Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Protecting confidential information is critical for every business - whether you’re developing a new product, negotiating supplier terms, or holding sensitive customer data. A single leak can damage your reputation, hand competitors an advantage, or trigger data protection penalties.
The good news? With the right systems, contracts and training, you can build strong confidentiality practices from day one without slowing your team down. In this guide, we’ll walk through what counts as confidential information, the UK laws that apply, the essential documents you should have in place, and practical steps to keep sensitive information secure.
What Counts As Confidential Information At Work?
“Confidential information” is broader than many employers realise. It’s not just trade secrets or the codebase you’re building - it’s anything not publicly available that has value to your business and would harm you if it got out.
Common Examples
- Commercial information: pricing, margins, supplier terms, business plans, bids and tenders, customer lists and CRM data.
- Technical information: product roadmaps, source code, algorithms, manufacturing processes.
- Personal data: names, addresses, payment details, support tickets and any other data that can identify a person.
- HR and internal information: salaries, performance issues, disciplinary records, restructuring plans, and strategic decisions.
- Legal documents: contracts, negotiation drafts, settlement terms, and legal advice.
Two points to keep front of mind:
- Confidentiality depends on context - the same document might be confidential in one business and not in another.
- Public domain information and general employee know-how usually aren’t protected, unless the information was obtained in breach of confidence.
If you treat certain categories as confidential, label them clearly, limit access, and make sure your team understands the rules. This makes it far easier to show information was actually protected if you ever need to enforce your rights.
What UK Laws Govern Workplace Confidentiality?
A few areas of UK law interact to protect workplace confidentiality. You don’t need to become a lawyer, but it’s important to know the building blocks and what they require of you.
1) UK GDPR And The Data Protection Act 2018
If you handle personal data about customers, staff or suppliers, you must comply with UK GDPR and the Data Protection Act 2018. In simple terms, you’re required to process personal data lawfully, fairly and transparently, keep it accurate, limit access, and adopt appropriate technical and organisational security measures.
Key duties include:
- Data minimisation - collect only what you need and keep it for no longer than necessary.
- Security - encryption, access controls, secure disposal, and regular training.
- Accountability - clear records of processing, contracts with processors, and documented policies.
- Breach response - assess, contain and, where required, notify the ICO within 72 hours of a personal data breach.
2) Common Law Duty Of Confidentiality
Even without a written contract, English law imposes a duty not to misuse information that has the necessary quality of confidence, was shared in circumstances importing confidence, and was used or disclosed without permission. Well-drafted contracts and policies make it much easier to prove these elements and obtain remedies like injunctions and damages.
3) Trade Secrets Regulations
The Trade Secrets (Enforcement, etc.) Regulations 2018 protect information that is secret, has commercial value because it’s secret, and is subject to reasonable steps to keep it secret. If you take robust protective measures, you gain stronger rights if someone misuses your trade secrets.
4) Employment Law
Employees owe implied duties such as fidelity and to obey lawful and reasonable instructions. In practice, you’ll rely on clear contractual confidentiality clauses and post-termination restrictions (e.g. non-solicitation) to protect your business. These must be reasonable in scope, duration and geography to be enforceable.
5) Surveillance And Monitoring Rules
Monitoring staff (email, internet, CCTV, audio) is heavily regulated. Any monitoring must be necessary and proportionate, comply with data protection law, and be clearly explained in privacy notices and policies. If you plan to implement systematic monitoring, a data protection impact assessment (DPIA) is often wise.
What Policies And Documents Should You Have In Place?
Documents are the backbone of workplace confidentiality. They set expectations, allocate responsibilities and give you leverage if things go wrong. Avoid generic templates - your documents should match how your business actually operates.
1) Confidentiality Policy
Policies turn big ideas into practical rules. A clear Confidentiality Policy should define what’s confidential in your business, how it must be handled, who can access it, and what to do if there’s a suspected breach. Include rules for remote work, BYOD, AI tools, printing, and disposal of documents.
2) Employment Contracts
Every team member who can access sensitive information should have a tailored Employment Contract with robust confidentiality clauses. Consider appropriate post-termination restrictions (e.g. non-solicitation of clients or staff, reasonable confidentiality obligations that survive termination). For consultants and freelancers, use a suitable services agreement with strong IP assignment and confidentiality terms.
3) NDAs For Third Parties
Before sharing sensitive information outside your business (e.g. with potential partners, investors or suppliers), use a Non-Disclosure Agreement. You can opt for one-way or mutual NDAs depending on who is disclosing information. Good NDAs define what’s covered, limit use, control onward disclosure, and set return/destruction duties.
4) Privacy And Data Protection
When processing personal data, publish a clear Privacy Policy and ensure you have the right contracts in place with any service providers who process data on your behalf. A proper Data Processing Agreement is legally required and should set out security standards, sub-processing controls, international transfers and audit rights.
5) Incident Response And Reporting
Don’t wait for a crisis to figure out what to do. Put a Data Breach Response Plan in place so your team can quickly contain issues, assess risk and meet any notification deadlines. This should sit alongside your confidentiality policy and disciplinary procedures.
Practical Steps To Protect Confidentiality Day-To-Day
Policies and contracts only work if your team can follow them in real life. The aim is to build simple, repeatable habits that reduce risk without creating friction.
Classify And Label Information
- Adopt an information classification scheme (e.g. Public, Internal, Confidential, Highly Confidential).
- Label documents and folders accordingly and communicate handling rules for each level.
Limit Access
- Apply role-based access controls: staff should only access the information needed for their role.
- Use separate environments for development, testing and production; restrict admin privileges.
- Review access regularly and revoke promptly when roles change or people leave.
Secure The Basics
- Use strong passwords and multi-factor authentication (MFA) on all key systems.
- Encrypt devices, back up critical data, and switch on remote wipe for laptops and mobiles.
- Reduce email attachments of sensitive data - use secure internal tools where possible.
Manage Third Parties
- Map who receives your confidential information (suppliers, contractors, advisors) and why.
- Put NDAs and appropriate commercial terms in place before sharing sensitive information.
- For personal data, ensure each processor signs a compliant DPA and meets your security standards.
Train Your Team
- Run short, regular training on confidentiality, phishing, social engineering, and reporting near-misses.
- Give practical scenarios: forwarding client lists to a personal email, using AI tools, or working in cafes.
- Embed confidentiality reminders in onboarding, code reviews, and project kick-offs.
Remote Work And BYOD
- Set rules for home offices: private workspace, screen locks, no shared family devices for sensitive work.
- Require approved device security (OS updates, antivirus, disk encryption) and VPN use where appropriate.
- Control data exfiltration routes: disable USB storage, block risky file-sharing apps if needed.
Using AI And New Tools
- Prohibit inputting confidential information into public AI tools unless you have contractually assured privacy.
- Define permitted use cases in your policies and require approvals for new tools that handle sensitive data.
- Keep an audit trail of high-risk disclosures and outputs when AI tools are used in production workflows.
Monitoring And Surveillance (Keep It Proportionate)
- Be transparent: explain what you monitor and why in your privacy notices and staff policies.
- Use the minimum monitoring needed to achieve a legitimate aim (security, compliance) and document your reasoning.
- Avoid audio recordings and blanket surveillance unless you have a strong, documented justification.
Exit Processes
- Revoke access immediately when someone leaves or changes role.
- Collect devices, disable logins, and request confirmation that confidential material has been returned or deleted.
- Run an exit interview reminding them of ongoing confidentiality obligations and any post-termination restrictions.
How To Respond If Confidentiality Is Breached
Even with great controls, incidents can happen. A calm, organised response protects you legally and technically, and it helps reassure clients and staff.
1) Contain And Preserve Evidence
- Isolate affected systems or accounts and reset credentials where needed.
- Avoid deleting evidence - preserve logs, emails, and device images for investigation.
- Document what you know: what was disclosed, when, how, and who’s affected.
2) Assess Legal Risk
- Was personal data involved? If so, assess the risk to individuals and whether you must notify the ICO within 72 hours and the affected individuals without undue delay.
- Consider contractual notification duties to customers, partners or insurers.
- Review any NDAs or confidentiality clauses that apply to the information misused.
3) Take Remedial And Enforcement Steps
- Request the return or secure deletion of information from recipients and obtain written confirmations.
- For serious misuse, consider injunctive relief to stop further disclosure or use.
- Where an employee or contractor is responsible, follow your disciplinary process consistently and fairly.
4) Learn And Improve
- Run a post-incident review: were access controls too broad? Was training clear? Do you need new tooling?
- Update policies, contracts and technical controls based on lessons learned.
- Communicate improvements to rebuild trust with clients and your team.
If you’re dealing with a live issue, it’s worth getting advice quickly on confidentiality breaches at work so you can protect privilege, meet regulatory deadlines and decide the right enforcement strategy.
Key Takeaways
- Confidentiality in the workplace covers much more than trade secrets - it includes commercial information, technical know-how, personal data and internal HR information. Treat it as a core business asset.
- UK GDPR and the Data Protection Act 2018 require you to protect personal data with appropriate technical and organisational measures and to respond swiftly to breaches.
- Put the right documents in place: a clear Confidentiality Policy, tailored Employment Contract terms, and an appropriate Non-Disclosure Agreement for third parties.
- If you share or outsource processing of personal data, you must have a compliant Data Processing Agreement with each processor and a public-facing Privacy Policy that accurately explains your practices.
- Operationalise confidentiality: classify information, limit access, secure devices, train your team, plan for incidents, and ensure your Data Breach Response Plan is ready before you need it.
- If a breach occurs, contain it, assess legal obligations, take remedial steps and consider enforcement quickly. Post-incident reviews will harden your controls and reduce future risk.
If you’d like help putting robust confidentiality documents and practices in place for your business, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


