💡 Plain English Explanation

The return or destruction clause specifies what happens to confidential materials when the NDA ends, the business relationship concludes, or the disclosing party requests it. This clause typically requires the receiving party to either:


In the digital age, this clause has become increasingly complex. Information lives in email archives, backup tapes, cloud storage, and disaster recovery systems. Complete destruction is often technically impossible, which is why modern clauses include exceptions for retained copies in certain circumstances.

Why It Matters

For the Disclosing Party: You shared sensitive information for a specific purpose. When that purpose ends, you want your information back or confirmed destroyed. Without this clause, the receiving party could retain copies indefinitely, increasing the risk of future leaks, competitive misuse, or inadvertent disclosure.

For the Receiving Party: Complete destruction may be technically impossible. Modern IT infrastructure creates copies automatically - email servers retain messages, backup systems capture snapshots, and cloud services replicate data across regions. Agreeing to "destroy all copies" when you cannot actually do so sets you up for breach.

The Certification Problem: Many clauses require an officer to certify that all information has been destroyed. Signing such a certification when you know backup copies may exist creates personal liability risk for the certifying officer.

🚩 Risk Factors

📄 Clause Versions

Balanced Version: Practical approach with reasonable timeframes, retention exceptions for backups and legal requirements, and qualified certification.
RETURN OR DESTRUCTION OF CONFIDENTIAL INFORMATION

1. Triggering Events. Upon the earliest of (a) termination or expiration of this Agreement, (b) completion of the Purpose, or (c) written request by the Disclosing Party, the Receiving Party shall comply with this Section.

2. Return or Destruction. Within thirty (30) days of a triggering event, the Receiving Party shall, at the Disclosing Party's option:

   (a) Return to the Disclosing Party all tangible materials containing or embodying Confidential Information, including all copies, notes, summaries, and analyses; or

   (b) Destroy all tangible and electronic materials containing or embodying Confidential Information using commercially reasonable methods appropriate for the sensitivity of the information.

3. Certification. Upon completion of return or destruction, the Receiving Party shall provide written certification signed by an authorized representative confirming that, to such representative's knowledge after reasonable inquiry, the Receiving Party has complied with this Section.

4. Permitted Retention. Notwithstanding the foregoing, the Receiving Party may retain:

   (a) One (1) archival copy of Confidential Information solely for legal compliance, audit, or dispute resolution purposes;

   (b) Copies of Confidential Information contained in automated backup, archival, or disaster recovery systems, provided such copies are deleted in the ordinary course of backup rotation;

   (c) Materials required to be retained by applicable law, regulation, or professional standards; and

   (d) Residual knowledge retained in the unaided memory of the Receiving Party's personnel.

5. Continuing Obligations. All Confidential Information retained pursuant to this Section shall remain subject to the confidentiality obligations of this Agreement until destroyed.

6. No Ongoing Access. Upon return or destruction, the Receiving Party shall not access any retained copies except as necessary for the permitted retention purposes.
Disclosing Party Favor: Strict requirements, short timeframe, detailed certification, verification rights, and limited retention exceptions.
MANDATORY RETURN AND DESTRUCTION

1. Triggering Events. Upon (a) termination or expiration of this Agreement for any reason, (b) completion of the Purpose, (c) written request by the Disclosing Party (which may be made at any time and for any reason), or (d) the Disclosing Party's reasonable determination that the Receiving Party has breached this Agreement, the Receiving Party shall immediately comply with this Section.

2. Immediate Return. Within ten (10) business days of a triggering event, the Receiving Party shall return to the Disclosing Party:

   (a) All originals and copies of any documents, materials, media, notes, analyses, compilations, studies, or other materials containing, reflecting, or derived from Confidential Information;

   (b) All tangible property of the Disclosing Party in the Receiving Party's possession; and

   (c) All electronic files and data containing Confidential Information on any storage medium.

3. Mandatory Destruction. In addition to return, the Receiving Party shall permanently destroy all electronic copies of Confidential Information from all computer systems, servers, cloud services, mobile devices, and backup systems using industry-standard secure deletion methods that render recovery impossible.

4. Detailed Certification. Within fifteen (15) business days of a triggering event, the Receiving Party shall provide a written certification signed by an officer of the Receiving Party, under penalty of perjury, confirming:

   (a) All Confidential Information has been returned or destroyed;
   (b) A complete inventory of all materials returned;
   (c) A description of destruction methods used;
   (d) Confirmation that no copies, notes, or derivatives have been retained; and
   (e) A list of all individuals who accessed Confidential Information.

5. Verification Rights. The Disclosing Party may, upon reasonable notice, conduct an inspection or forensic examination of the Receiving Party's systems to verify compliance with this Section. The Receiving Party shall bear all costs of such verification.

6. Limited Exceptions. The Receiving Party may retain materials solely as required by applicable law, provided that:

   (a) The Receiving Party notifies the Disclosing Party in writing of the specific legal requirement;
   (b) Retention is limited to the minimum necessary; and
   (c) Access is restricted to legal and compliance personnel only.

7. Ongoing Obligations. Confidentiality obligations shall survive any return or destruction and shall continue indefinitely with respect to any retained materials.
Receiving Party Favor: Maximum flexibility, reasonable efforts standard, broad retention exceptions, and acknowledgment of technical limitations.
RETURN OR DESTRUCTION

1. Request Required. Upon written request by the Disclosing Party following termination or expiration of this Agreement, the Receiving Party shall use commercially reasonable efforts to return or destroy Confidential Information in its active files and systems.

2. Reasonable Timeframe. The Receiving Party shall complete return or destruction within sixty (60) days of receiving such request, or such longer period as may be reasonably necessary given the volume and location of materials.

3. Method of Destruction. Destruction may be accomplished by any commercially reasonable method, including secure deletion, overwriting, or physical destruction. The Receiving Party may use its standard document destruction processes.

4. Simplified Certification. Upon request, the Receiving Party shall provide a certificate from a responsible representative confirming that, to such representative's knowledge after reasonable inquiry and without independent investigation, the Receiving Party has used commercially reasonable efforts to comply with this Section.

5. Broad Retention Exceptions. Notwithstanding the foregoing, the Receiving Party may retain Confidential Information:

   (a) As required or permitted by applicable law, regulation, or professional standards;
   (b) In automated backup, archival, or disaster recovery systems where deletion is technically impractical or would impose unreasonable cost;
   (c) In email systems, archived communications, or document management systems where targeted deletion is impractical;
   (d) As necessary for legal compliance, internal audit, or dispute resolution purposes;
   (e) In notes, analyses, or work product prepared by the Receiving Party's personnel; and
   (f) In the unaided memory of the Receiving Party's personnel.

6. No Audit or Inspection. The Disclosing Party shall not have any right to audit, inspect, or access the Receiving Party's systems, facilities, or records to verify compliance with this Section.

7. Limitation of Liability. Neither party shall be liable for failure to return or destroy Confidential Information resulting from technical limitations, inadvertent retention, or circumstances beyond such party's reasonable control. The Receiving Party's sole obligation for any retained information shall be to continue to protect such information in accordance with this Agreement.

8. Survival. Confidentiality obligations shall survive with respect to any retained Confidential Information only until such information is destroyed in the ordinary course of business operations.

💬 Negotiation Tips

Need More Help?

See our detailed guide on negotiating return/destruction clauses, including backup and archive issues

View Negotiation Guide Email Templates FAQ