¶¶Òõ¶ÌÊÓÆµ

Confidentiality Agreement Template for Hong Kong

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Confidentiality Agreement

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Confidentiality Agreement

"I need a Confidentiality Agreement governed by Hong Kong law for sharing sensitive technology information with a potential investor from mainland China, with special attention to data protection and export control requirements."

Document background
The Confidentiality Agreement is essential for businesses operating in Hong Kong's dynamic commercial environment where protecting sensitive information is crucial. It is commonly used before entering into business discussions, during due diligence processes, in employment contexts, or when sharing proprietary information with potential partners or service providers. The agreement must comply with Hong Kong's common law system and relevant ordinances, particularly regarding data privacy and trade secrets protection. It typically covers the definition of confidential information, permitted uses, security measures, duration of confidentiality obligations, and consequences of breach. This document is particularly important given Hong Kong's role as a major international business hub, where cross-border transactions and information sharing are common.
Suggested Sections

1. Parties: Identification of all parties to the agreement, including full legal names, registration numbers, and registered addresses

2. Background: Context of the agreement, purpose of sharing confidential information, and nature of the business relationship

3. Definitions: Definitions of key terms including 'Confidential Information', 'Permitted Purpose', 'Representatives', and other relevant terms

4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement

5. Obligations of Confidentiality: Core confidentiality obligations, including duty to maintain secrecy and standard of care

6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to representatives and professional advisors

7. Security Measures: Required security measures for protecting confidential information

8. Return or Destruction of Confidential Information: Obligations regarding the return or destruction of confidential information upon termination or request

9. Term and Termination: Duration of the agreement and termination provisions

10. Remedies: Available remedies in case of breach, including injunctive relief

11. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, entire agreement, and amendments

Optional Sections

1. Data Privacy Compliance: Specific provisions for compliance with the Personal Data (Privacy) Ordinance when personal data is involved

2. Group Company Rights: Provisions allowing sharing with group companies and affiliates, used when dealing with corporate groups

3. Intellectual Property Rights: Specific provisions regarding IP rights when confidential information includes IP

4. Non-Solicitation: Restrictions on soliciting employees or customers, used when there's a business relationship

5. Export Control: Provisions for compliance with export control laws, used when dealing with regulated technologies or international transfers

6. Competing Projects: Provisions addressing participation in competing projects, used in competitive industries

7. Residual Knowledge: Provisions regarding use of residual knowledge, used in professional services contexts

8. Force Majeure: Provisions for unforeseen circumstances affecting confidentiality obligations

Suggested Schedules

1. Schedule 1 - Description of Confidential Information: Detailed list or categories of confidential information covered

2. Schedule 2 - Authorized Representatives: List of authorized representatives who may access confidential information

3. Schedule 3 - Security Protocols: Detailed security measures and protocols for handling confidential information

4. Schedule 4 - Permitted Purpose: Detailed description of the permitted purpose for using confidential information

5. Schedule 5 - Group Companies: List of group companies or affiliates covered by the agreement, if applicable

Authors

Alex Denne

Head of Growth (Open Source Law) @ ¶¶Òõ¶ÌÊÓÆµ | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Relevant legal definitions




























Clauses





























Relevant Industries

Technology

Financial Services

Manufacturing

Healthcare

Professional Services

Real Estate

Retail

Education

Telecommunications

Biotechnology

Energy

Media and Entertainment

Consumer Goods

Construction

Logistics

Research and Development

Relevant Teams

Legal

Compliance

Human Resources

Business Development

Research and Development

Information Technology

Finance

Operations

Procurement

Risk Management

Corporate Secretariat

Investment

Innovation

Strategy

Relevant Roles

Chief Executive Officer

Chief Legal Officer

General Counsel

Legal Counsel

Compliance Officer

Business Development Manager

Human Resources Director

Project Manager

Research Director

Investment Manager

Chief Technology Officer

Procurement Manager

Contract Manager

Chief Financial Officer

Operations Director

Innovation Manager

Corporate Secretary

Risk Manager

Industries








Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

No items found.

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

³Ò±ð²Ô¾±±ð’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.