Drafting and Reviewing Confidentiality Agreements West LegalEdcenter 2012.

Slides:



Advertisements
Similar presentations
Remedy Statistics April 2009 May 28th 2009 Paris Desktop Support Analysis only done with Remedy tickets (Incident-Task-Request) (GRS requests are not included.
Advertisements

© 2008 Oracle Corporation – Proprietary and Confidential.
2-105(1) "Goods" means all things (including specially manufactured goods) which are movable at the time of identification to the contract for sale other.
Let’s Study Legal English Together!
Contract Analysis Codex FutureLaw Stanford Law School.
IIT Office of General Counsel Education Program Non-Disclosure/Confidentiality Agreements.
DELVACCA Presents: Non-disclosure Agreements Don’t Get Stung March 11, 2010 Doug Raymond, Drinker Biddle & Reath LLP David J. Anderson, Kulicke & Soffa.
A LITIGATOR’S ADVICE ON LITIGATION AVOIDANCE Alan N. Greenspan Jackson Walker LLP © 2004 by Alan N. Greenspan. All rights reserved.
© 2013 Sri U-Thong Limited. All rights reserved. This presentation has been prepared by Sri U-Thong Limited and its holding company (collectively, “Sri.
Topics Changes Risk Assessments Cloud Data Security / Data Protection Licenses, Copies, Instances Limits of Liability and Indemnification Requests for.
© 2014 Microsoft Corporation. All rights reserved.
IMPORTANT READ CAREFULLY BEFORE USING THIS PRODUCT LICENSE AGREEMENT AND LIMITED WARRANTY BY INSTALLING OR USING THE SOFTWARE, FILES OR OTHER ELECTRONIC.
Disclosure and Use of Tax Return Information Take effect 1/1/2009 § 7216 Final Regulation § Final Regulation § Final Regulation §
PROSPECTUS AND COMMENCEMENT OF BUSINESS
Innovations in Structured Products October 25, 2010 An Innovator’s Dilemma?
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Burnslev.com © 2013 Burns & Levinson LLP Allocating and Mitigating Contractual Risk ACC – NE Corporate Counsel Institute June 12, 2013 Alan M. Block, John.
This document contains unpublished confidential and proprietary information of American Express. No disclosure or use of any portion of these materials.
An Equity Perspective Paul Malan Global Markets 21 January 2004.
Mike Zenker Barclays Capital Research (415) November 12, 2007
Aerospace Industries Association Intellectual Property Committee Fall 2009 meeting SMC Enabling Clause Holly Emrick Svetz (703)
Contract Review.  1. The final step in the vendor contracting process should be getting the vendor’s standard written contract and signing the contract.
Permission to reprint or distribute any content from this presentation requires the prior written approval of Standard & Poor’s. Copyright © 2010 Standard.
The Internet of Things Decoupling Data Producers from Data Consumers - Bridging the M2M Implementation Barrier Amaro, Robert Andres.
Protecting Your IP When Doing Business with Third Parties Presented By Henry B. Ward, III W. Kevin Ransom November 1, 2013.
Your Wealth Advisor Identify Goals, Establish Expectations Determine Investment Time Horizon and Risk Tolerance Develop Customized Wealth Management Solutions.
Title Slide – Option 1. Title Slide – Option 2 Insert Text.
© 2003 Haynes and Boone, LLP An Introduction to Going Private Transactions by Jennifer Wisinski June 18, 2003.
PRODUCTIVITY – THE PICTURE FOR THE UK & THE WEST MIDLANDS SUSTAINING COMPETITIVENESS CONFERENCE – THE BELFRY RHYS HERBERT SENIOR ECONOMIST 6 JULY 2012.
Reasonable is in Eye of the Beholder Vendor, Customer, & Litigator Perspectives on Software License Provisions Aaron Brodsky Greg Leibold Peter Gergely.
Permission to reprint or distribute any content from this presentation requires the prior written approval of Standard & Poor’s. Copyright © 2014 by Standard.
Dunedin Enterprise Investment Trust PLC General Meeting – October 2013, Voting Analysis.
Chapter 4 Slide 1 Copyright – David A. McGowan All rights reserved. Revised Chapter 4 REAL ESTATE AGENCY Law of Agency The rights and duties of.
NOV-3733-SL-9316 Carbones KOM - May 10-11, 2010 – Toulouse, France 1 KICK-OFF MEETING May 10-11, 2010.
International Telecommunication Union New Delhi, India, December 2011 ITU Workshop on Standards and Intellectual Property Rights (IPR) Issues Philip.
Changing Databases This presentation gives a quick overview on how to change databases in Osprey.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Receipts.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Supplier Returns.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage and Disposition Inventory Returns.
-1- Oracle E-Business Suite R12.1 Accounts Receivables Essentials Partner Boot Camp Training Courseware.
-1- For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential Oracle.
Dino Tsibouris (614) Updates on Cloud, Contracting, Privacy, Security, and International Privacy Issues Mehmet Munur (614)
Oracle E-Business Suite R12.1 Accounts Payables Partner Boot Camp Training Courseware Part VIII – Transaction Taxes in Payables.
Oracle E-Business Suite R12.1 Accounts Receivables Essentials Partner Boot Camp Training Courseware.
Hot Topics in Business Law Panel 1: Negotiating Contract Issues for in-House Counsel.
-1- For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential Oracle.
Permission to reprint or distribute any content from this presentation requires the prior written approval of Standard & Poor’s. Copyright © 2011 Standard.
The secure site rendering issue (all navigation crushed together as a list at the top of the page) is a compatibility issue with Internet Explorer only.
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Proprietary and Confidential. 1.
Customer Relationship Management Software A proposal by Virtual Dimensions ©Copyright Virtual Dimensions May-2010.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
-1- For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential Oracle.
Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
TRADE SECRETS workshop I © 2009 Prof. Charles Gielen EU-China Workshop on the Protection of Trade Secrets Shanghai June 2009.
Nassau Association of School Technologists
Connectivity to bank and sample account structure
RaboDirect Financial Health Barometer 2016
<Insert Picture Here>
Astrachan Gunst Thomas, P.C.
Clinical Trial Contracts Office -What’s the Hold Up?
Automation in an XML Authoring Environment
Red Flags Rule An Introduction County College of Morris
Transparency: Exceptions
Self-Registration walk-through
Environmental Upgrade Finance
Motivation for 36OU Open Rack
Export Controls – Export Provisions in Research Agreements
© 2013 Sri U-Thong Limited. All rights reserved
2019 MEDICARE AGE-IN STUDY SENIOR MARKET INSIGHTS SERVICE Part IV
Presentation transcript:

Drafting and Reviewing Confidentiality Agreements West LegalEdcenter 2012

Presenters Ken Adams Chris Lemens Glenn West 2

Initial Questions Whether to enter into a confidentiality agreement One-way or two-way? 3

Context Ongoing relationship –Includes employer–employee relationship Proposed transaction –Includes M&A transactions 4

Defining "Confidential Information" General definition –Does it include information disclosed before the date of the agreement? Exclusions –Relevance of personally identifiable information 5

Maintaining Confidentiality "Term" –For how long is confidential information going to be disclosed? –For how long does the recipient have to not use or disclose the information? Distinguishing between trade secrets and other information 6

Disclosure Procedures Specified representatives Marking Giving notice 7

Unauthorized Disclosure or Use Data-security measures Making the recipient responsible –Language alternatives 8

Action on Termination Return or destroy? Exceptions –Records-retention policy –Storage in backup media –File copies 9

No Soliciting No soliciting v. no hiring Permutations –General-advertising exemption 10

Miscellaneous Reverse engineering Residual information Boilerplate –Litigation v. arbitration –Exclusion of damages 11

Process Drafting –Document assembly Review –Automated document analysis (GreenLine, BaseLine, kiiac) 12

Extracts from EDGAR THIS CONFIDENTIALITY AGREEMENT is entered into by and between Acme Corp., a Delaware corporation, and its wholly owned subsidiaries (“Acme”), and Widgetco, Inc., a New York corporation (“Widgetco”), through their authorized representatives, and takes effect on the date executed by the final party (the “Effective Date”). 13

Extracts from EDGAR Confidential Information includes, but is not limited to, the following: (a) Customer records, identity of vendors, suppliers, or landlords, profit and performance reports, prices, selling and pricing procedures and techniques, and financing methods of the Company; (b) Customer lists and information pertaining to identities of the customers, their special demands, and their past, current and anticipated requirements for the products or services of the Company; (c) Specifications, procedures, policies, techniques, manuals, databases and all other information pertaining to products or services of the Company, or of others for which the Company has assumed an obligation of confidentiality; (d) Business or marketing plans, accounting records, financial statements and information, and projections of the Company; (e) Software developed or used by the Company; (f) Information related to the Company’s retailing, distribution or administrative facilities; and (g) Any other information identified or defined as confidential information by Company policy. 14

Extracts from EDGAR The obligations of this Section shall not apply to... (c) information which was rightfully in the possession of the receiving party prior to disclosure by the disclosing party; or

Extracts from EDGAR This Agreement shall be inoperative as to any portion of the Information that (i) is or becomes generally available to the public on a non-confidential basis through no fault by you or your Representatives, or (ii) is or becomes available to you on a non-confidential basis from a source other than the Company, Widget Client Services, [NAME OF LENDER] or their respective Representatives …. 16

Extracts from EDGAR Pursuant to Section of that certain Lease, dated as of July _____, between Acme Finance Inc. (the “Company”) and 85 Widget Street LLC (the “Landlord”) for certain space at 85 Widget Street, Widgetville, New York (the “Property”), the Company is obligated to provide to Landlord certain non-public, confidential, proprietary financial information with respect to the Company and its affiliates (“Confidential Information”). 17

Extracts from EDGAR Each party agrees: (i) to maintain the other party’s Confidential Information in strict confidence; (ii) not to disclose such Confidential Information to any third parties; and (iii) not to use any such Confidential Information for any purpose except for the Business Purpose. 18

Extracts from EDGAR The receiving party shall treat as strictly confidential, and use all reasonable efforts to preserve the secrecy and confidentiality of, all Confidential Information received from the disclosing party, including implementing reasonable physical security measures and operating procedures. 19

Extracts from EDGAR This Confidentiality Agreement may be terminated by either party upon breach by the other party of any its obligations hereunder and such breach is not cured within three (3) calendar days after the allegedly breaching party is notified by the disclosing party of the breach. 20

Extracts from EDGAR ALL CONFIDENTIAL INFORMATION IS PROVIDED BY THE DISCLOSING PARTY “AS IS.” EXCEPT AS MAY OTHERWISE BE SET FORTH IN A SIGNED, WRITTEN AGREEMENT BETWEEN THE PARTIES, THE PARTIES MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESSED OR IMPLIED, AS TO THE ACCURACY, COMPLETENESS, CONDITION, SUITABILITY, PERFORMANCE, FITNESS FOR A PARTICULAR PURPOSE, OR MERCHANTABILITY OF ANY CONFIDENTIAL INFORMATION, AND THE PARTIES SHALL HAVE NO LIABILITY WHATSOEVER TO ONE ANOTHER RESULTING FROM RECEIPT OR USE OF THE CONFIDENTIAL INFORMATION. 21