Skip to main content
Guides Workplace topics NDAs for Tech Workers in 2026 — What They Cover, What They Can't, and What to Negotiate
Workplace topics

NDAs for Tech Workers in 2026 — What They Cover, What They Can't, and What to Negotiate

9 min read · April 25, 2026

NDAs are normal in tech, but overbroad confidentiality language can affect your next job, side projects, public speaking, and ability to report misconduct. This guide explains what to accept, narrow, and challenge in 2026.

NDAs for tech workers in 2026 are everywhere: offer packets, contractor agreements, interview assignments, vendor demos, accelerator programs, M&A diligence, and even casual advisory calls. Most are routine. Some quietly overreach. A good NDA protects source code, model weights, customer data, roadmap plans, security architecture, pricing, and private metrics. A bad NDA tries to turn your entire memory, professional network, wage discussions, side projects, or lawful complaints into forbidden territory. This guide is not legal advice, but it gives you a practical way to read, negotiate, and live with NDAs without accidentally giving up your career mobility.

NDAs for tech workers in 2026: what they should actually cover

A well-drafted NDA defines confidential information with enough specificity that both sides know what is protected. In tech, that usually includes:

  • Source code, architecture diagrams, APIs, internal tools, and unreleased product plans.
  • Security vulnerabilities, incident details, access controls, encryption designs, and audit findings.
  • Customer lists, contracts, pricing, pipeline data, churn risk, support escalations, and implementation details.
  • Financial results, fundraising plans, board materials, acquisition talks, hiring plans, and compensation bands where legally protectable.
  • AI model weights, fine-tuning datasets, evaluation methods, prompts, ranking systems, inference costs, and unpublished benchmarks.
  • Trade secrets and know-how that create business value because they are not generally known.

The clause should also say what is not confidential. Standard exclusions matter more than people think. You want exclusions for information that is public through no fault of yours, already known to you before disclosure, independently developed without using the company's confidential information, received lawfully from a third party, or required to be disclosed by law.

If an NDA has no exclusions, ask for them. That is not a hostile request; it is basic hygiene.

The difference between confidential information and general skills

The most important boundary is between company secrets and your general professional skill. You cannot take a private codebase, customer list, roadmap deck, unreleased model evaluation, or incident postmortem to your next employer. You can take the fact that you learned how to run an on-call process, build a migration plan, structure a product spec, debug distributed systems, manage a finance close, design a sales forecast, or lead a team.

This boundary gets fuzzy in high-specialization roles. If you worked on ranking at a search company, recommender systems at a marketplace, fraud at a fintech, or LLM infrastructure at an AI lab, your next employer may want exactly the expertise you gained. The lawful, practical answer is to speak in methods and judgment rather than secrets.

Instead of saying: "At my last company, the conversion model used these five features and this threshold."

Say: "In similar systems, I would start by validating feature leakage, monitoring distribution drift, and separating online performance from offline AUC."

Instead of saying: "Their enterprise pricing floor was X and procurement would accept Y."

Say: "Enterprise deals in this category often need clear usage tiers, finance-approved discount guardrails, and renewal terms that do not punish expansion."

You protect the former employer's secrets while still being employable.

NDA clauses to read slowly

Most NDAs look short, but a few phrases do a lot of work.

| Clause | Why it matters | Safer version | |---|---|---| | Definition of confidential information | Can become too broad. | Tied to non-public business, technical, financial, customer, or product information. | | Duration | Trade secrets can last indefinitely, but ordinary confidential info should not be forever. | Fixed term for confidential info; trade secrets protected while legally trade secret. | | Purpose limitation | Controls how you may use information. | Use only for employment, evaluation, or the stated business purpose. | | Return/destruction | Can require deleting personal notes or backups. | Return company materials; routine backups excluded if not accessed. | | Residuals | Determines whether unaided memory is restricted. | Allows general skills and unaided memory, excluding trade secrets. | | Compelled disclosure | Covers subpoenas and regulators. | Allows disclosure when legally required with notice where permitted. | | Remedies | May allow injunctions and fee shifting. | Remedies available under law, not automatic admissions. |

The phrase "whether or not marked confidential" is normal for employment because employees see secrets in meetings and Slack. The phrase "all information relating in any way to the company" is too broad unless narrowed by exclusions and purpose.

What NDAs usually cannot block

NDAs cannot lawfully do everything some employers wish they could. Exact rules vary by jurisdiction, but in many places NDAs cannot stop protected wage discussions, legally protected labor activity, reports to regulators, whistleblower complaints, testimony, subpoenas, discrimination or harassment reporting, or disclosure of information that is not actually confidential. Some laws also restrict confidentiality around settlement agreements or require specific notices preserving whistleblower rights.

Do not rely on a generic internet rule. If the issue is serious, talk to a lawyer. But do not assume a scary NDA sentence makes every conversation illegal. Overbroad clauses are common, and companies sometimes include language that would not hold up if challenged.

For U.S. workers, ask for an express carve-out like: "Nothing in this agreement limits the employee's right to report possible violations of law to government agencies, participate in investigations, discuss wages or working conditions where protected by law, or make disclosures protected by whistleblower statutes." That language is ordinary and should not surprise competent counsel.

Interview and take-home NDAs

Pre-employment NDAs deserve special caution because you may not get the job but still absorb restrictions. A company may ask you to review a product plan, dataset, prototype, financial model, or architecture document during interviews. It is reasonable to protect that material. It is not reasonable to make you assign inventions, waive claims, accept noncompetes, or agree that anything you build later belongs to them just because you interviewed.

For take-home projects, ask three questions:

  1. Who owns the work product?
  2. May you show a sanitized version in your portfolio?
  3. Is the assignment based on real company problems or synthetic data?

If the company uses real customer data or asks you to solve production work for free, be careful. If you are already employed, avoid uploading your current employer's code, templates, or data into the process. Your NDA obligations run in both directions.

A clean interview NDA should be limited to information shared during the interview process and expire after a reasonable period for non-trade-secret information. It should not restrict future employment in the field.

Employee NDAs and side projects

The NDA often works together with invention assignment and conflict-of-interest clauses. That means your side project can create two separate issues: using confidential information and creating ownership ambiguity. A weekend app is safer when it uses no company device, no company code, no company data, no internal design, no customer list, no work time, and no business opportunity you learned about solely through the company.

Keep a side-project hygiene file:

  • Project description and start date.
  • Personal GitHub or repository history.
  • Devices and accounts used.
  • Open-source licenses and third-party tools.
  • Notes showing independent ideation.
  • Written approval if the project overlaps the employer's market.
  • Prior-invention schedule attached to your employment contract.

For open source, check whether your employer has a contribution policy. Many tech companies allow contributions but require approval for projects in adjacent areas. Do not paste company code into a public issue, even as a "small example." Do not disclose unreleased architecture in a conference talk. When in doubt, abstract the lesson.

Negotiating an NDA without sounding difficult

You usually do not need to rewrite the whole NDA. Ask for narrow fixes that make the agreement mutual, lawful, and workable.

Useful asks:

  • Add standard exclusions for public information, prior knowledge, independent development, third-party disclosure, and compelled disclosure.
  • Limit ordinary confidential information to a fixed period, while preserving trade-secret protection as required by law.
  • Add whistleblower, wage-discussion, and protected-activity carve-outs.
  • Add a residual knowledge clause for general skills and unaided memory.
  • Clarify that the NDA is not a noncompete or nonsolicit.
  • Narrow return/destruction obligations so they do not require impossible deletion of routine backups.
  • Make the NDA mutual if both sides are sharing sensitive information, such as during consulting, M&A, partnership, or founder discussions.

A simple script: "I'm comfortable protecting confidential information. I have a few standard cleanup requests so the NDA does not restrict lawful reporting, general skills, or information I already know. Can we add the standard exclusions and protected-disclosure carve-out?"

If legal refuses every standard carve-out, that is a signal. It may mean they are inexperienced, or it may mean they want maximum leverage.

Living with an NDA after you sign

The practical risk is rarely one dramatic theft. It is small sloppy behavior: forwarding documents to a personal Gmail, using a customer deck as a portfolio sample, discussing a roadmap at a meetup, copying snippets into a coding assistant, or bringing internal templates to the next job. Build habits that prevent accidental breach.

Good habits:

  • Keep company files on company systems.
  • Do not use personal drives for work documents.
  • Sanitize portfolio examples before you need them.
  • Ask before public talks, podcasts, blog posts, or conference demos.
  • Avoid naming customers or metrics unless already public.
  • Do not train or prompt personal AI tools with confidential information.
  • Return devices and documents cleanly at exit.
  • Keep your own list of permitted public work samples.

At a new job, avoid "rebuilding" a prior employer's exact tool from memory if the design was confidential. You can solve the same class of problem with fresh requirements, fresh architecture, and clean-room thinking. If the new employer pushes you for secrets, say no in writing. That protects both you and them.

Red flags in tech NDAs

Push back hard or get legal advice if the NDA:

  • Has no standard exclusions.
  • Treats all information you ever learn as confidential forever.
  • Bans you from working in the same industry.
  • Claims ownership of ideas unrelated to the company.
  • Blocks wage discussions, reports to regulators, or protected workplace complaints.
  • Requires you to pay the company's attorney fees for any alleged breach without court review.
  • Gives the company broad inspection rights over personal devices.
  • Applies to information received before you even know what will be disclosed.
  • Makes you responsible for accidental disclosure by anyone you talk to, without a fault standard.

The right NDA lets you do your job, protect real secrets, and keep building your career. In 2026, when AI tools, distributed work, and portfolio-driven hiring make information flow faster than ever, the goal is not to avoid NDAs. It is to sign NDAs that distinguish actual confidential information from the professional judgment you are allowed to carry forward.