ARTICLE
27 October 2025

Beyond NDAs: Effective Remedies For Protecting Confidential Information In Nigeria

AP
Advocaat Law Practice

Contributor

Advocaat Law Practice is a full-service commercial law firm proffering the highest quality service to our clients in various sectors of the West African economy.

The African continent is rapidly changing with an ever-growing population and increased economic growth through foreign direct investments. We harness the strength, knowledge, and expertise of our network of professionals to consistently deliver expertly tailored legal advice for the benefit of our clients.

The protection of confidential information in Nigerian commercial practice requires more than faith in non-disclosure agreements. Whilst scepticism about NDAs as standalone protections has merit, understanding their role...
Nigeria Corporate/Commercial Law
Advocaat Law Practice are most popular:
  • within Government, Public Sector and Finance and Banking topic(s)
  • with readers working within the Insurance industries

The protection of confidential information in Nigerian commercial practice requires more than faith in non-disclosure agreements. Whilst scepticism about NDAs as standalone protections has merit, understanding their role as both contractual instruments and evidential foundations for breach of confidence claims transforms them into powerful tools. The key lies in recognising that NDAs serve multiple functions: creating contractual obligations, establishing the confidential nature of information, and providing the framework for equitable remedies when breaches occur. This comprehensive approach proves essential across all commercial sectors, from financial services and telecommunications to manufacturing and professional services, where proprietary information represents critical competitive advantages.

THE EQUITABLE ACTION FOR BREACH OF CONFIDENCE

Nigerian courts recognise breach of confidence as an equitable cause of action independent of contract, providing remedies where confidential information has been misused. The action requires three elements: information having the necessary quality of confidence, communication in circumstances importing an obligation of confidence, and unauthorised use causing detriment. This equitable doctrine protects confidential information even absent written agreements, though proving these elements without documentation presents significant challenges that sophisticated commercial entities should anticipate and address.

The necessary quality of confidence requires information to be genuinely confidential rather than public knowledge. In commercial contexts, this encompasses customer databases, pricing strategies, business plans, technical specifications, marketing strategies, financial projections, supplier arrangements, and operational methodologies. The information need not be absolutely secret - it remains confidential if known only to a limited group who maintain its secrecy. Courts examine whether the information provides competitive advantage through its confidential nature, whether effort and resources were expended in its development, and whether disclosure would cause commercial harm.

The circumstances of communication prove more complex in practice. Courts examine whether a reasonable person in the recipient's position would have realised the information was confidential. Business negotiations, employment relationships, joint venture discussions, due diligence exercises, and consultancy arrangements typically create these circumstances. The challenge lies in establishing these circumstances retrospectively when relationships sour. A potential investor who receives a detailed business plan during acquisition discussions should recognise its confidential nature, as should a consultant given access to internal processes for improvement recommendations. However, proving this recognition without written agreements becomes evidentially burdensome.

Unauthorised use encompasses any deployment of confidential information beyond the purpose for which it was communicated. When a potential distributor uses product specifications shared during negotiations to develop competing products, or a former employee implements customer relationship strategies at a new employer, breach occurs. The scope of authorised use often becomes contested - does sharing financial projections for investment purposes permit their use in credit assessments? Courts examine the primary purpose of disclosure and whether the disputed use falls within reasonable expectations.

Detriment need not be financial; loss of competitive advantage, forced premature disclosure, or disruption of business relationships satisfies this requirement. Nigerian courts follow English authorities recognising that confidential information's value often lies in exclusivity rather than direct monetary worth. The loss of firstmover advantage when a competitor launches a similar product using disclosed information constitutes detriment even if actual sales remain unaffected.

NDAs AS CONTRACTUAL PROTECTION

Non-disclosure agreements create contractual obligations distinct from equitable duties, offering both advantages and limitations. The primary advantage lies in certainty: NDAs define precisely what constitutes confidential information, permitted uses, and breach consequences. This contractual clarity eliminates arguments about whether information possessed the necessary quality of confidence or whether circumstances created confidentiality obligations. Well-drafted NDAs specify categories of confidential information, provide concrete examples, and establish clear boundaries between confidential and nonconfidential material.

The consideration challenge in NDAs requires careful attention, particularly in Nigerian commercial practice where courts strictly apply common law principles. Fresh consideration validates NDAs with existing employees through bonus payments, promotion, additional responsibilities, or training access. For new employees, continued employment typically suffices. With contractors and business partners, mutual confidentiality obligations usually satisfy consideration requirements, as does access to confidential information itself where commercially valuable. Nigerian courts require valuable consideration but accept nominal amounts where commercially reasonable. The critical point is ensuring consideration exists, is documented, and moves from the promisee.

NDAs enable remedies unavailable in pure equity. Liquidated damages clauses provide predetermined compensation, avoiding complex valuation disputes about confidential information's worth. These prove particularly valuable in sectors where quantifying losses from disclosed strategic plans or customer information presents evidential challenges. Courts enforce reasonable pre-estimates of loss, distinguishing them from unenforceable penalties through genuine assessment of likely harm. The preagreement of damages also expedites recovery, reducing litigation complexity.

Properly drafted NDAs should specify governing law, jurisdiction, and dispute resolution mechanisms. Arbitration clauses with emergency arbitrator provisions enable rapid interim relief whilst maintaining confidentiality through private proceedings. Choice of law provisions ensure Nigerian law applies even in international transactions, avoiding uncertainty about applicable legal principles.

THE SYNERGY BETWEEN CONTRACT AND EQUITY

The true power emerges from combining contractual and equitable protections. NDAs establish the evidentiary foundation for breach of confidence claims, eliminating disputes about confidentiality's existence or scope. When an NDA clearly identifies information as confidential and specifies permitted uses, proving the first two elements of breach of confidence becomes straightforward. The agreement itself demonstrates both the information's confidential nature and the circumstances creating confidentiality obligations.

This dual approach provides tactical flexibility in enforcement. Interim injunctions, available in both contract and equity, prevent ongoing or threatened disclosure. However, equitable jurisdiction offers broader remedies, including springboard injunctions preventing defendants from exploiting advantages gained through breach, even after information enters the public domain. This proves crucial when former employees join competitors or when business partners exceed authorised use - the court can restrain them from utilising the head-start gained through access to confidential information.

Third-party liability illustrates another advantage of combining approaches. Whilst NDAs bind only signatories, breach of confidence extends to third parties receiving information knowing it was confidential. When a competitor recruits employees to obtain confidential information, or receives such information from business partners, equitable claims provide recourse despite absence of contractual privity. This becomes particularly relevant in industries with high employee mobility or extensive collaboration networks.

DOCUMENT PREPARATION AND EVIDENCE MANAGEMENT

Success in protecting confidential information depends critically on document preparation that facilitates proof of origin, confidentiality, and disclosure purpose. Every confidential document should contain clear marking systems that survive both physical and electronic distribution. Headers and footers on every page should state "CONFIDENTIAL - SUBJECT TO NDA DATED [DATE]" or similar clear designation. Watermarking provides additional protection, particularly digital watermarks that remain invisible but traceable.

Document control numbers serve multiple purposes: proving origin, tracking distribution, and establishing timelines. A systematic approach might use format "COMPANY-CONFYEAR-NUMBER" allowing immediate identification. Version control proves essential when documents evolve through negotiations or collaboration. Including version numbers, revision dates, and change tracking helps establish which specific information was disclosed when and to whom.

Metadata management requires careful attention. Electronic documents contain embedded information about creation dates, authors, and modifications. Whilst this aids in proving origin, it may also reveal more than intended. Companies should implement policies about metadata cleaning for external distribution whilst preserving copies containing full metadata for evidential purposes.

Cover sheets or transmission emails should explicitly state the confidential nature and purpose of disclosure. Standard language might read: "The attached documents contain confidential proprietary information disclosed solely for the purpose of [specific purpose] pursuant to the NDA dated [date]. Any use beyond this stated purpose is strictly prohibited."

This contemporaneous documentation proves invaluable when memories fade or relationships deteriorate.

Distribution logs recording what information was shared with whom, when, and for what purpose create crucial evidence trails. These logs should capture document names and version numbers, recipient details including specific individuals not just organisations, disclosure dates and methods, stated purposes for disclosure, and any restrictions or conditions communicated. Electronic distribution through secure portals or tracked email systems provides automatic logging, but physical document sharing requires manual recording.

For particularly sensitive information, consider progressive disclosure strategies. Initial discussions might involve high-level summaries, with detailed information released only after executing specific NDAs and documenting legitimate need. This staged approach creates clear evidence of increasing confidentiality levels and deliberate disclosure decisions.

REMEDIES AND ENFORCEMENT STRATEGIES

Different breach scenarios demand different remedial approaches tailored to the nature of the breach and commercial objectives. Urgent interim injunctions suit ongoing breaches or imminent threats, particularly when employees join competitors or partners threaten disclosure. These applications require speed and strong prima facie evidence, making pre-existing NDAs invaluable for establishing clear obligations. Nigerian courts can grant ex parte injunctions within hours in genuine emergencies, though the applicant must demonstrate real urgency and potential irreparable harm.

For breach of NDAs, contractual remedies include ordinary damages calculated on standard Hadley v Baxendale principles - losses must be reasonably foreseeable at contract formation. This often proves inadequate for confidential information where true damage emerges years later through lost opportunities or diminished competitive position. Liquidated damages clauses partially address this by pre-agreeing compensation, though courts scrutinise whether amounts represent genuine pre-estimates rather than penalties. Specific performance rarely applies since courts cannot supervise ongoing confidentiality, making injunctive relief the preferred equitable remedy even for contractual breaches.

Breach of confidence offers broader remedial scope reflecting equity's flexibility. Beyond compensatory damages, courts may award equitable compensation on a more generous basis than contractual damages, considering the breach's unconscionable nature. Account of profits remains theoretically powerful, requiring defendants to disgorge all benefits obtained through misused information. However, practical reality proves challenging: defendants must maintain detailed financial records, profits must be directly traceable to the confidential information, and the accounting exercise itself becomes expensive and contested. By the time Nigerian courts render final judgment, often three to five years post-breach, defendants may have dissipated assets or restructured operations, making profit extraction difficult.

The temporal challenge cannot be understated. Confidential information rapidly depreciates - innovative business strategies valuable today may be commonplace in two years. Whilst interim relief through ex parte injunctions obtained within days can prevent initial disclosure, and interlocutory injunctions pending trial maintain status quo, these are not always obtainable or successful. When interim relief fails or is unavailable, meaningful remedies remain available. Courts increasingly recognise the continuing commercial value of springboard advantages gained through breach, awarding damages for the head-start period even after information becomes public. The doctrine prevents unjust enrichment by measuring the time and cost defendants saved through misappropriation rather than just the information's current value.

Post-breach remedies can prove surprisingly effective when properly pursued. Exemplary damages, though rare in commercial cases, apply where breach involves calculated wrongdoing, particularly relevant when competitors deliberately target employees to obtain confidential information or when trusted partners systematically exceed authorised use. Constructive trusts offer an underutilised remedy, treating profits or assets derived from confidential information as held on trust for the claimant. This proves particularly valuable when defendants have used confidential information to secure contracts, develop competing products, or establish rival operations. The proprietary nature of constructive trusts provides priority in insolvency and enables tracing through corporate structures.

Restitutionary damages based on the reasonable value of a licence fee the defendant would have paid for legitimate access provides compensation even where direct losses prove difficult to quantify. Courts examine comparable commercial arrangements to determine what willing parties would have negotiated for similar information access. This approach proves particularly useful for technical information or business intelligence where market comparables exist.

CRITICAL IMPLEMENTATION CONSIDERATIONS

Effective protection requires understanding practical enforcement realities within Nigerian commercial litigation. The relationship between parties fundamentally affects enforcement strategies. International companies respond differently to legal threats than local entities, often preferring negotiated solutions to preserve reputation. Industry relationships and reputational considerations may favour arbitration over public litigation. Employee breaches differ from partner breaches in both evidence availability and remedy appropriateness.

The delayed compensation problem requires creative approaches beyond traditional litigation. Staged settlement agreements with immediate partial payments and contingent future payments based on defendant's profits provide earlier relief whilst maintaining pressure for compliance. Insurance products increasingly cover confidential information breaches, providing immediate compensation whilst insurers pursue recovery. Some policies specifically cover employee dishonesty, cyber breaches leading to information disclosure, and even competitive intelligence gathering by rivals.

Building remedial flexibility into NDAs from inception improves enforcement prospects. Confession of judgment clauses, though requiring careful drafting for enforceability, can expedite recovery. Agreed valuation methodologies for different types of information reduce disputes about quantum. Escalating penalties for continued breach after notice create incentives for immediate compliance. Alternative dispute resolution provisions with expedited timelines balance speed with due process.

Pre-action protocols deserve consideration. Formal letters before action that detail the confidential information, evidence of breach, and proposed remedies often prompt settlement without litigation. These letters should be drafted assuming eventual court scrutiny, demonstrating reasonableness whilst firmly asserting rights. Including evidence of the information's value and the breach's impact strengthens negotiating position.

CONCLUSION

The perception that NDAs lack effectiveness in Nigeria often reflects poor structuring and enforcement rather than inherent legal weakness. When properly drafted with adequate consideration and clear definitions, NDAs create enforceable contractual obligations whilst establishing foundations for breach of confidence claims. The combination provides overlapping protections and flexible enforcement options suited to different breach scenarios. Success requires more than agreements alone: it demands systematic approaches to document preparation, classification, and evidence preservation that enable effective enforcement when breaches occur. Companies that invest in comprehensive confidentiality frameworks, combining preventive measures with realistic enforcement strategies, find that Nigerian law provides substantial protection for confidential information despite the absence of specific trade secrets legislation. The key lies not in choosing between contractual and equitable protection but in structuring arrangements that maximise both whilst creating practical enforcement mechanisms suited to Nigerian commercial realities.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More