Chat to Caira about NDAs or confidentiality worries. She explains your rights and drafts responses instantly: https://caira.unwildered.co.uk

1. Introduction: Why Confidentiality and Trade Secrets Matter

Confidentiality and trade secrets are at the heart of trust in high-value sectors—whether you’re a solicitor, investment banker, analyst, or senior manager. When you move jobs, especially to a competitor, you may face accusations of misusing confidential information or trade secrets. These disputes can escalate rapidly, with employers seeking High Court injunctions, delivery up orders, or even reporting matters to regulators or the police.

Why it matters:

  • The stakes are high: an injunction can stop you working, and a finding of breach can damage your reputation and career.

  • In regulated sectors (law, finance), allegations can trigger FCA, SRA, or other regulatory investigations.

  • Even if you believe you’ve done nothing wrong, the technicalities of what counts as “confidential” or a “trade secret” are fiercely contested.

2. The Basics: What Is (and Isn’t) Protected?

Not all information you handled at work is protected by law. The distinction between confidential information, trade secrets, and general know-how is critical—and often the battleground in litigation.

  • Confidential Information:
    Information not in the public domain, which the employer treats as private (e.g., client lists, pricing models, business plans).


  • Trade Secrets:
    A higher threshold—information of commercial value, subject to strict secrecy (e.g., proprietary algorithms, M&A strategies, unique financial products).


  • General Know-How:
    Your skills, experience, and memory—even if gained at your old job—are not protected once you leave, unless you’re bound by a valid restrictive covenant.

Contentious Point:
Employers often claim everything is a trade secret. Employees can argue that much of what they know is industry-standard or available from public sources (e.g., LinkedIn, Companies House).

Example:
A departing analyst who used their memory of market contacts (all public) was found not to have breached confidentiality, but an employee who downloaded a client database was found liable.

3. Common Allegations and Defences

Typical Allegations:

  • Copying files to USB drives or personal email before leaving.

  • Emailing client lists, pricing data, or presentations to yourself.

  • Using confidential information to win business at a new employer.

  • Sharing sensitive documents with a competitor.

Key Defences:

  • Public Domain: The information is already public (e.g., client names on LinkedIn).

  • Know-How: You relied only on your memory and skills, not documents.

  • No Use or Disclosure: You never used or disclosed the information after leaving.

  • Employer’s Lax Security: The employer failed to treat the information as confidential (e.g., no password protection, widely shared internally).

Highly Contentious Point:
The “springboard” doctrine—employers argue you gained an unfair head start by using confidential data, even if you no longer possess it. Courts may grant an injunction to “neutralise” this advantage.

Example:
A banker who took pitch decks and used them to approach clients at a new firm was subject to a springboard injunction, barring contact with those clients for six months.

4. Evidence That Matters

Winning or defending a confidentiality/trade secrets claim is all about evidence—both digital and documentary.

  • For Employers:

    • USB access logs (showing files copied before departure).

    • Email trails (e.g., BCC’ing personal accounts).

    • File renaming or deletion activity.

    • Metadata showing document origin.


  • For Employees:

    • Proof you didn’t access or use confidential files.

    • Evidence that information is public or generic.

    • Clean digital trail—no downloads, no suspicious emails.

    • Statements from new employer confirming no use of old data.

Contentious Point:
Employers may demand “delivery up” of all devices, cloud accounts, and even forensic imaging of personal computers. Employees can challenge the scope as disproportionate, especially if it includes personal or family data.

Example:
A solicitor was ordered to hand over a laptop for forensic analysis, but the court limited the search to work-related folders after arguments about privacy.

5. What to Do If You’re Accused

  • Preserve Everything:
    Do not delete or alter any files, emails, or devices. Courts take a dim view of “spoliation” (destroying evidence).


  • Acknowledge Receipt:
    If you receive a solicitor’s letter, confirm receipt but do not admit liability or respond in detail before reviewing your position.


  • Gather Your Evidence:
    Collect contracts, emails, and proof of what you did (and didn’t) access or use.


  • Check Your New Employer’s Policies:
    Many banks, law firms, and consultancies have onboarding protocols to ensure no confidential data is brought in—use this to show good faith.


  • Consider Negotiation:
    Many cases settle with undertakings (promises not to use or disclose information) or limited device handover, avoiding a public fight.

Contentious Point:
If you’re asked to sign an undertaking, check the scope—agreeing to a blanket ban may be unnecessary if the information isn’t truly confidential.

Example:
An investment analyst accused of taking a pricing model settled by agreeing not to contact certain clients for three months, with no admission of wrongdoing.

6. Typical Outcomes and What to Expect

  • Delivery Up Orders:
    Courts may order you to hand over all devices, USBs, or cloud accounts for forensic inspection. This is common where there’s evidence of file transfers or suspicious activity.
    Example: In a 2024 case, a departing banker was required to surrender both work and personal laptops, but the court limited the search to work-related folders after privacy objections.


  • Springboard Injunctions:
    If the court believes you gained an unfair competitive advantage (“springboard”) by using confidential information, it may bar you from contacting certain clients or working in a particular area for a set period—even if you no longer possess the data.
    Example: A solicitor was prevented from pitching to former clients for six months after the court found she had used a confidential business plan.


  • Settlements and Undertakings:
    Most cases settle before trial. Employees often agree to undertakings (formal promises not to use or disclose information) or to return/delete specific files.
    Example: An analyst accused of emailing himself a client list settled by agreeing to delete the file and not contact those clients for three months.


  • Regulatory and Criminal Risks:
    In rare cases, especially in finance or law, employers may report alleged breaches to the FCA, SRA, or even the police (for data theft or GDPR breaches).
    Example: A director faced an SRA investigation after allegations of taking confidential files, but was cleared when it was shown the data was not used.

7. Real-World Examples

Example 1: Employee Cleared—All Data Was Public
A senior analyst moved to a competitor and was accused of taking a client list. He demonstrated that all client details were available on LinkedIn and Companies House. The claim was dropped before court.

Example 2: Analyst Settles After Admitting to Emailing Files
A financial analyst admitted to emailing himself a pricing spreadsheet before leaving. He agreed to delete the file, sign an undertaking, and not contact certain clients for six months. The matter settled without a hearing.

Example 3: Director Wins Because Employer Delayed Action
A director joined a rival firm and was accused of using confidential strategy documents. The employer waited three months before taking action. The court refused an injunction, citing the delay as evidence the risk was not urgent.

8. Frequently Asked Question

What if I only used my memory?
Even if you’ve signed an NDA, you are generally allowed to use your skills, experience, and knowledge retained in your head. NDAs and confidentiality clauses cannot prevent you from using general know-how or industry expertise. However, you must not deliberately memorise confidential information with the intention of using it for a new employer—courts will look at your conduct and intent.

Can I be prosecuted?
Criminal prosecution is rare but possible, especially for large-scale data theft, breaches of the Computer Misuse Act, or serious violations of the GDPR. Breaching an NDA is usually a civil matter, but if it involves deliberate theft or misuse of data, criminal or regulatory action can follow.

What if I’ve already deleted files?
Do not delete anything further. If you’re facing a dispute, courts may treat deletion as evidence of wrongdoing (“spoliation”). Be honest about what happened, preserve all remaining evidence, and explain any deletions clearly if asked.

What if my new employer asks for old files?
Refuse and explain the risks. Supplying confidential documents or data from a previous employer—even if covered by an NDA—can expose both you and your new employer to legal action. Most reputable employers have strict onboarding policies and will not want to receive or use confidential information from a previous role.

9. Checklist: Protecting Yourself

  • Gather your employment contract and any confidentiality clauses.

  • Collect all correspondence about your departure and any data transfers.

  • List all devices and accounts used for work.

  • Preserve all emails, files, and devices—do not delete or alter anything.

  • Document how you found your new role and whether you used any old data.

  • Prepare a timeline of events from resignation to present.

  • If accused, keep all solicitor’s letters and your responses.

10. Final Thoughts

Most confidentiality and trade secrets disputes are resolved without a trial. The law distinguishes between genuine misuse of confidential information and the fair use of your own skills and experience. Acting transparently, preserving evidence, and understanding your rights will put you in the strongest position—whether you negotiate a settlement or defend your case in court.

Disclaimer: This content is for general information only and does not constitute legal, financial, or tax advice. Outcomes may vary depending on your individual circumstances.

Ask questions or get drafts

24/7 with Caira

Ask questions or get drafts

24/7 with Caira

1,000 hours of reading

Save up to

£500,000 in legal fees

1,000 hours of reading

Save up to

£500,000 in legal fees

1,000 hours of reading

Save up to

£500,000 in legal fees

No credit card required

Artificial intelligence for law in the UK: Family, criminal, property, ehcp, commercial, tenancy, landlord, inheritence, wills and probate court - bewildered bewildering
Artificial intelligence for law in the UK: Family, criminal, property, ehcp, commercial, tenancy, landlord, inheritence, wills and probate court - bewildered bewildering