Esha is a law graduate at Sprintlaw from the University of Sydney. She has gained experience in public relations, boutique law firms and different roles at Sprintlaw to channel her passion for helping businesses get their legals sorted.
If you're building a business, your information is often worth more than your physical assets.
Your customer list, pricing model, supplier terms, marketing strategy, product roadmap, internal processes, and software code can be the difference between "steady growth" and "someone else taking your edge".
The tricky part is that business information doesn't usually get "stolen" in a movie-style moment. In real life, it's more likely to happen quietly: a team member forwarding files to a personal email, a contractor reusing your materials for another client, a competitor hiring someone who knows your playbook, or a cyber incident that exposes your data.
The good news is you can put sensible protections in place from day one. And you don't need a huge legal budget to start doing this properly - you just need the right mix of legal documents, internal controls, and practical habits.
What Business Information Can Be Stolen (And Why It's So Common)
"Business information" is a broad category. It can include anything that gives your business commercial value because it isn't public.
Common Examples Of High-Value Business Information
- Customer and lead lists (including buying habits, contact details, decision-maker notes)
- Pricing, margins and quotes (especially if you're tendering or negotiating regularly)
- Supplier and manufacturer terms (rates, minimum order quantities, special arrangements)
- Product plans (roadmaps, prototypes, formulas, designs)
- Marketing strategy (campaign calendars, ad accounts, creative assets, audience data)
- Operational processes (workflows, scripts, training materials, templates)
- Software and technical documentation (source code, architecture docs, API keys)
- Financial information (forecasts, investor decks, fundraising plans)
How Information Usually Walks Out The Door
In our experience, the biggest risks tend to fall into a few predictable buckets:
- Employees and ex-employees taking files, client contacts, or know-how to a competitor (or to start their own business).
- Contractors reusing deliverables, templates, or internal playbooks across multiple clients.
- Business partners pushing beyond what was agreed and using shared information for their own benefit.
- Cyber security incidents (phishing, weak passwords, poor access control, lost devices).
- Loose internal practices like shared logins, no offboarding checklist, or "everyone can access everything".
The theme is simple: most information theft happens because access was easy and expectations weren't documented.
What The Law Cares About (In Plain English)
In the UK, there are a few legal routes that may apply when business information is misused, depending on what happened:
- Breach of confidence (a common-law claim) - broadly, where someone uses confidential information in an unauthorised way.
- Trade secrets - the Trade Secrets (Enforcement, etc.) Regulations 2018 can apply where information is secret, has commercial value because it's secret, and you've taken reasonable steps to keep it secret.
- Data protection - if personal data is involved (customer info, employee records), the UK GDPR and Data Protection Act 2018 can kick in.
- Computer misuse / hacking - the Computer Misuse Act 1990 may be relevant if someone accessed systems without permission.
- IP ownership disputes - where someone claims they own your content, software, designs, or brand assets.
But here's the key point: your legal position is usually much stronger if you can show you clearly identified what's confidential and you treated it like it mattered.
Build Your Legal Protections (So It's Not Just "Hope And Trust")
Most businesses rely on relationships and trust - and that's a good thing. But legal protection is what turns "this is ours" into "we can actually enforce this if we have to".
Start With The Right Confidentiality Documents
If you're sharing information with anyone outside your core team - potential partners, suppliers, freelancers, agencies, or investors - you should seriously consider a properly drafted Non-Disclosure Agreement.
A good NDA typically helps you:
- define what "confidential information" includes (and what it doesn't)
- set clear limits on how information can be used
- require secure storage and restricted sharing
- force return/deletion of information at the end of the relationship
- make enforcement more practical if something goes wrong
NDAs aren't only for "big tech" moments. If you're sending pricing models, draft product specs, client opportunities, or internal processes, it's often worth putting the basics in writing.
Make Sure Your Employment Documents Cover Confidentiality Properly
Employees often have legitimate access to sensitive data - so employment documentation needs to clearly set boundaries. Confidentiality duties are often included in an employment contract and reinforced through workplace policies.
It's also smart to have clear Workplace Confidentiality Policies so your expectations aren't just "implied" or left to culture.
This matters because if a dispute comes up, a clear paper trail can help show that:
- the information was treated as confidential
- the person knew (or should have known) it was confidential
- there were reasonable protections in place
Lock Down IP Ownership With Contractors And Creatives
A really common blind spot is assuming that because you "paid for it", you automatically own it.
For many types of work (especially creative work and software), the default position can be complicated. That's why businesses often use an IP Assignment (or strong IP clauses in a services agreement) to confirm that all deliverables and underlying rights are owned by your business.
This is particularly important if contractors have access to valuable internal information as well - because IP disputes and confidentiality breaches often show up together.
Use Clear Policies To Control How Your Team Uses Systems
Policies aren't just admin. They're part of how you set a "reasonable steps" baseline.
An Acceptable Use Policy can help you set rules around:
- using company devices versus personal devices (BYOD)
- password standards and multi-factor authentication
- installing software and browser extensions
- using personal email, cloud storage, or messaging apps for work files
- monitoring and security controls (where appropriate)
Done properly, this reduces risk and reduces confusion. People generally want to do the right thing - they just need clarity.
Don't Ignore AI Tool Risks (2026 Reality Check)
In 2026, a lot of "information theft" doesn't look like theft - it looks like someone pasting sensitive information into an AI tool to "save time".
Even if the intention is harmless, the risk can be serious: confidential business info could be exposed, stored, or used in ways you didn't expect.
That's why many employers are now adopting a Generative AI Use Policy to set clear boundaries on what can (and can't) be shared with AI tools.
Put Practical Controls In Place (People, Process And Tech)
Legal documents matter, but they work best when paired with practical controls. If you want to protect business information, the goal is to reduce three things:
- unnecessary access
- untracked sharing
- unclear expectations
1) Restrict Access (The "Need-To-Know" Rule)
If everyone has access to everything, you're relying on trust alone.
A better approach is role-based access:
- Sales can access CRM data, but not payroll files.
- Finance can access bank details, but not product source code.
- Contractors can access the project folder, but not your whole Google Drive.
This isn't about being secretive - it's about reducing the blast radius if something goes wrong.
2) Use Offboarding Checklists Every Time
Information often leaves during transitions. A solid offboarding process can include:
- removing access to email, shared drives, password managers, project tools, and banking platforms
- recovering devices and verifying deletion of local files (where relevant)
- changing shared passwords and API keys
- confirming return of confidential materials
- reminding the person of ongoing confidentiality duties
It's also wise to document the process. If a dispute happens later, you'll be glad you did.
3) Treat Shared Passwords As A Short-Term Emergency Only
Shared logins create two big problems:
- You can't track who accessed what.
- If someone leaves, you don't know what they still have access to.
Password managers and user-based permissions are usually a far better solution than "we all use the same login".
4) Keep Your Confidential Information Clearly Labelled
This sounds basic, but it matters: if you want legal protection, it helps if documents are marked "Confidential" and stored in restricted folders.
Even better, set up a simple internal system, like:
- Public (safe to share externally)
- Internal (not public, but not critical)
- Confidential (restricted sharing, high impact if leaked)
- Highly Confidential (limited access, approval required to share)
This makes it much easier to train your team and enforce consistent habits.
Data Protection And Cyber Security Obligations (UK GDPR And Beyond)
If the information at risk includes personal data - like customer contact details, staff records, or identifiable user behaviour - protecting it isn't just "good practice". It's a legal obligation.
What UK GDPR Expects From You (In Practical Terms)
UK GDPR and the Data Protection Act 2018 require you to take appropriate technical and organisational measures to keep personal data secure.
In day-to-day business terms, that often means:
- using strong authentication (including multi-factor authentication where possible)
- restricting access to personal data
- training staff on phishing and social engineering
- maintaining secure backups
- keeping devices encrypted and updated
- having clear processes for breaches and suspicious activity
There's no one-size-fits-all checklist - what's "appropriate" depends on your business, the kind of data you handle, and the risk level.
Have A Plan For Incidents (Before You Need One)
When something goes wrong, time matters. A documented Data Breach Response Plan can help you act quickly, minimise damage, and make clearer decisions about containment, notifications, and next steps.
Even if you never experience a major breach, having a plan usually improves internal processes (and helps your team feel confident about what to do).
Be Careful With Monitoring And Device Controls
Some businesses respond to risk by increasing monitoring - but you need to do this carefully.
If you're monitoring work devices, internet usage, emails, or workplace activity, you'll want to think about privacy obligations, transparency, and proportionality.
Monitoring can be lawful in the right context, but it should be done with clear policies and proper advice for your situation.
What To Do If You Suspect Information Has Been Stolen
If you think someone has taken or misused your business information, it's completely normal to feel angry - but try not to rush into a knee-jerk reaction that creates more problems.
Instead, focus on a calm, evidence-based approach.
Step 1: Contain The Risk Immediately
- Remove access to accounts and systems (email, cloud storage, CRM, project tools).
- Reset passwords, rotate API keys, and revoke device access.
- Preserve logs and device records (don't wipe things until you've captured what you need).
Step 2: Work Out What Was Taken (And What It Impacts)
Try to define:
- what information is involved (customer list, pricing, code, documents)
- how it was accessed and when
- whether personal data is involved (this affects legal obligations)
- who else may have received it (competitor, personal account, third party)
This step is important because your response will differ depending on whether it's a confidentiality issue, an IP issue, a data breach, or all three.
Step 3: Check Your Contracts And Policies
Before you send any formal letters or threats of action, check what your documents actually say.
You may have relevant clauses in:
- employment contracts
- contractor agreements
- NDAs
- company policies and handbook documents
If your paperwork is unclear (or missing), it doesn't mean you have no options - but it can change the strategy.
Step 4: Consider A Legal "Stop" Request
Depending on the facts, you may be able to require the person (and sometimes any recipient) to:
- stop using the information
- return or delete materials
- confirm in writing what has happened
- preserve evidence
In more serious situations, you might need urgent legal advice about court options (including injunctions). The right approach depends heavily on your evidence and your commercial goals.
Step 5: Don't Forget Regulatory Notifications
If personal data is involved, you may have data breach notification obligations. The ICO can expect notifications within strict timeframes in certain scenarios, so don't leave this too late.
This is one of those areas where tailored advice is really important - the wrong move can create extra risk, but the right move can significantly reduce it.
Key Takeaways
- Identify what counts as confidential in your business (customer lists, pricing, supplier terms, product plans, code) and treat it like it matters.
- Use the right legal documents such as an NDA, strong employment confidentiality terms, and clear contractor IP provisions, so you're protected if a relationship breaks down.
- Put practical controls in place like role-based access, secure offboarding, and avoiding shared logins to reduce the chance of accidental or deliberate misuse.
- Remember UK GDPR obligations if personal data is involved - security isn't optional, and a breach response plan can save you time and stress.
- Act quickly but calmly if you suspect theft by containing access, preserving evidence, reviewing contracts, and getting advice on the best next step.
- Don't DIY the "critical documents" - generic templates often miss the exact protections you'll need when something goes wrong.
If you'd like help protecting your confidential business information with the right contracts and policies, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.






