Return or Destruction of Information FAQ
Practical answers about backup handling, email archives, certification requirements, and real-world compliance challenges with return or destruction clauses.
← Back to Clause OverviewPractical answers about backup handling, email archives, certification requirements, and real-world compliance challenges with return or destruction clauses.
← Back to Clause OverviewThis depends entirely on the specific language in your NDA. Many NDAs require destruction of "all copies" which technically includes backups. However, most modern NDAs include carve-outs for backup systems because:
Look for language like "except for copies retained in automated backup systems made in the ordinary course of business." If your NDA lacks this carve-out, negotiate to add it before signing. If you have already signed, discuss practical compliance options with the disclosing party.
A software company receives confidential API documentation under NDA. Their automated nightly backups capture all email and file servers. When the NDA terminates, they cannot practically purge this data from 3 years of incremental backups without destroying the entire backup chain. A reasonable resolution: certify that the backup retention policy will naturally cycle out the data within 90 days and that backup data will not be actively accessed.
Email archives present one of the most challenging compliance scenarios. Here is how to handle it:
Before signing the NDA: Add an explicit email archive carve-out. Standard language: "This obligation shall not require modification of automated email archiving systems maintained for legal or regulatory compliance, provided that such archived materials shall remain subject to confidentiality obligations."
If the NDA is already signed without a carve-out:
Most disclosing parties will accept this practical limitation. If they insist on complete destruction, consider whether the business relationship is worth the compliance burden.
The honest answer: you cannot achieve 100% certainty. However, you can create strong incentives and documentation:
Practical reality: focus on the information that matters most. If your truly sensitive information is properly controlled (limited distribution, marked confidential, tracked), you can verify its destruction. Incidental copies in backup systems are lower risk if primary copies are destroyed and the receiving party has no incentive to access them.
A proper destruction certification should include:
"I hereby certify that [Company] has destroyed or returned all Confidential Information received from [Disclosing Party] under the NDA dated [Date], including all copies, extracts, and derivatives. Destruction was completed on [Date] using secure deletion methods consistent with NIST SP 800-88. This certification excludes materials retained in automated backup systems subject to our standard 90-day retention cycle, which remain subject to confidentiality obligations."
Require officer-level certification when possible. Here is why:
Acceptable signatories typically include: CEO, CFO, General Counsel, Chief Compliance Officer, or VP-level executives. For smaller companies, any officer or director is usually acceptable.
For highly sensitive information, consider requiring certification from General Counsel specifically, as they understand the legal implications of false certification.
A false certification creates significant legal exposure:
This is why certifications should be taken seriously. Never sign a certification without actually verifying destruction. If you cannot certify complete destruction due to backup limitations, include appropriate exceptions in the certification language.
Mixed information is one of the trickiest return/destruction scenarios. The key is distinguishing between:
Practical approaches:
An engineering firm evaluates a potential acquisition and creates financial models using the target's confidential revenue data. After the deal falls through, they must return/destroy the confidential data. Solution: They remove the target's actual numbers from the models, replacing them with placeholders or public data. The model structure (their work product) can be retained; the confidential inputs are destroyed.
Yes, typically. Most NDAs make you responsible for your representatives' compliance. Here is how to handle it:
Special considerations for legal counsel: Attorneys may need to retain certain materials for malpractice defense or conflict checking. Discuss this with both the disclosing party and your counsel to find acceptable limitations.
Practical tip: Before sharing with advisors, consider whether they really need the full confidential information or whether summaries or redacted versions would suffice.
Each approach has advantages:
Request Return When:
Request Destruction When:
Best practice: Include both options in the NDA ("at Disclosing Party's election, return or destroy") so you can choose the appropriate method based on circumstances.
Short destruction timelines are common but often impractical. Here is how to handle this:
Before signing: Negotiate a reasonable timeline. 30 days is more practical than 10 days for most organizations. Push back: "We need time to locate all copies, coordinate with our IT team, obtain advisor confirmations, and prepare proper certification."
If already signed with a short deadline:
Courts generally expect reasonable, good-faith compliance rather than literal impossibility. But you must demonstrate you made genuine efforts and communicated proactively.
Absolutely not. Legal hold obligations override contractual destruction requirements. Here is what you need to know:
If the disclosing party demands destruction during a dispute:
No. Standard deletion (moving to trash, emptying recycle bin) does not destroy data - it just marks the space as available for reuse. True destruction requires more:
For individual files:
For entire drives:
For cloud storage:
Document your destruction methods in case you need to prove compliance later.
Cloud-stored confidential information requires special attention:
Common CRM considerations:
Practical tip: Before receiving confidential information, consider creating a separate folder or tag to make later identification and deletion easier.
For highly sensitive information, yes. Here is a tiered approach:
Standard commercial NDAs: General language is usually sufficient ("destroy by means that prevent reconstruction or recovery")
Sensitive technical data: Reference industry standards like NIST SP 800-88 Rev. 1 (Guidelines for Media Sanitization)
Government or defense-related: Specify DoD 5220.22-M or higher standards as appropriate
Healthcare data: Reference HIPAA-compliant destruction methods
Practical considerations: