal tools you can use to protect them, and the practical steps to build a strong confidentiality program. With the right approach, you can reduce risk and keep your secret sauce, secret.
What Are Confidential Trade Items?
Confidential trade items are any pieces of information that give your business an advantage, aren’t generally known, and are kept secret through reasonable steps. They can be technical, commercial or operational.
Common examples
- Formulas, methods, algorithms and source code
- Product roadmaps, R&D data and prototypes
- Supplier pricing, margin models and tender strategies
- Customer lists, segmentation, churn models and LTV data
- Manufacturing processes, quality controls and SOPs
- Marketing plans, media rates, A/B test results and playbooks
To qualify for protection under Australian law, information should be truly confidential (not public), have commercial value because it’s secret, and be subject to reasonable steps to keep it that way. A casual “please keep this quiet” usually isn’t enough - you need a system.
It’s also useful to understand how confidentiality differs from privacy. Privacy laws regulate personal information about individuals, while confidentiality can cover any kind of business information. If you handle both, it helps to address the difference between privacy and confidentiality in your policies and training.
Why Protecting Confidential Trade Items Matters
When confidential information leaks, it can be copied instantly and used anywhere. That’s why prevention is far better (and cheaper) than cure.
Key risks if you don’t act
- Competitors undercut your pricing or copy features before launch
- Loss of negotiating power with suppliers or partners
- Erosion of brand value and investor confidence
- Disputes with employees, contractors or co-founders
- Costly litigation with uncertain outcomes
Courts in Australia will look closely at whether you took reasonable steps to keep information confidential. Clear contracts, practical controls and consistent behaviour all help show you treated the information as a trade secret worth protecting.
What Legal Tools Can You Use To Protect Confidential Information?
A layered approach works best. Pair strong contracts with the right IP registrations and day-to-day controls. Here are the core legal tools most Australian businesses use.
Non-Disclosure Agreements (NDAs)
An NDA sets out what is confidential, how it can be used, and for how long. Use NDAs with potential hires, suppliers, advisors, investors and collaborators before sharing sensitive details. Depending on the situation, you might prefer a one-way or a Mutual Non-Disclosure Agreement. If you’re sharing most of the information one way (e.g. to a contractor), a standard Non-Disclosure Agreement may be more suitable.
Employment Contracts And Restraints
Your people often access the most sensitive information, so your protections should start at onboarding. Ensure every staff member signs a clear Employment Contract with confidentiality obligations that continue after employment ends. For key roles, consider tailored post-employment restraints (such as non-compete or non-solicit provisions) - these must be reasonable in scope, time and geography, so it’s wise to get Restraint of Trade Advice.
Intellectual Property (IP) Registrations
Not all confidential information can or should be patented or registered, but some brand and product elements should be. Register your name and logo as trade marks to stop lookalikes and strengthen your brand moat by using Register Your Trade Mark. Where employees or contractors create IP, ensure you have written assignments in place using an IP Assignment to confirm ownership.
Policies, Privacy And Security
Contracts are only part of the story. Regulators and courts expect practical measures too. Document how confidential information is handled through an Information Security Policy, and if you collect any personal information, publish a compliant Privacy Policy that explains what you collect and why. These documents guide your team and help prove you took reasonable steps.
Step-By-Step: Building A Confidentiality Program That Works
You don’t need a huge budget to protect your crown jewels. Start with these practical steps and build from there.
1) Identify Your Confidential Trade Items
List the “must-protect” items by category (technical, commercial, operational). Note where they live (tools, folders, people) and who touches them. This inventory drives everything else.
2) Classify And Label
Adopt simple labels like “Confidential” or “Highly Confidential” and apply them consistently. Watermark documents, use access-controlled folders and avoid mixing secret and public material in the same deck or repo.
3) Tighten Access
Apply least-privilege access: give people only what they need to do their job. Use role-based permissions, MFA, and logs on your most sensitive systems. Remove access promptly when roles change.
4) Contract At The Gate
Before sharing sensitive details externally, ensure an NDA is signed. For employees and contractors, make sure confidentiality is captured in their contracts and reinforced in onboarding. For co-founders and early contributors, capture ownership and confidentiality upfront to avoid disputes later.
5) Set Clear Rules And Train
Write down the do’s and don’ts in short, practical policies. Explain what can be emailed, what must stay in secured tools, and how to handle meeting notes or screen shares. Run short refresher sessions for teams with elevated access (engineering, product, sales and finance).
6) Control The “Leak Vectors”
Most leaks are accidental: misaddressed emails, public links, or departing staff taking templates to “save time.” Disable public sharing by default, set link expiries, and use offboarding checklists that include device return, credential revocation and exit reminders about ongoing confidentiality obligations.
7) Build Incident Readiness
Even with strong controls, things happen. Define who investigates, who communicates and how you contain a breach. If you also handle personal information, adopt a Data Breach Response Plan so you can meet any Notifiable Data Breaches scheme obligations quickly.
Working With Suppliers, Partners And Investors
You’ll often need to share confidential information to get deals done. The key is to share intentionally, with guardrails.
Use A “Need-To-Know” Approach
Share only what’s necessary for the purpose, and stage disclosures across milestones. For example, you might pitch the concept and unit economics first, then share deeper technical detail after an NDA and a short pilot agreement are in place.
Make Ownership And Use Restrictions Clear
For development or research partnerships, set out who owns what from day one. Ensure background IP stays with its owner and new IP is assigned as agreed - your contract should include an express IP Assignment clause where appropriate.
Set Security Expectations
Vendors handling your data should meet minimum security standards. Reference your Information Security Policy or adopt a simple security schedule covering access controls, encryption, incident reporting and return or destruction of information at the end of the engagement.
Plan For The End
Every engagement ends eventually. Include obligations to return or securely destroy confidential information, certify deletion from backups where feasible, and stop using the information immediately.
What To Do If Confidential Information Leaks
Speed and structure matter. The sooner you act, the greater your chance of containing the damage and preserving your legal options.
1) Contain And Preserve Evidence
Lock accounts, revoke access and pull down links. Capture logs and screenshots and secure devices. Avoid editing the compromised materials more than necessary to preserve a clear audit trail.
2) Assess Legal Options
Check which contracts apply (NDAs, employment contracts, partner agreements) and the specific confidentiality clauses and remedies. Depending on the situation, options can include enforcement letters, negotiated undertakings, or seeking urgent court orders to stop further misuse.
3) Manage Notifications
If personal information is involved, you may need to assess and potentially notify under the Notifiable Data Breaches scheme. Your Data Breach Response Plan should outline when and how to notify affected individuals or regulators.
4) Close The Gaps
Incidents are a chance to harden your system. Review how the leak occurred, update policies or tooling, and retrain teams. For internal concerns, encourage early reporting by promoting a speak-up culture and, if relevant, implementing a Whistleblower Policy that protects those who raise issues in good faith.
Essential Documents To Support Your Confidentiality Program
While every business is different, most will benefit from a core set of contracts and policies that make obligations clear and enforceable.
- Non-Disclosure Agreement (NDA): Defines confidential information, permitted use and duration of obligations for prospective partners, suppliers and advisors - use a one-way or mutual NDA depending on who is sharing.
- Employment Contract: Includes confidentiality, IP ownership and practical post-employment obligations for staff; start with a tailored Employment Contract suited to the role.
- Restraint Clauses: Reasonable non-compete and non-solicit provisions help protect legitimate interests - get Restraint of Trade Advice to calibrate scope and enforceability.
- IP Assignment: Ensures you own what your employees, contractors or collaborators create; use an IP Assignment in addition to employment or services agreements.
- Privacy Policy: If you collect personal information, a compliant Privacy Policy demonstrates transparency and supports trust with customers and partners.
- Information Security Policy: Sets practical rules for storing, sharing and securing sensitive information; an Information Security Policy is a cornerstone of “reasonable steps.”
- Trade Mark Registration: Protects your brand elements so others can’t ride on your reputation; consider Register Your Trade Mark alongside your confidentiality controls.
Not every business will need every document from day one, but most will need several. The right mix depends on your sector, risk profile and growth plans.
Key Takeaways
- Confidential trade items cover any commercially valuable information that’s not public and that you actively keep secret.
- Courts look for “reasonable steps” - clear contracts, practical controls, consistent labelling and training are all part of the picture.
- Combine legal tools (NDAs, employment obligations, restraints, IP assignments and trade marks) with policies and day-to-day security.
- Share information on a need-to-know basis, set ownership and security expectations in contracts, and plan for return or deletion at the end.
- If a leak occurs, act fast: contain, preserve evidence, assess legal options and notify where required, then harden your controls.
- Tailored documents like an Employment Contract, NDA, Privacy Policy and Information Security Policy make obligations clear and enforceable.
If you’d like a consultation on protecting your confidential trade items, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.








