What Constitutes Confidential Information
Confidential information includes, but is not limited to:- Employee, contractor, and personnel records
- Unpublished financial data, forecasts, pricing, and investor materials
- Customer, partner, vendor, and prospect data
- Product roadmaps, technical designs, source code, models, prompts, datasets, and internal documentation
- Internal communications, strategy documents, and non-public initiatives
- Any information marked or reasonably understood to be confidential
- Role-based access to systems and data
- Monitoring and auditing of access to sensitive information
- Secure infrastructure, encryption, backups, and access controls
- Privacy and security training as required
- Compliance with applicable data protection laws
- Access confidential information only when required for authorized work
- Use company-approved systems and secure networks where mandated
- Protect credentials and never share passwords, tokens, or access keys
- Lock, encrypt, or otherwise secure devices and documents containing confidential data
- Dispose of confidential materials securely when no longer required
- Immediately report suspected data loss, breaches, or unauthorized access
- Unauthorized possession or retention of confidential information may result in immediate disciplinary action.
- Secure your device with passwords, biometrics, and encryption
- Keep operating systems and security updates current
- Avoid storing confidential data on unsecured or shared devices
- Allow company-directed security actions (such as access revocation or data wipe) in case of loss, theft, or exit
- Ensure no unauthorized person accesses company information through your device
- Use confidential information for personal benefit or outside work
- Disclose confidential information to unauthorized parties
- Copy, export, or replicate confidential materials without approval
- Store company data on insecure platforms or devices
- Retain company data after termination of engagement