GH GambleHub

NDA and protection of confidential information

1) Goals and principles

NDA (Non-Disclosure Agreement) and internal policies protect:
  • business secrets (anti-fraud algorithms, bonus profiles, ML models, RNG mathematics);
  • negotiation materials (price tags, offers, M&A, due diligence);
  • technical processes and sources (architecture, IaC, API diagrams, keys);
  • partner data (SDK, roadmaps, beta);
  • personal/business data (within DPA/DSA).

Principles: need-to-know, traceability, encryption by default, separation of roles/responsibilities, "clean room" for joint development.

2) Classification and marking of information

Recommended classification level and contact rules:
LevelExampleAccessStorageTransfer
Publicpress release, wiki helpallshared storagesno restrictions
Internalsupport playbookemployeescorporate drivescorporate mail
Confidentialmarket plans, contractsneed-to-knowencryption at restend-to-end encryption, NDA
Strict/Secretkeys, anti-fraud models, RNG sourcesnarrow circleHSM/Int. safeonly on channels with mTLS + log

Marking: '[CONFIDENTIAL]', data owner, release date, link to ticket/access reason.

3) Trade secrets mode

Legal act/policy: list of information, protection measures, responsibility.
Technical measures: RBAC/ABAC, access logs, DLP, watermarking, print/screenshot control.
Organizational: onboarding/offboarding checklists, training, non-disclosure agreements, prohibition to bring/take out media without registration.
Dock discipline: versions, artifact registry, labeling, "secret" channels (closed spaces/repositories).

4) Types of NDA

One-way: exposes one side (typically the SDK provider).
Mutual: exchange of confidential information in both directions (negotiations, integrations).
Multilateral: consortia, joint pilots.
NCA/NDA + NCA: Non-circumvention (prohibition to bypass the intermediary) is added to the NDA.
NDA with developer/contractor: combine with Inventions/Assignment (rights to results).

5) Key sections of NDA (which is mandatory)

1. Definition of Confidential Information: incl. oral (upon further written confirmation), electronic, tangible media; List typical examples (code, schemes, prices, dashboards).
2. Exceptions: (i) publicly known without violation; (ii) was already in legal possession; (iii) developed independently (provably); (iv) disclosed legally to government agencies (with notice).
3. Purpose of disclosure: specific (partnership evaluation, pilot, audit).
4. Obligations of the recipient: the level of protection is not lower than their own; need-to-know, prohibition of copying beyond the target, prohibition of reverse engineering/benchmarking without consent.
5. Term and "survival": contract term (e.g. 2-5 years) + post-term protection of secrets (e.g. 5-10 years/indefinite for secrets).
6. Return/destruction: upon request or completion - return/deletion with confirmation; backups - under storage mode until auto-term.
7. Audit and incident notifications: speed of notification (e.g. ≤72 hours), cooperation in investigation.
8. Legal remedies: injunctive relief, compensations, limits do not apply to intentional violations.
9. Applicable Law/Arbitration: Jurisdiction/Forum, Language, ADR/Arbitration.
10. Export/sanctions: prohibition of transfer to sub-sanctions/jurisdictions; compliance with export control (cryptography).
11. "Residual Knowledge" (as agreed): it is possible/impossible to use "unrecorded knowledge" of employees (usually - to exclude or limit).
12. Subcontractors/Affiliates: only allowed with similar obligations and written consent.
13. Data protection (if PII): reference to DPA/DSA, role of parties (controller/processor), objectives/legal basis, cross-border transfers, retention period.

6) Linking NDAs to privacy and security

If personal data is transferred, NDA is not enough - DPA/DSA and GDPR/analogue measures are required (legal grounds, rights of subjects, DPIA for high-risk).
Technical control: encryption in transit (TLS 1. 2 +), at-rest (AES-256), secret management, key rotation, MDM for devices, 2FA, SSO, minimizing PII logs.

7) Access and exchange procedures

Channels: domain mail, protected rooms (VDR), SFTP/mTLS, encrypted archives (AES-256 + out-of-band password).
Ban: instant messengers without corporate integration, personal clouds, public links, unmanaged devices.
Control of printing/export, prohibition of personal flash media, geo-restrictions (geofenses).

8) Clean-room and co-development

Separate the commands "seeing" and "clean," store one-sided artifacts separately.
Document sources and provenance.
For joint PoCs: agree on the rights to the results (joint/assignment) who owns Derived Data.

9) RAG Risk Matrix

RiskR (critical)A (fixable)G (control)
No NDASharing secrets without a contractGeneral template without DPANDA + applications (DPA/sanctions)
AccessPersonal Mail/DevicesPartial MDM/SSOFull MDM/SSO/2FA
MarkingNo classificationIncomplete labelingSingle standard + registers
IncidentsNo SLA notificationsProcedure without testsSLA ≤72 h + drills
SubcontractorsNot covered by NDAsPartiallyFlow-down commitments
Export/sanctionsNo screeningOne-time screeningPolicy + Periodic Rescreening

10) Checklists

Before exchanging information

  • Signed by NDA (right/forum/term/exceptions/sanctions).
  • Do I need a DPA/DSA? If yes, signed.
  • Set owner and classification level are assigned.
  • The exchange channel and encryption are consistent.
  • Need-to-know list, VDR access/folders configured.

During the exchange

  • File marking and version, watermarks.
  • Access logs, no re-sharing without consent.
  • Hash sums/artifact register.

After completion

  • Return/deletion and written confirmation.
  • Accesses revoked, tokens/keys rotated.
  • Post-audit: What to improve in processes/templates.

11) Templates (fragments of contractual clauses)

A. Definition and Exceptions

💡 "Confidential Information" means any non-publicly disclosed information provided by the Disclosing Party to the Recipient, including technical, commercial, financial data, code, documentation, specifications, development plans, contractual terms. Information is not considered confidential if: (i) it was publicly available prior to disclosure; (ii) has become generally available through no breach; (iii) was legally with the Recipient; (iv) was developed independently.

B. Commitments and Access

💡 The Recipient applies the protection regime not lower than its own, provides access only to employees/contractors on a need-to-know basis, obliges them to sign equivalent agreements, does not copy or use information beyond the Purpose.

C. Term/Survival

💡 This Agreement is valid for [24/36/60] months; obligations to protect trade secrets last for [5-10] years or until legally disclosed.

D. Return/Destruction

💡 Upon request of the Disclosing Party, the Recipient shall within [10] days return or destroy the materials and confirm it in writing; backups are retained until standard auto-deletion, subject to confidentiality.

E. Legal remedies

💡 The Parties acknowledge that the breach may cause irreparable harm; The Disclosing Party shall have the right to seek injunctive relief in addition to other remedies.

F. Export/Sanctions

💡 The recipient guarantees compliance with export controls and sanctions regimes and will not transfer information to entities/jurisdictions subject to restrictions.

G. Residual Knowledge (optional)

> The Parties agree that the unsubstantiated general skills and knowledge of the Recipient's employees are not considered confidential information, provided that there is no intentional memorization and use of source code/secret formulas. (It is recommended to exclude or severely restrict in high-risk projects.)

12) Recommended registries (YAML)

12. 1 NDA Register

yaml nda_id: "NDA-2025-0142"
counterparty: "GameProvider X Ltd"
type: "mutual"
purpose: "SDK integration and technical support"
term_months: 36 survival_years: 7 includes_dpa: true export_sanctions_clause: true residual_knowledge: "excluded"
owner: "Legal"
vault_folder: "vdr/providers/gpx"

12. 2 Artifact Exchange Registry

yaml exchange_id: "XCH-2025-009"
nda_id: "NDA-2025-0142"
classification: "Confidential"
channel: "VDR"
files:
- "api_specs_v3. pdf"  # sha256:...
- "kpis_q1. xlsx"    # sha256:...
recipients: ["a. smith@gpx. com","techlead@gpx. com"]
access_start: "2025-11-05"
access_end: "2026-01-31"
destroy_confirmed: false

13) Security Policies and Practices (Brief)

Devices: corporate, full disk encryption, MDM, BYOD ban for "Secret."

Access: SSO/2FA, conditional access (geo/device), temporary roles (just-in-time).
Logs: storage and monitoring of accesses; alerts for mass unloading/non-standard hours.
DLP: block of attachments outside the domain/without encryption, watermarks in PDF.
Convenience: secure room templates (VDR), ready-made archive encryption scripts, standard NDA/DPA.

14) Incident Management (in context of NDA)

1. Fixation: what, when, who, what files/repositories; freezing sessions.
2. Isolation: revocation of accesses/keys, temporary "freezer" in the cloud.
3. Notices: data owner, lawyers, partners; PII - by DPA/GDPR.
4. Investigation: collection of logs, forensics, determination of the amount of damage.
5. Remediation: replacing secrets, patches, updating playbooks, learning.
6. Legal measures: claims/claim work on NDA, compensation.

15) Mini-FAQ

Is NDA enough for personal data? No, you need DPA/DSA and privacy measures.
Is it possible to send confidential to the messenger? Only in enterprise-approved and end-to-end, with DLP/logs enabled.
How much to store materials? As much as required by the objective/contract; upon completion - return/deletion with confirmation.
Do I need to encrypt internal drives? Yes, full disk + file/secret encryption.

16) Conclusion

The NDA is just the tip of the iceberg. Real protection is based on trade secrets, privacy (DPA), strict technical and organizational controls, exchange discipline and quick incident response. Standardize templates, create registers and playbooks - and your secrets, code and negotiations will remain an asset, not a vulnerability.

Contact

Get in Touch

Reach out with any questions or support needs.We are always ready to help!

Start Integration

Email is required. Telegram or WhatsApp — optional.

Your Name optional
Email optional
Subject optional
Message optional
Telegram optional
@
If you include Telegram — we will reply there as well, in addition to Email.
WhatsApp optional
Format: +country code and number (e.g., +380XXXXXXXXX).

By clicking this button, you agree to data processing.