A confidentiality agreement should include the names and addresses of the parties to the contract. Consider also including: Reason for the agreement: Explain why you're sharing this information. The information disclosed: Be specific about the subject matter and what exactly is included in the agreement.
Under Texas law, a non-disclosure agreement is enforceable even if it is coupled with an unenforceable non compete agreement or invalid non-solicitation provision.
I agree that: a) I shall not share this information, material or documents (information) with persons within or outside of the ________ who are not authorized to have this information. b) I shall not publish such information. c) I shall not communicate such information without authority.
Because of a confidentiality agreement, the details of the accusation were hidden from the public.
Example: Confidentiality Clause None of the parties shall disclose to any person or use for any purpose any confidential information of the other as a result of entering into this Agreement. This restriction shall continue to apply after the expiration or termination of this agreement without limit of time.
I understand that any information concerning the identities and information shared by people participating in project-related focus groups, individual interviews, or other needs assessment activities is to be kept confidential at all times.
THIS DOCUMENT AND THE INFORMATION IN IT ARE PROVIDED IN CONFIDENCE, FOR THE SOLE PURPOSE OF INSERT DETAILS, AND MAY NOT BE DISCLOSED TO ANY THIRD PARTY OR USED FOR ANY OTHER PURPOSE WITHOUT THE EXPRESS WRITTEN PERMISSION OF INSERT DETAILS.
The following information is confidential: Social Security number. Name. Personal financial information. Family information. Medical information. Credit card numbers, bank account numbers, amount / what donated. Telephone / fax numbers, e-mail, URLs.
These should include, for example: Ensuring that confidential information is always locked away at night, and not left unattended during the day; Password-protecting sensitive computer files; Marking confidential information clearly as such, and ensuring that paper copies are shredded before disposal; and.