Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
If you’re running or growing a small business, there’s one asset you can’t afford to overlook: your information. From pricing models to supplier terms, product roadmaps to customer lists - keeping commercially sensitive information protected is critical for your competitive edge and legal compliance.
In this guide, we’ll explain what counts as commercially sensitive information under UK law, why it matters, and what practical steps you can take to protect it from day one.
What Counts As Commercially Sensitive Information?
“Commercially sensitive information” is a broad term. In simple terms, it’s any information that gives your business a commercial advantage because it isn’t publicly known - and would likely harm your business if it was disclosed.
Common Examples
- Pricing models, discounts, margin analysis and costings
- Sales strategies, marketing plans and tender/bid information
- Customer lists, supplier contracts, negotiated terms and rebates
- R&D data, product roadmaps, formulae, recipes, algorithms and source code
- Manufacturing processes, technical know‑how and process documentation
- M&A plans, investment decks and confidential financial information
- Security architecture, fraud controls and risk models
How It Differs From Personal Data
Commercially sensitive information often sits alongside personal data (for example, a client list will likely include names and contact details). Personal data is regulated by UK GDPR and the Data Protection Act 2018. Commercial sensitivity isn’t a statutory category in itself for private businesses - it’s protected through confidentiality, trade secret law and contracts.
Trade Secrets Vs General Confidential Information
Within commercially sensitive information, a useful distinction is between “trade secrets” and general confidential information:
- Trade secrets: Information that is secret, has commercial value because it is secret, and is subject to reasonable steps to keep it secret. In the UK, they’re protected under the Trade Secrets (Enforcement, etc.) Regulations 2018.
- Confidential information: Valuable business information shared in circumstances importing a duty of confidence (for example, under an NDA or an employment contract). Breach can give rise to claims in breach of confidence.
In practice, both require you to take reasonable protection steps. If you don’t, you risk losing legal remedies (especially for trade secrets).
Why Protecting Commercially Sensitive Information Matters
Protecting sensitive information isn’t just “nice to have” - it’s central to your competitive position and risk management.
Key Legal Foundations
- Confidentiality and breach of confidence: Under common law, if information has the necessary quality of confidence and is shared in circumstances importing an obligation of confidence, you can enforce that obligation if someone misuses it.
- Trade Secrets Regulations 2018: Provides specific remedies (including injunctions and damages) where a trade secret has been unlawfully acquired, used or disclosed - but only if you took reasonable steps to keep it secret.
- Contracts: Well-drafted contracts - for example, an NDA, supplier agreements and employment contracts - are your first line of defence and make enforcement more straightforward.
- Data protection: Where your sensitive information includes personal data, you must comply with UK GDPR and the Data Protection Act 2018. That typically means having a clear Privacy Policy, proper legal bases for processing, and robust security measures.
Commercial And Operational Risks
- Loss of competitive advantage (e.g. a rival undercutting your pricing or copying your feature roadmap)
- Supply chain disruption if your negotiated terms or forecasts leak
- Regulatory exposure (particularly where personal data is involved)
- Contractual disputes and costly litigation if obligations aren’t clear
- Reputational harm and loss of trust with customers and partners
The takeaway: getting your legal and operational protections in place early is far cheaper than trying to patch holes after a leak.
How To Identify And Classify Information In Your Business
Before you can protect anything, you need to know what you’ve got. A light-touch information mapping exercise can go a long way for small businesses.
Step 1: Map Your Crown Jewels
List the information that would hurt most if it became public or fell into a competitor’s hands. Think beyond documents to include knowledge held by key people. Typical categories:
- Commercial: pricing calculators, margin analysis, bids
- Customers and partners: lists, segment data, deal pipelines
- Operations: supplier terms, logistics models, SOPs
- Technology: source code, architecture diagrams, data schemas
- Strategy and finance: expansion plans, term sheets, cashflow forecasts
Step 2: Classify And Label
Adopt simple classification such as Public / Internal / Confidential / Highly Confidential. Label documents and repositories accordingly. For Highly Confidential items, limit access to a “need-to-know” group.
Step 3: Record Where It Lives And Who Has Access
- Systems: cloud drives, CRMs, code repositories, email, devices
- People: employees, contractors, agencies, consultants, suppliers
- Third parties: investors, acquirers, auditors, insurers
This map will guide your protections - both contractual and technical.
Practical Ways To Protect It Day-To-Day
Good protection blends contracts, policy and technology. You don’t need a huge budget - a consistent approach is what matters.
1) Lock In Contractual Protections
- NDAs: Use a well-drafted NDA before sharing sensitive information with prospects, investors, agencies or potential partners.
- Employment and contractor terms: Include robust confidentiality, IP ownership, return-of-materials and post-termination restrictions in your Employment Contract and contractor agreements.
- Data processing: If suppliers handle your personal data, put a compliant Data Processing Agreement in place alongside your main contract.
- Policies: Give staff a clear, written confidentiality policy that sets expectations for handling sensitive information.
2) Use Sensible Technical Controls
- Access control: Apply the principle of least privilege. Limit access to “need-to-know” and review permissions regularly.
- Secure sharing: Use expiring links, password protection and view-only access when sending sensitive files. Consider watermarks for bids and investor decks.
- Device hygiene: Enforce MFA, screen locks and encryption on company devices. If you allow BYOD, set minimum security standards.
- Version control: Keep sensitive documentation in managed repositories (not personal drives or email threads).
- Incident readiness: Have a simple playbook for what to do if a document is sent to the wrong person or accounts are compromised.
3) Build Good Habits Through Training
- Onboarding: Teach new starters what “confidential” means in your context and how to handle it in practice.
- Refreshers: Short, periodic nudges (e.g. “Don’t download the customer list to your desktop”).
- Exits: Run a checklist to revoke access, recover devices and obtain a written confirmation they’ve returned or deleted confidential information.
4) Protect Your IP Alongside Confidentiality
Confidentiality prevents wrongful disclosure, but consider IP registration where appropriate (for example, trade marks for brand names and logos). If you’re unsure what to protect or how, an intellectual property lawyer can help you plan the right mix of registrations and contracts.
Sharing Information Safely With Staff, Contractors And Partners
Most leaks happen during ordinary collaboration. The goal isn’t to stop sharing - it’s to share safely and on your terms.
Employees
- Contract terms: Ensure confidentiality and IP ownership clauses are clear and enforceable. Include post-termination obligations to return/delete materials.
- Access: Grant only what’s needed for their role. Use role-based groups to make onboarding and offboarding easier.
- Policies and tools: Provide simple guidance on where to store files, how to share and how to report mistakes quickly.
Contractors, Agencies And Freelancers
- Contracts first: No access without a signed contractor agreement with confidentiality, IP assignment, data protection and exit obligations.
- NDAs for early conversations: When scoping or negotiating, use an NDA before sharing proposals, roadmaps or pricing.
- Data controls: If they process personal data for you, implement a Data Processing Agreement and specify security standards in the statement of work.
Suppliers And Strategic Partners
- Confidentiality clause: Build a clear confidentiality clause into the main contract even if you’ve signed a standalone NDA.
- Information boundaries: Specify which information is shared, permitted purposes, and who on their team may access it.
- Audit and assurance: For critical suppliers, consider requiring certifications (e.g. ISO 27001) or allowing audits of relevant controls.
Investors And M&A
- Staged disclosure: Share high-level info first. Move to detailed disclosure only after signing an NDA and, for deals, using a controlled data room.
- Marking and tracking: Label documents “Confidential”, watermark decks and track who accessed what and when.
- Clean teams: For competitor transactions, consider “clean team” arrangements to reduce antitrust and misuse risks.
Responding To Leaks, FOI Requests And Disputes
Even with good controls, mistakes and misuse can happen. A quick, calm response makes all the difference.
If You Suspect A Confidentiality Breach
- Contain: Revoke access, change passwords, recall emails (if possible) and remove shared links.
- Assess: Identify what was exposed, to whom, and any personal data involved.
- Document: Keep a clear record of events and steps taken. This supports insurance notifications and any legal action.
- Engage: Where appropriate, send a prompt contractual notice or a letter before action to the offending party. If employees are involved, follow your disciplinary process and consider guidance on handling a confidentiality breach.
- Report: If personal data is included and there’s a risk to individuals’ rights and freedoms, assess whether you need to notify the ICO and affected individuals.
Freedom Of Information (FOI) And Public Sector Tenders
If you sell to public bodies, be aware that information you submit can be requested under the Freedom of Information Act 2000. There is an exemption for commercial interests (section 43), but it’s not automatic. Practical tips:
- Proactively mark specific sections of your bid as “Commercially Sensitive” and explain why disclosure would cause real, likely harm.
- Limit submission of truly sensitive material where it isn’t necessary to evaluate your bid.
- If an authority consults you about an FOI request, respond promptly with clear reasons to engage the exemption.
When To Seek Legal Remedies
If someone misuses your trade secrets or breaches confidentiality, options include:
- Injunctions to stop further use or disclosure
- Orders to deliver up or destroy materials
- Damages or an account of profits
- For trade secrets, specific relief under the Trade Secrets Regulations 2018
Having strong underlying contracts - like an NDA and robust confidentiality clauses - makes urgent relief more straightforward. If you need to escalate, it’s wise to get tailored advice quickly rather than going it alone.
Frequently Asked Questions
Is Commercially Sensitive Information Legally Defined For Private Businesses?
Not as a single, catch‑all category. In the private sector it’s protected through common law confidentiality, the Trade Secrets Regulations 2018, contract, and (where personal data is involved) data protection law. “Commercially sensitive” is expressly referenced in certain public sector contexts (e.g. FOI), but your private protections come from doing the basics well: contracts, access control and consistent handling.
Do I Need Everyone To Sign An NDA?
Use NDAs for early-stage conversations with external parties where you need to share sensitive details before a full contract is in place. Once you sign a main contract, include a comprehensive confidentiality clause so your protections live inside the operative agreement. For employees and contractors, rely on robust contract terms rather than standalone NDAs - your Employment Contract should cover confidentiality, IP and post-termination duties.
What If We’re Using AI Tools Internally?
Check what your teams are pasting into prompts. Most AI tools use inputs to improve models unless you opt out or use an enterprise plan. Set clear rules (for example, don’t paste source code, pricing models or customer lists) and consider a simple internal AI policy alongside your confidentiality policy. For processing personal data via vendors, make sure you have a Data Processing Agreement in place.
How Long Do Confidentiality Obligations Last?
Contract terms usually run for a fixed period (e.g. 2–5 years) after disclosure, but obligations may continue for as long as information remains confidential. Trade secrets can be protected indefinitely provided they remain secret and you keep taking reasonable steps to protect them.
Key Documents That Help Protect Commercially Sensitive Information
Every business is different, but most SMEs benefit from a core set of tailored documents:
- NDA for early-stage discussions with third parties
- Master services/supplier agreements with clear confidentiality, IP and return-of-materials clauses
- Employment Contract and contractor agreements with confidentiality and IP assignment
- Data protection suite - Privacy Policy, records of processing and a Data Processing Agreement where suppliers process personal data
- Practical workplace rules - a written confidentiality policy, secure tech usage standards and an exit checklist
Avoid using generic templates - small differences in wording can make a big difference when you need to enforce your rights. It’s worth investing in documents tailored to your business model and risk profile.
Key Takeaways
- Commercially sensitive information is anything that gives your business an edge because it’s not public - from pricing and customer lists to roadmaps and source code.
- Protection comes from multiple layers: contractual obligations, trade secret and confidentiality law, and (where personal data is involved) UK GDPR.
- Map and classify your “crown jewels” so you know what to protect, where it lives and who can access it.
- Use contracts as your first line of defence: an NDA, robust confidentiality in your Employment Contract and supplier agreements, and a Data Processing Agreement for processors.
- Back contracts with practical measures: access control, secure sharing, device standards, training and a clear confidentiality policy.
- Act quickly on leaks: contain, assess, document and escalate - including regulatory notifications if personal data is affected.
- If you’re unsure how to balance confidentiality with collaboration and growth, speak with an intellectual property lawyer about the right strategy for your business.
If you’d like help identifying your commercially sensitive information and putting the right protections in place, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


