From The Vault: Bringing NDAs Into The Open

confidential[Occasionally, we like to revisit posts from days gone by that either (1) are always relevant, or (2) are the subject of recent questions received by our office.  In today’s From The Vault, we look at Nondisclosure Agreements (sometimes called Confidentiality Agreements), which are frequently used as precursors to the inception of a formal research project.]

Originally published November 14, 2012

The majority of projects we all encounter follow the same routine: Sponsor expresses an interest in funding a certain type of research; PI submits a formal proposal to Sponsor, or simply reaches an informal agreement with Sponsor, to perform same; Sponsor awards PI a given amount of money; and the PI’s Office of Research Administration negotiates and executes the correlated agreement.  But what about those situations where the research project isn’t as clearly defined, and where the parties need to huddle before determining the actual scope of a contemplated project?

Enter the Non-Disclosure Agreement (NDA).

An NDA is most often used in situations where two or more parties are not yet at the point of committing to a full-blown relationship, but wish to exchange proprietary information to assist in making that decision.  However, it’s important to note that an NDA should be used only in passive, evaluative situations.  If any substantive efforts are going to be undertaken, including any work that could result in intellectual property, these actions should be covered under a separate agreement.

Materials covered under an NDA run the gamut, and can include schematics, customer lists, and even financial information; essentially, anything that will help one party assess the prospects of the other.  That being said, trade secrets are generally not disclosed in these circumstances, regardless of how iron-clad the related NDA is.  For one, the requirements to formally keep something a ‘trade secret’ are more than most parties are willing to adhere to.  Secondly, anything designated a ‘trade secret’ must be treated so in perpetuity, which, from the University perspective, may go against the Fundamental Research Exemption.

The format of an NDA is relatively standard.  The information to be transmitted is identified, as well as the specific reasons for which it is being disclosed, such as a patent license or joint research agreement.  The parties will also agree to the length of the contract, as well as the time thereafter where the obligations of confidentiality continue (e.g. three years from the conclusion of the agreement).  In some instances, the parties will each designate a point person who will be in charge of receiving the covered information and disseminating it to those people who ‘need to know’ accordingly.

Additionally, the NDA should require that any information disclosed that the provider wishes to be kept confidential be identified as such.  What is obviously proprietary to one person may not be considered the same by another, and thus this marking prerequisite ensures the most protection possible for a provider’s materials.

While parties often assume that ANYTHING sent under an NDA should be treated as proprietary, this is not always the case.  Most contracts, and especially NDAs, will include clarification as to what would not be considered confidential.   These exceptions can be written any number of ways, but they typically exclude information that (1) was previously in the receiving party’s possession; (2) was received by the recipient by a third party without the violation of any other obligation of confidentiality; (3)  was already known to the public prior to the disclosure to the recipient; (4) becomes known to the public subsequent to the disclosure; or (5) was independently developed by personnel of the recipient who had no such access to the covered information.

Although many researchers feel that NDAs are unnecessary because of handshake deals or understandings they have with their counterparts, it’s important to remember that these agreements are vital to protecting not only the interests of a particular PI, but also the institution in general.  As such, they should be utilized whenever possible.