Remote Work Confidentiality Addendum
REMOTE WORK CONFIDENTIALITY ADDENDUM
ADDENDUM OVERVIEW
Addendum to: ☐ Employment Agreement dated [Date]
☐ Confidentiality Agreement dated [Date]
☐ Non-Disclosure Agreement dated [Date]
☐ Other: _________________________________
Employee Name: ________________________________________
Employee ID: __________________________________________
Position: _____________________________________________
Department: ___________________________________________
Remote Work Location: __________________________________
Effective Date: ________________________________________
1. PURPOSE AND SCOPE
1.1 Purpose
This Remote Work Confidentiality Addendum (the "Addendum") supplements and does not replace [Employee Name]'s (the "Employee") existing confidentiality obligations under the [Employment Agreement / Confidentiality Agreement / Non-Disclosure Agreement] (the "Original Agreement"). This Addendum addresses the specific confidentiality risks and responsibilities associated with working remotely.
1.2 Incorporation
This Addendum is incorporated into and made part of the Original Agreement. In case of conflict between this Addendum and the Original Agreement regarding remote work matters, this Addendum governs.
1.3 Continued Applicability
All terms of the Original Agreement regarding Confidential Information remain in full force and effect. This Addendum provides additional obligations specific to the remote work environment.
2. DEFINITIONS
All capitalized terms not defined herein have the meanings given in the Original Agreement.
"Confidential Information" includes all non-public information as defined in the Original Agreement, and specifically includes information accessed, viewed, processed, or stored while working remotely.
"Remote Work Location" means any location outside of Company premises from which Employee performs work, including but not limited to Employee's home, co-working spaces, and temporary locations.
"Shared Space" means any area within the Remote Work Location where other individuals (family members, roommates, guests, etc.) may be present or have access.
3. ENHANCED CONFIDENTIALITY OBLIGATIONS
3.1 Physical Environment Security
When working remotely, Employee shall:
Workspace Security:
☐ Maintain a private workspace where confidential work can be performed
☐ Position screens so they cannot be viewed by unauthorized persons
☐ Use privacy screens on monitors and laptops when working in shared areas
☐ Close or minimize confidential information when others are present
☐ Lock the workspace when leaving it unattended (if possible)
Document Security:
☐ Store all physical documents containing Confidential Information in a locked drawer, cabinet, or room
☐ Never leave physical documents visible when not in active use
☐ Shred confidential documents using a cross-cut shredder when no longer needed
☐ Do not print Confidential Information unless absolutely necessary
☐ Retrieve printed documents immediately and secure them
Electronic Security:
☐ Lock computer screens when stepping away (even briefly)
☐ Configure automatic screen lock after [5] minutes of inactivity
☐ Use strong, unique passwords on all devices
☐ Enable full-disk encryption on all devices containing Company data
☐ Use Company VPN when accessing Company systems
3.2 Household Members and Visitors
Employee acknowledges that:
☐ Household members (family, roommates) are NOT authorized to access Confidential Information
☐ Visitors to the Remote Work Location are NOT authorized to access Confidential Information
☐ Employee must take reasonable steps to prevent inadvertent exposure to such persons
Employee agrees to:
☐ Conduct confidential calls in private areas away from household members
☐ Use headphones for all work calls and video conferences
☐ Not discuss Confidential Information within earshot of unauthorized persons
☐ Not allow household members or visitors to view screens displaying Confidential Information
☐ Inform household members of the need to respect work privacy
3.3 Verbal Confidentiality
Employee shall:
☐ Not discuss Confidential Information in areas where it could be overheard
☐ Use headphones for all phone and video calls involving Confidential Information
☐ Ensure privacy before discussing sensitive matters
☐ Be aware of smart speakers, voice assistants, and other listening devices
☐ Disable or relocate listening devices during confidential conversations
3.4 Visual Confidentiality
Employee shall:
☐ Be aware of what is visible in video call backgrounds
☐ Ensure whiteboards, documents, and screens with Confidential Information are not visible
☐ Use virtual backgrounds or blur backgrounds when appropriate
☐ Position camera to minimize visibility of work materials
☐ Close or cover confidential materials before video calls
4. DIGITAL SECURITY OBLIGATIONS
4.1 Device Security
Employee shall:
☐ Use only Company-approved devices for accessing Confidential Information
☐ Keep all devices updated with security patches
☐ Install and maintain Company-required security software
☐ Never leave devices unattended in public or unsecured locations
☐ Report lost or stolen devices immediately (within [1] hour of discovery)
4.2 Network Security
Employee shall:
☐ Use Company VPN for all remote access to Company systems
☐ Connect only to secured, password-protected Wi-Fi networks
☐ Never use public Wi-Fi without VPN protection
☐ Ensure home router uses WPA2 or WPA3 encryption
☐ Keep home router firmware updated
4.3 Data Handling
Employee shall:
☐ Store Confidential Information only in Company-approved locations
☐ Never store Confidential Information on personal cloud services
☐ Never email Confidential Information to personal email accounts
☐ Never use unauthorized file sharing services
☐ Encrypt Confidential Information in transit and at rest
☐ Delete Confidential Information from local devices when no longer needed
4.4 Communication Security
Employee shall:
☐ Use only Company-approved communication tools for work
☐ Verify recipient identity before sharing Confidential Information
☐ Use encryption for sensitive communications when available
☐ Never share Confidential Information via personal messaging apps
☐ Be alert to phishing and social engineering attempts
5. SPECIFIC CATEGORIES OF CONFIDENTIAL INFORMATION
5.1 Customer and Client Information
Employee understands that customer and client information requires particular protection:
☐ Customer lists, contacts, and relationship details
☐ Customer contracts and pricing
☐ Customer business information shared in confidence
☐ Customer personal data (PII)
Enhanced Protections:
☐ Never discuss customer information where others may overhear
☐ Never display customer information where others may see
☐ Immediately report any suspected exposure of customer data
5.2 Employee and HR Information
Employee understands that employee information is confidential:
☐ Personnel records and personal information
☐ Compensation and benefits data
☐ Performance evaluations
☐ Medical and disability information
Enhanced Protections:
☐ Access HR information only when necessary for job duties
☐ Never discuss employee information with unauthorized persons
☐ Maintain strict confidentiality of any HR information accessed
5.3 Financial Information
Employee understands that financial information is sensitive:
☐ Company financial statements and projections
☐ Budget and cost information
☐ Pricing strategies and margins
☐ Acquisition and investment plans
Enhanced Protections:
☐ Financial information should be accessed only on secure, private devices
☐ Never discuss financial information in shared spaces
☐ Heightened awareness of potential eavesdropping during financial discussions
5.4 Trade Secrets and Intellectual Property
Employee understands the special status of trade secrets:
☐ Proprietary technology and methods
☐ Product development and roadmaps
☐ Research and development information
☐ Source code and algorithms
Enhanced Protections:
☐ Trade secrets require the highest level of protection
☐ Access should be minimized to what is necessary
☐ Any potential disclosure must be reported immediately
6. PROHIBITED ACTIVITIES
6.1 Strictly Prohibited Actions
The following are strictly prohibited in the remote work environment:
☐ Sharing Access: Allowing any unauthorized person (including household members) to use Company equipment or access Company systems
☐ Unauthorized Disclosure: Discussing, sharing, or displaying Confidential Information to any unauthorized person, whether intentionally or carelessly
☐ Insecure Storage: Storing Confidential Information on personal devices, personal cloud storage, or other unauthorized locations
☐ Unauthorized Printing: Printing Confidential Information at public locations (libraries, copy shops, etc.)
☐ Photography/Recording: Taking photos or videos of Confidential Information or Company screens without authorization
☐ Social Media: Posting any Company information on social media, including photos of workspaces showing confidential materials
☐ Unauthorized Transmission: Sending Confidential Information via personal email, personal messaging apps, or unauthorized file sharing services
☐ Circumventing Security: Disabling, bypassing, or circumventing any security measures designed to protect Confidential Information
7. INCIDENT REPORTING
7.1 Reporting Obligations
Employee shall immediately report any actual or suspected breach of confidentiality, including:
☐ Lost or stolen devices containing Company data
☐ Unauthorized access to Company systems
☐ Accidental disclosure of Confidential Information
☐ Suspected viewing of confidential materials by unauthorized persons
☐ Phishing attempts or social engineering
☐ Security incidents of any kind
☐ Requests for Confidential Information from unknown or suspicious sources
7.2 How to Report
Report incidents immediately to:
☐ IT Security: [Contact Information]
☐ Manager: [Contact Information]
☐ HR: [Contact Information]
☐ 24/7 Security Hotline: [Contact Information]
7.3 No Retaliation
Employee will not face retaliation for good-faith reporting of potential security incidents.
8. INSPECTIONS AND AUDITS
8.1 Audit Rights
Employee agrees that Company may:
☐ Verify compliance with this Addendum through audits or inspections
☐ Request documentation of security measures (e.g., photos of workspace setup)
☐ Conduct remote verification of security configurations
☐ Monitor Company devices for compliance
8.2 Cooperation
Employee agrees to:
☐ Cooperate with any audit or inspection requests
☐ Provide information about security practices
☐ Allow remote inspection of Company devices if required
☐ Implement remedial measures as directed
9. RETURN OF CONFIDENTIAL INFORMATION
9.1 End of Remote Work or Employment
Upon termination of remote work arrangement or employment, Employee shall:
☐ Return all physical documents containing Confidential Information
☐ Return all Company equipment
☐ Delete all Confidential Information from personal devices
☐ Delete all Company data from personal cloud services
☐ Certify in writing that all Confidential Information has been returned or destroyed
9.2 Certification
Employee agrees to provide written certification of compliance with Section 9.1 upon request.
10. REMEDIES
10.1 Breach Consequences
Employee acknowledges that breach of this Addendum may result in:
☐ Disciplinary action up to and including termination
☐ Legal action to recover damages
☐ Injunctive relief to prevent further disclosure
☐ Other legal remedies available to Company
10.2 Irreparable Harm
Employee acknowledges that unauthorized disclosure of Confidential Information may cause irreparable harm to Company, and that Company may seek injunctive relief without proving actual damages.
11. TRAINING AND UPDATES
11.1 Training
Employee agrees to:
☐ Complete initial remote work security training
☐ Complete annual refresher training
☐ Stay informed about confidentiality best practices
☐ Implement new security measures as directed
11.2 Policy Updates
Employee acknowledges that:
☐ This Addendum may be updated to address new risks or requirements
☐ Employee will be notified of material changes
☐ Continued remote work constitutes acceptance of updated terms
12. ACKNOWLEDGMENTS
12.1 Employee Acknowledgments
By signing below, I acknowledge and agree that:
☐ I have read and understand this Remote Work Confidentiality Addendum
☐ I understand my enhanced confidentiality obligations while working remotely
☐ I will implement the security measures described herein
☐ I understand that household members and visitors are not authorized to access Confidential Information
☐ I will report any actual or suspected confidentiality breaches immediately
☐ I understand that violation of these obligations may result in disciplinary action, termination, and/or legal action
☐ My confidentiality obligations survive the termination of my employment
☐ This Addendum supplements but does not replace my existing confidentiality obligations
13. SIGNATURES
EMPLOYEE:
Signature: _______________________________________________
Name (Print): ___________________________________________
Date: ___________________________________________________
COMPANY:
Signature: _______________________________________________
Name: ___________________________________________________
Title: __________________________________________________
Date: ___________________________________________________
APPENDIX A: REMOTE WORKSPACE CONFIDENTIALITY CHECKLIST
Use this checklist to ensure your remote workspace meets confidentiality requirements:
Physical Security:
☐ Private workspace available for confidential work
☐ Lockable storage for confidential documents
☐ Cross-cut shredder available
☐ Screen positioned to prevent unauthorized viewing
☐ Privacy screen on laptop (if working in shared areas)
Electronic Security:
☐ Device passwords/PINs enabled
☐ Automatic screen lock configured
☐ Full-disk encryption enabled
☐ VPN installed and working
☐ Security software installed and updated
Communication Security:
☐ Headphones available for calls
☐ Private area available for confidential calls
☐ Smart speakers disabled or removed from workspace
Document Security:
☐ No confidential documents visible in workspace photos
☐ Shredding process for confidential documents
☐ No confidential materials in video call backgrounds
Employee Initials: _______ Date: _______
APPENDIX B: CONFIDENTIALITY INCIDENT REPORT FORM
Date of Incident: _____________________________________
Date Reported: _______________________________________
Reported By: _________________________________________
Type of Incident:
☐ Lost/stolen device
☐ Unauthorized viewing
☐ Accidental disclosure
☐ Security breach
☐ Other: ________________________________________________
Description of Incident:
__________________________________________________________
__________________________________________________________
__________________________________________________________
Confidential Information Potentially Affected:
__________________________________________________________
__________________________________________________________
Persons Potentially Exposed:
__________________________________________________________
Actions Taken:
__________________________________________________________
__________________________________________________________
Reported To: __________________________________________
Date/Time Reported: ___________________________________
[END OF DOCUMENT]
About This Template
Employment documents govern the relationship between a company and its workers, from offer letters and employment agreements through handbooks, performance reviews, and separations. Done right, they set clear expectations, protect against wrongful termination and discrimination claims, and give both sides a record to rely on. Done poorly, they invite lawsuits, agency complaints, and costly disputes.
Important Notice
This template is provided for informational purposes. It is not legal advice. We recommend having an attorney review any legal document before signing, especially for high-value or complex matters.
Last updated: February 2026