Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
If you run a small business in Australia, you’re probably handling information that you don’t want publicly shared - pricing, customer lists, product roadmaps, HR records, supplier terms, or an investor deck.
But what does marking something “Private and Confidential” actually do? And how do you properly protect sensitive information so you’re covered legally and operationally?
In this guide, we’ll break down what “private and confidential” means for Australian businesses, when to use it, your legal obligations, and the practical steps and documents you can put in place to safeguard your information from day one.
What Does “Private And Confidential” Mean For Your Business?
“Private and confidential” is a label you can apply to communications and documents that aren’t meant for public or broad internal distribution. It signals the information is sensitive and should only be accessed, used and shared by authorised people for a specific purpose.
On its own, the label is helpful - it sets expectations and can support your position that the information was disclosed on a confidential basis. However, it’s not a magic shield. The legal protection comes from your contracts, your policies, and the way you handle the information in practice.
Think of the label as the front door sign. The “locks” are your confidentiality clauses, NDAs, security controls and staff training. You need both.
Privacy Vs Confidentiality: What’s The Difference?
These terms are often used together, but they cover different things:
- Privacy generally concerns how you collect, use and disclose personal information (details that identify an individual).
- Confidentiality is broader and relates to any information you intend to keep secret (such as trade secrets, business plans, financial models, or customer lists), whether or not it’s personal information.
It’s common to need both privacy compliance and confidentiality protections. For a deeper dive, it’s worth reading this comparison of the difference between privacy and confidentiality.
When Should You Mark Documents “Private And Confidential”?
Use the label whenever you share sensitive information outside your core team, and for internal materials that are need-to-know only. Common scenarios include:
- Sending an investor deck, term sheet or business plan to a potential partner.
- Sharing product specifications, pricing models or proposals with customers and suppliers.
- Disclosing source code, prototypes or designs to contractors and advisors.
- Circulating HR files, payroll data or incident reports internally.
- Providing customer lists or marketing analytics to a consultant.
Best practice is to include the label on the first page or in the email subject line, and repeat a brief confidentiality notice in the footer. If you’re sharing a lot of sensitive information, pair the label with a formal Non-Disclosure Agreement (NDA) or make sure your underlying contract has strong confidentiality clauses.
How Do You Protect Private And Confidential Information In Practice?
The strongest protection comes from a mix of contracts, secure processes and good habits. Here’s a simple framework you can apply in any small business.
1) Use Contracts And NDAs Early
An NDA (one-way or mutual) sets the rules for how recipients can use your information and what happens if they misuse it. It also helps you prove that disclosures were made in confidence.
Include tailored confidentiality provisions in your key agreements - such as your customer terms, supplier contracts and collaboration agreements - even if you also use a short-form NDA.
When in doubt, put an NDA in place before you share sensitive details. It’s quick to implement and low friction for the other side.
2) Lock It Into Employment And Contractor Terms
Staff and contractors often have the broadest access to your systems and files, so your contracts and policies need to be clear.
- Make sure your Employment Contract contains strong confidentiality, IP ownership and post-employment obligations.
- Use a robust Contractors Agreement when engaging freelancers or agencies, including confidentiality and return-or-destruction of materials at the end of the engagement.
Reinforce the contract terms with onboarding training and periodic refreshers so people know what is confidential and how to treat it.
3) Set Clear Policies And Train Your Team
Policies translate your intentions into day-to-day instructions. At a minimum, consider:
- A Information Security Policy covering passwords, device use, remote work, access control and breach reporting.
- A Privacy Policy if you collect personal information, setting out how you handle it in line with the Privacy Act.
- Internal workplace policies to guide acceptable use, record-keeping and communications.
Policies only work if people follow them - include them in onboarding, get acknowledgements, and refresh training annually.
4) Build Privacy Compliance Into Your Processes
If you handle personal information (most businesses do), you’ll need to meet Australian privacy requirements. Practical steps include:
- Publish an up-to-date Privacy Policy and give customers a concise Privacy Collection Notice when you collect their details.
- Limit access to personal data to those who need it and retain it only as long as necessary.
- Document a process to respond to access/deletion requests and to manage data breaches promptly.
5) Label, Encrypt And Control Access
Technical controls show that you treat information as confidential in practice:
- Label files and emails containing sensitive material as “Private and Confidential”.
- Use role-based access controls and turn off access when people change roles or leave.
- Encrypt devices and files at rest and use secure file-sharing rather than email attachments for sensitive documents.
- Keep logs of who accessed what and when, especially for HR and financial files.
6) Be Careful With Calls, Recordings And Email Disclaimers
If you record calls for quality or training purposes, ensure you meet applicable state and territory rules and get clear consent. For an overview of typical obligations when recording business calls, see the guidance on business call recording laws.
It’s also good practice to include a short confidentiality statement in your email footer. A tailored Email Disclaimer sets expectations if an email is misdirected and reminds recipients not to share its contents.
Do You Have Legal Obligations Under Australian Law?
Yes - several areas of Australian law intersect with “private and confidential” information. The mix that applies to you depends on what information you hold and how you use it.
Privacy Act 1988 (Cth) And The Australian Privacy Principles (APPs)
The Privacy Act and APPs govern how certain organisations handle personal information in Australia. Even if you’re a small business that may be exempt from the Act, many choose to comply as best practice because customers expect privacy safeguards and some industry contracts require it.
Core themes include transparency (telling people what you collect and why), limiting use to what’s necessary, keeping data secure, and allowing people to access their information.
Confidential Information And Contract Law
Confidential information is protected under common law and equity when it’s shared in circumstances importing an obligation of confidence (for example, under an NDA or a contract clause). If someone misuses your information, you may be able to seek an injunction and/or damages.
To strengthen your position, mark sensitive documents as confidential, restrict access, and use written agreements with clear confidentiality terms before disclosure.
Intellectual Property And Trade Secrets
Many trade secrets overlap with confidential information (such as an algorithm, formula, recipe, source code or a customer acquisition strategy). There is no formal “registration” for trade secrets - protection depends on how well you keep them secret and the contracts you use with people who access them.
Where appropriate, ensure your contracts also address ownership of IP created during the engagement. An IP Assignment clause or agreement is often used to transfer rights to the business.
Surveillance And Recording Rules
State and territory laws regulate when you can record calls or meetings and what consent is required. This matters if you capture confidential discussions for note-taking or training reasons. Always obtain clear consent and document it; where in doubt, avoid recording or disable the feature until you’re confident you comply with the relevant law.
What Legal Documents Should You Put In Place?
The right documents will depend on your business model, but these are commonly used to protect “private and confidential” information in small businesses:
- Non-Disclosure Agreement (NDA): A short, focused agreement you can use before sharing sensitive information with investors, suppliers or potential partners. A Non-Disclosure Agreement sets permitted use and disclosure limits and helps you act quickly if there’s a breach.
- Employment Contract: Ensures staff are bound by confidentiality and that IP created in the course of employment is owned by your business. Use a tailored Employment Contract for each role.
- Contractors Agreement: Covers confidentiality, IP ownership and post-engagement obligations for freelancers and agencies. A comprehensive Contractors Agreement is essential when giving external parties access to your systems or customers.
- Privacy Policy: If you collect personal information (e.g. via your website or app), an up-to-date Privacy Policy explains what you collect, why, how you store it, and who you share it with.
- Privacy Collection Notice: A concise notice given at the point of collection that links to your Privacy Policy and sets out key facts. A Privacy Collection Notice helps meet transparency obligations.
- Information Security Policy: Guides staff on how to handle confidential and personal information day to day (passwords, devices, storage, breaches). An Information Security Policy supports your legal obligations and reduces risk.
- Email Disclaimer: Adds a simple confidentiality statement and misdirection notice to your emails. A tailored Email Disclaimer is a quick win for everyday communications.
Not every business needs all of these from day one, but most will benefit from several. The key is to tailor them to how your business actually operates so they’re practical and enforceable.
Common Mistakes (And How To Avoid Them)
Here are frequent traps we see - plus simple ways to fix them.
- Relying on the label alone: Writing “Private and Confidential” without an underlying contract is weak. Back it up with an NDA or contract clauses.
- Over-sharing internally: Giving the whole team access to all files increases the risk of leaks. Use role-based access and separate folders for HR, finance and product.
- No offboarding process: Forgetting to remove access when staff or contractors leave is a big gap. Implement a checklist to revoke access, recover devices and confirm return or destruction of materials.
- Unclear ownership of outputs: If contractors create code, designs or content, make sure your agreements include IP assignment so ownership is clear.
- Outdated privacy paperwork: As your data flows change, update your Privacy Policy and collection notices so they accurately reflect your practices.
- Inconsistent practices: Policies that sit on a shelf don’t help. Train your team, issue short “how we handle information” guides, and audit compliance periodically.
Key Takeaways
- “Private and confidential” is a useful label, but the real protection comes from your contracts, policies and security controls.
- Privacy and confidentiality are different but related: privacy covers personal information, while confidentiality covers any sensitive business information.
- Use NDAs and confidentiality clauses before disclosing sensitive information, and make sure employment and contractor agreements reinforce those obligations.
- Meet Australian privacy requirements with a clear Privacy Policy, collection notices, access controls and a plan for handling data breaches.
- Back up your processes with practical tools: information security policies, access control, encryption, and training for your team.
- Avoid common gaps like over-sharing, poor offboarding and unclear IP ownership - fix them with tailored documents and consistent practice.
If you’d like a consultation on protecting your private and confidential information in your business, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.








