Free Essay

Draft Confidentiality Agreement

In:

Submitted By Harissa
Words 1471
Pages 6
Confidentiality and Non-disclosure Agreement between

______________________________
(herinafter referred to as “X”)

Registration number: ______________________
Adress:

and

(herinafter referred to as “ The Client”)

Registration number/ ID number:

Address:

WHEREAS the parties are discussing certain matters which require each party to disclose certain proprietary, secret or confidential information (“the information”) to the other party;

AND WHEREAS the parties acknowledge that the information exchanged between them must be kept confidential and have therefore agreed to enter into this confidentiality;

NOW THEREFORE the parties acknowledge, agree and undertake as follows:

Whereas, 'The Client’ and 'X’ has certain confidential information which it desires to disclose confidentially to each other relating to client information provided by him including but not limited to trade secrets and proprietary information pertaining to finances, marketing plans and techniques, forecasts, operational structures and methods, pricing policies, customer lists and other proprietary, private confidential business matters, all hereinafter referred to as the INFORMATION, and both parties hereby agree that this two way exchange is for the sole purpose of evaluating potential business opportunities involving each party or one or more subsidiaries of each party.

The parties agree as follows:

1. Information: Each under signed party (the receiving party) understands that the other party (the disclosing party) has disclosed or may disclose information relating to the disclosing party and/or its products, which has been conspicuously marked or otherwise specifically identified as confidential or proprietary, whether oral, written, graphic or in machine-readable form, which has commercial, technical and/or other value in the Disclosing party’s business and is confidential in nature (including, without limitation, trade secrets, patents, patent applications, copyrights, know-how, processes, ideas, inventions (whether patentable or not), formulas, computer programs, databases, technical drawings, designs, algorithms, technology, circuits, layouts, interfaces, materials, schematics, names and expertise of employees and consultants, any other technical, business, financial, customer and product development plans, supplier information, forecasts, strategies and other confidential information) of the disclosing party. Oral statements made by either party to the other party shall not be considered confidential information unless the party making the statement expressly states before such making such statement that it is deemed confidential and confirms so in writing within (30) days after the disclosure, referencing the date and specifically identifying the confidential information that was orally disclosed. Not withstanding anything to the contrary herein, the existence or subject matter of this agreement, including the fact that any investigations, discussions or negotiations are taking place concerning a possible transaction or the status thereof, or that the receiving party has received confidential information from the disclosing party shall be deemed to be confidential information. In no event shall either party disclose any aspect of the working relationship to any third party.

2. Obligations: The receiving party shall maintain the information received (from the disclosing party) in trust and confidence and shall not use directly or indirectly with businesses fully or partially, owned by the disclosing party. The receiving party shall disclose the Information received by it under this Agreement only to persons within its organization who have a need to know the Information in the performance of their duties and who are bound by agreements to protect the confidentiality of the Information. For the purpose of this agreement, the term employees shall include independent contractors of each party. The receiving party will not make any copies of the Confidential Information received from the disclosing party except as necessary for its employees, parent X and majority-owned subsidiaries with a need to know. Any copies that are made will be identified as belonging to the disclosing party and marked 'confidential'.

3. Obligation of confidentiality shall not extend to: The receiving party shall not be liable for the disclosure of any confidential information, which is: Rightfully in the public domain: except other than by a breach of a duty to the disclosing party. Rightfully received from the third party with out any obligation of confidentiality; Rightfully known to the receiving party without any limitation on use or disclosure prior to its receipt from the disclosing party; Independently developed by the employees of the receiving party; Generally made available to third parties by the disclosing party without restriction on disclosure. Is required to be disclosed by the disclosing party to comply with the applicable laws or government regulations.

4. If the receiving party becomes compelled to disclose the disclosing Party’s Confidential Information to any governmental or regulatory authorities, or as required by law or court order, the receiving Party shall inform the disclosing Party, in writing, of such fact or obligation as soon as reasonably possible after it becomes aware of it and, if possible, before any Confidential Information is disclosed. The receiving Party, compelled to disclose shall ensure, insofar as it is able to procure the same, that any such disclosure will be limited to the minimum amount of Confidential Information required to satisfy that disclosure obligation. Each Party agrees to assist and co-operate in any appropriate action that the other Party may decide to take.

5. This agreement shall be in force for not more than 3 years starting from the effective date. However, unless at least on of the exceptions set forth in section 3 below has occurred, the receiving party will continue to treat such Confidential Information as the confidential information of the disclosing party and only disclose any such confidential information to third parties under the terms of a non-disclosure agreement.

6. Title: Each party acknowledges and agrees that As between the parties, the confidential information is and shall remain the sole and exclusive property of the disclosing party, No patent, copyright, trademark, trade secret or other proprietary right is licensed, granted or otherwise transferred by this agreement or any disclosure hereunder except for the right to use such confidential information in accordance herewith; and Any confidential information is provided by the disclosing party wholly on an 'AS IS' basis and no warranties of any kind are given with respect to any confidential information disclosed hereunder or any use thereof.

7. This Agreement supersedes any and all prior agreements, written or oral, negotiations, communications, understanding and terms, whether expressed or implied regarding the confidential information, between the receiving party and the disclosing party relating to the Information. This Agreement may not be modified in whole or in part except by an agreement in writing signed by receiving party and the disclosing party. Any other agreements between the parties, including non-disclosure agreements will not be affected by this agreement.

8. If any clause of this Agreement or part thereof is found by a court of law or jurisdiction to be unenforceable or void, the validity of any other clause or part thereof will not be affected.

9. Nothing in this Agreement may be deemed or construed as creating any license or rights in or with respected to any invention, concept, discovery, trade secret, or information contained in the INFORMATION provided.

10. This agreement shall not prevent the disclosing party from making use of, or disseminating the Information, or from entering into any agreement with any other party in connection with the Information in any way the 'disclosing party' deems fit and without any obligations to the 'receiving party'.

11. The 'receiving party' shall make no use of the Information except for the purposes of evaluation recited herein, unless agreed to in writing by the 'disclosing party'. Upon payment of all outstanding fees, X owns the application, images and associated computer files. Such information may be digitally stored or in hard copy format at RECEPIENT’S facilities. If requested in writing, 'receiving party' will provide all such materials to the disclosing party or his agent within 14 days of such request.

12. The failure on either party to enforce any right resulting from breach of any provision of this agreement by the other party will not be deemed a waiver of any right relating to a subsequent breach of such provision or any other right herein under.

13. Termination: Neither party has any obligation to disclose Information to the other. Either party may terminate this agreement at any time without cause upon written notice to the other party; provided that each party’s obligation with respect to Information disclosed during the term of this agreement will survive any such termination. Either party may at any time Cease giving confidential information to the other party with out any liability, and/or Request in writing the return or destruction of all or part of its Information previously disclosed, and all copies thereof, and the receiving party will promptly comply with such request, and certify in writing its compliance.

SIGNED at …………………………………………….. on the ………………….. day of ……………….. 2012.

AS WITNESSES:

1. ……………………………

2. …………………………… …………………………………..
For and on behalf of
X HOLDINGS (PTY) LTD

SIGNED at …………………………………………….. on the ………………….. day of ……………….. 2012.

AS WITNESSES:

1. ……………………………

2. …………………………… …………………………………..
For and on behalf of

Similar Documents

Premium Essay

Business Law Contract Paper

...Law 3051-FA Matthias Majerczyk Due Date: Tuesday, November-27-2012 BigCo Agreement for Exchange of Confidential Information 2) Most people who have positions in a corporation are employees under the legal entity. So, therefore Really Smart Guy is the Vice-President and an employee of BigCo Limited. BigCo can use confidential draft patent application and some confidential information to compete with III. This is according to paragraph 4, “BigCo can use III’s ideas, concepts, know-how and techniques for its own business activities to compete with III, only if III’s Information is retained in the memories of BigCo’s employees who have had access to the Information under the BigCo Confidentiality Agreement.” BigCo was also given a draft business plan. BigCo cannot use the business plan to compete with III according to paragraph 4, “nothing gives the BigCo the right to disclose, publish or disseminate the business plans of III” 3) BigCo can terminate its agreement with III by providing a one month’s written notice BigCo. III’s and BigCo’s obligations for disclosing information will extend beyond the termination and will remain in effect until fulfilled. The Survival clause is really weird and it conflicts with the Confidentiality Period on paragraph 3. How can you say that it will extend for two years following the initial date of disclosure, then the survival clause states that any terms of the agreement will extend beyond termination will remain in effect until fulfilled. In my...

Words: 1120 - Pages: 5

Premium Essay

M&a Process

...The M&A Sales Process FINA 6222: Mergers and Acquisitions Agenda Auction Process Overview Organization and Preparation First Round Second Round Negotiations and Closing • Stakeholders • Broad vs. Targeted Processes • Valuation and Due Diligence • Marketing Material and Confidentiality Agreement Preparation • First Buyer Contact • Initial Bids and Buyer Selection • Management Presentations and Data Room • Final Bids • Evaluate Bids and Select Winning Bidder • Financing and Approvals Process Map Seller Retains Advisor and Signs Engagement Agreement Advisor Performs Internal Due Diligence Advisor Prepares Marketing Materials Advisor Approaches Prospective Buyers Interested Buyers Sign Confidentiality Agreement Interested Buyers Receive In-Depth information and Submit a Bid Seller and Advisor Choose Participants in Second Round Management Presentations and Buyer Due Diligence Second Bids Submitted Price and Sale Agreement Negotiated Deal is Closed Stakeholders Seller Incentive: Highest Multiple • Private Equity Fund • Large Corporate Entity • Entrepreneur Advisors Incentive: Highest Fee • Investment Bank • Legal Counsel • Auditors and Consultants Buyer Incentive: Lowest Multiple • Private Equity Firm • Large Corporate Entity Auction Process Overview Organization and Preparation First Round Second Round Negotiations and Closing Broad vs. Targeted Processes • Broad Process • • • • • 20/20 rule: generally, 20% of...

Words: 1359 - Pages: 6

Premium Essay

Applicability of Greene’s Jewelry Wholesale, Llc vs. Lawson Memo

...Greene’s Jewelry Wholesale, breached the confidentiality agreement to not share any information regarding the process used to create “Ever-Gold,” by sharing key process elements in producing Ever-Gold to a competing business named Howell Jewelry World. Ever-Gold is the primary asset of Greene’s and is sold exclusively through Greene’s. Greene’s employed 502 individuals and was exclusively located to the state of New Hampshire at the time of Lawson’s employment with Greene’s. CLIENT CASE FACTS AND LAWS Facts Regarding Unlawful Termination All of Lawson’s annual reviews indicate that she was consistently late to work by 15-30 minutes. Lawson learned she was pregnant and requested extra time off from the Greene’s Head of Human Resources, Lisa Peel. Peel informed Lawson of her termination with Greene’s, by verbally communicating "Congratulations Jennifer! That is exciting news for you. We do not need to worry about time off, though, because, regrettably, I was just going to let you know that we are downsizing and no longer have a need for any of our junior executive secretaries.” Lawson cleaned out her work space and returned home the same day. Facts Regarding Contracts Upon arrival at her home the day she was terminated from Green’s, Lawson realized she indirectly took a draft letter for Greene’s patent attorney detailing the process of manufacturing Ever-Gold. Instead of contacting Greene’s and returning the draft, Lawson contacts a hiring manager of...

Words: 2602 - Pages: 11

Premium Essay

Partnership

...and each partner has a right to share in the value of the firm’s assets. Disadvantages of organizing a partnership include: each partner has unlimited liability for all legal obligations and debts of the business and partners have joint and several liability. A person who represents another is an agent. The manager would act as the Agent within this agreement. The party that the agent represents is the principal, which are the business owners. Agencies can be created by agreement ratification, necessity, or operation of law. The agent has certain duties to the principal and the principal has duties to the agent. In most situations the principal will be liable for the contracts arranged by agent and the behavior of the agent while conducting the principals business. In our business we would be concerned with the manager placing orders with our purveyors and the way he/she represents themselves with the customers and our business partners. The main difference between principal and agent and of employer-employee relationships is an employer's power to control the activities of a non-agent employee. Whereas an agency agreement brings about a relationship between a principal and a third party that results in a contract, an employee who is not also an agent has no such rights or powers. An employee acts under the employer's direction and is subject to the employer's control.  Since we are going to hire a manager to help run the restaurant, they must consider some legal responsibilities...

Words: 877 - Pages: 4

Free Essay

Report Islamic Financial Cases

... * He also applied for the return the titles of the properties, free of all encumbrances. * ISSUES: * Whether sale of land in accordance with IB Concept of BBA contravened the Malay Reservations Enactment 1930 of Kelantan. * Whether purchase and resale of land for profit by bank contravened the Malay Reservations Enactment 1930 of Kelantan * PRINCIPLES: * Section 7(i) of the Enactment prohibits any transfer or transmission or vesting of any right or interest of a Malay. However, when the property purchase agreement was signed, the right that could be acquired by the defendant under the agreement at that point of time, the agreement being still executor, was only a right to a registrable interest which right was yet to crystallized into a registrable interest. * The contemporaneous execution of the property purchase agreement and the property purchase agreement and the property sale agreement constituted part of the process required by the Islamic banking procedure before the plaintiff could avail himself of the financial facilities provided by the defendant under the BBA concept. * Indefeasibility could only be successfully attacked by evidence which manifested that registration was obtained by ‘means of insufficient or void instrument’. This meant that the plaintiff could only successfully seek the aid of section 340(2)(b) of the NLC if it could be shown that there existed a defect or illegality in the execution of the...

Words: 4437 - Pages: 18

Premium Essay

Engineer

...security as a governmentwide high-risk area since 1997. The number of information security incidents reported by VA has more than doubled over the last several years, further highlighting the importance of securing the department’s systems and the information that resides on them. GAO was asked to provide a statement discussing the challenges VA has experienced in effectively implementing information security, as well as to comment on a recently proposed bill aimed at improving the department’s efforts to secure its systems and information. In preparing this statement GAO relied on previously published work as well as a review of recent VA inspector general and other reports related to the department’s security program. GAO also analyzed the draft legislation in...

Words: 4716 - Pages: 19

Premium Essay

Upload

...be subjected to fines, prison, or both. HIPAA is organized into three parts: • Privacy regulations. HIPAA regulations guide health care providers with overall privacy measures, such as turning the charts toward the wall and making sure the computer screen is not visible. Five forms are required (privacy notice, acknowledgment, authorization, business associate agreement, and trading partner agreement). • Transaction standards. Requirements must be followed when putting the office software into HIPAA compliance. • Security regulations. HIPAA requires health care providers to keep computers safe. The first two parts had 2003 deadlines for compliance and the third part has a 2005 deadline. To adhere to the HIPAA regulations, a medical practice must have an appointed privacy official draft privacy policies and procedures, and implement a program to educate and train all physicians and employees to the mandates of HIPAA. These policies become part of the office policies and procedures manual. Health Insurance Portability and Accountability Act of 1996 American Association of Medical Assistants 2 HIPAA Confidentiality (privacy) policies must be followed. Refrain from talking about patients and their problems where...

Words: 1848 - Pages: 8

Premium Essay

Penn Foster Paralegal Ethics Graded Project

...interviews in his office without specifying particulars regarding his presence or direct supervisory responsibilities. In hindsight, Attorney Howe could be indirectly contributing to the unauthorized practice of law due to his gross negligence to supervise his paralegal. ABA 5.3 (A)(B)(C). – Attorney Howe did not make reasonable efforts to supervise his paralegal. Mr. Howe knew that Carl was inexperienced in the firm as a “new-hire and should have practiced due diligence in his supervisorial duties. Attorney Howe failed to give clear guidelines and did not take immediate remedial action after Carl informed Howe that a new case was taken without his supervision. ABA 1.6 (C ) - Attorney Howe was negligent in his duty to maintain client confidentiality by leaving his office with visibly exposed client work products. Legal Assistant, Carl Jackson’s possible Ethical Violations: (Monday) NFPA-1.8(A) -Legal assistant, Carl, may have engaged in unauthorized practice of law by taking on a case without a supervising attorney’s knowledge and by giving legal advice to an inquiring client(s) regarding whether or not to pursue alimony. Furthermore, Carl negotiated the price of a fixed rate service without supervision, something only an attorney has the authority to do, which could also constitute as another act of unauthorized practice of law. EC1.7 (A)- Legal assistant, Carl ,did not identify himself as a “legal assistant” when he admitted the inquiring clients into Attorney Howe’s office...

Words: 2083 - Pages: 9

Premium Essay

My Paper

...[pic] | | |NEGOTIATION PLAN | |AZ [INSERT] | |FILE REFERENCE: | |PROJECT [NUMBER] | |[PROJECT TITLE] | |[LOCATION & STATE] | | | |PROJECT SPONSOR: [Insert Here] | |PROJECT VALUE: $[X.YYm] | |PACKAGE VALUE: $[X.YYm] | |PREFERRED TENDERER: [INSERT NAME] ...

Words: 1350 - Pages: 6

Premium Essay

Feed Case Study

...Exhibit 1 Term Sheet FEED RESOURCE RECOVERY SERIES A PREFERRED STOCK FINANCING SUMMARY OF TERMS I. INTRODUCTION FEED Resource Recovery (the “Company”) is a company incorporated in the state of Massachusetts and currently has 20,000 ordinary shares issued which are held by the Founders Shane Etan, who holds 16,000 shares, and Ryan Begin who holds the remaining 4,000 shares. The Company desires to authorize the issue of 206,612 shares of Series A Preferred Stock to the investors, Group One Investment Company (the “Investors”), on the terms and conditions as set forth below: II. TERMS OF FINANCING Amount of Financing…………..………. US$250,000 Securities……………………….………. 206,612 Convertible Cumulative Preference shares (“Series A Preferred”) Price…………………………….………. US$1.21 per share (US$266,200) pre-financing valuation, assuming a founders stock pool of 20,000 which will be split at a ratio of 1:11 prior to the Investors making the investment in the Company. After stock split and prior to financing, the Founders will hold 220,000 ordinary shares.) Investors……………………….….……. Group One Investment Company Terms of Series A Preferred: Dividend Rights Holders of Series A Preferred will be entitled to an accrued (but not compounded) cumulative dividend of US$0.121 per share. Dividends will be paid when declared by the board and will be paid in full prior to any dividends to ordinary shareholders. Purpose of Funding The purpose of this financing is to...

Words: 1504 - Pages: 7

Premium Essay

Supply Chain Management

...SUPPLIER CLAIMS AND A SEQUENTIAL FRAMEWORK AND PROCEDURES FOR CLAIMS PROCESS Date: 11 APRIL 2015 1.0 OBJECTIVE. The objective of this memo is to explain the causes of supplier claims and also develop a sequential framework and procedures for claims. It will however cover the following areas. a. Variations. b. Suspension by supplier. c. Delay caused by purchaser or his representative. d. Establish a claim system of identifying and processing claims (flow chart). e. Assessing and evaluating the validity of a claim. f. The role of expert witness. g. Identifying the procedures for dispute resolution. 1.1 VARIATION. This is when parties by mutual agreement modify or alter the terms of a contract. It involves definite alteration as a matter of contract or contractual obligation of parties in mutual agreement and must be supported by consideration in some cases. Variations clause must be indicated in the original contract and must be in writing. Variations take place when there is a change in the original terms especially, the scope of work, design, material usage, price, because of technological advancement, statutory regulations, material changes. Circumstances in which variations occur are as follows: a. Change in the Scope of Design. When the employer varies the original design of the project to the contractor can bring about variation. Example, when the employer decides to vary a carport design into a main garage of a three-bedroom house. b. Statutory Regulations...

Words: 3586 - Pages: 15

Premium Essay

Case Study on Confidentiality

...INDIVIDUAL ASSIGNMENT 1 By Suman Lectured by Prof. Siva ID No. 012014111647 Jeong Chun Phuoc BUSINESS LAW DLW 5013 A BUSINESS ETHICS CASE STUDY OF : FROM A CLIENT CONFIDENTIALITY PERSPECTIVE 1 BUSINESS LAW DLW 5013 Contents Executive Summary ................................................................................................................................ 3 Company Overview ............................................................................................................................ 3 Introduction ............................................................................................................................................. 4 Problem Statement in Censere ................................................................................................................ 5 Findings .................................................................................................................................................. 6 Data Storage .................................................................................................................................... 7 Level of Responsibility by Data User ............................................................................................. 7 Limitation........................................................................................................................................ 8 Recommendation .............................................................

Words: 5727 - Pages: 23

Free Essay

Case Study

...Article 39.3 of the TRIPS Agreement: Its Genesis and the Present Context Biswajit Dhar 1. The Problem In the long series of disputes that the implementation of the Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS) in developing countries has seen, the controversy around protecting test data as provided for under Article 39.3 has few parallels in terms of enduring impact that it could have. This Article provides that “Members, when requiring, as a condition of approving the marketing of pharmaceutical or of agricultural chemical products which utilize new chemical entities, the submission of undisclosed test or other data, the origination of which involves a considerable effort, shall protect such data against unfair commercial use. In addition, Members shall protect such data against disclosure, except where necessary to protect the public, or unless steps are taken to ensure that the data are protected against unfair commercial use.” While Article 39.3 is clearly intended to ensure that “undisclosed test data” was not misappropriated, the pharmaceutical industry associations in the United States and the European Union, representing the larger companies, have argued that Article 39.3 should be interpreted in a manner that provides statutory protection spanning a period of time to data submitted for obtaining marketing approval, among others. In a submission made in 1999, the Pharmaceutical Research and Manufacturers of America (PhRMA) had argued...

Words: 13976 - Pages: 56

Premium Essay

Consensual Relationship Agreement

...Consensual Relationship Agreement Zachery Jenkins BUS 520: Leadership and Organizational Jelena Vucetic 4/22/12 Consensual Relationship Agreements According to studies, about 80% of people have either been in or witnessed romantic relationships in their workplace (Loftus). Consensual Relationship Agreements or “Love Contracts” are guidelines and agreements between employer and employee on handling these workplace romances. The idea behind these contracts is to differentiate between what is actually an office romance, what is consensual, versus actions that are uninvited, such as sexual harassment. Now whether or not they are necessary or even effective depends on how you choose to analyze them. CRAs could deem themselves pretty useful in my current workplace. Full time employees work an average of 45 hours per week, which is a little over 26% of the entire week if broken down into a percentage. Spending over a quarter of your week in the same place, with the same people, both male and female, the possibility of attraction between two individuals involved will certainly increase. Since it’s nearly impossible to manage human nature, adopting policies and guidelines to accommodate these romances, would actually be fostering the mental psyche of the modern professional man and woman, and allowing them to work in more comfortable and secret-free environment. In the type of team environment that I work in, where each employee has to interact with another on a daily basis...

Words: 2126 - Pages: 9

Premium Essay

Lab 8

...1. What are some common risks, threats, and vulnerabilities commonly found in the Remote Access Domain that must be mitigated through a layered security strategy? Some common risks, threats, and vulnerabilities commonly found in the Remote Access Domain that must be mitigated through a layered security strategy are: • Private data or confidential data is compromised remotely (Kim & Solomon, 2012). • Unauthorized remote access to IT systems, applications, and data (Kim & Solomon, 2012). • Mobile worker laptop is stolen (Kim & Solomon, 2012). • Multiple logon retries and access control attacks (Kim & Solomon, 2012). 2. What default configuration should be placed on host-based firewalls when accessing the network remotely? The deny-by-default rulesets for incoming traffic should be placed on host-based firewalls when accessing the network remotely to prevent malware incidents (Wikia, n.d.). 3. What risks, threats, and vulnerabilities are introduced by implementing a Remote Access Server? Risks, threats, and vulnerabilities introduced by implementing a Remote Access Server are: • External hosts gain access to internal resources (Scarfone, Hoffman, & Souppaya, 2009) • An unauthorized user eavesdrops on remote access communications and manipulate them using a compromised server (Scarfone, Hoffman, & Souppaya, 2009) • Partially patched remote access servers (Scarfone, Hoffman, & Souppaya, 2009) 4. What is a recommended best practice when implementing a Remote Access Policy...

Words: 917 - Pages: 4