Skip to main content
Log in

The use of NDAs in the IT service sector

  • Original Paper
  • Published:
Service Business Aims and scope Submit manuscript

Abstract

Business people are advised to use contracts for the protection of their assets when entering business transactions with other strategic partners. Non-disclosure agreements (NDAs) are examples of such contracts that limit what those with access to certain knowledge can do with the privileged information. However, knowledge is constantly changing as soon as someone gains knowledge and adds personal knowledge to that knowledge. As such, the NDA may be redundant soon after it is signed. IT service professionals realize the boundless nature of knowledge and regularly work with professional colleagues to provide technical services to their customers. I provide a qualitative analysis of interviews with four IT service professionals on their use of NDAs in formal business transactions and in informal consultative sessions. I find positive attitudes toward the use of NDAs in formal business transactions such as in strategic partnerships but limited use of NDAs in informal consultative sessions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Appleyard MM (1996) How does knowledge flow? Interfirm patterns in the semiconductor industry. Strateg Manag J 17:137–154

    Google Scholar 

  • Arundel A (2001) The relative effectiveness of patents and secrecy for appropriation. Res Policy 30:611–624

    Article  Google Scholar 

  • Barney J (1991) Firm resources and sustained competitive advantage. J Manag 17:99–120

    Article  Google Scholar 

  • Cohen WM, Nelson RR, Walsh JP (2000). Protecting their intellectual assets: Appropriability conditions and why U.S. manufacturing firms patent (or not). Working paper no. 7552. NBER Working paper series, National Bureau of Economic Research, Cambridge, MA

  • Conner KR, Prahalad CK (1996) A resource-based theory of the firm: knowledge versus opportunism. Organ Sci 7:477–501

    Article  Google Scholar 

  • Eisenhardt KM (1989) Building theories from case study research. Acad Manag Rev 14:532–550

    Article  Google Scholar 

  • Grant RM (1996) Prospering in dynamically-competitive environments: organizational capability as knowledge integration. Organ Sci 7:375–387

    Article  Google Scholar 

  • Irish V (2001) Are you protecting your intellectual property? IEE Rev 47:15–17

    Article  Google Scholar 

  • Kale P, Singh H, Perlmutter H (2000) Learning and protection of proprietary assets in strategic alliances: building relational capital. Strateg Manag J 21:217–237

    Article  Google Scholar 

  • Klee MM (2001) The importance of having a non-disclosure agreement. IEEE Eng Med Biol Mag 19:120

    Article  Google Scholar 

  • Kogut B, Zander U (1992) Knowledge of the firm, combinative capabilities, and the replication of technology. Organ Sci 3:383–397

    Article  Google Scholar 

  • Mayer KJ (2006) Spillovers and governance: an analysis of knowledge and reputational spillovers in information technology. Acad Manag J 49:69–84

    Article  Google Scholar 

  • McEvily SK, Chakravarthy B (2002) The persistence of knowledge-based advantage: an empirical test for product performance and technological knowledge. Strateg Manag J 23:285–305

    Article  Google Scholar 

  • Nonaka I (1994) A dynamic theory of organizational knowledge creation. Organ Sci 5:14–37

    Article  Google Scholar 

  • Oxley JE (1997) Appropriability hazards and governance in strategic alliances: a transaction cost approach. J Law Econ Organ 13:387–409

    Google Scholar 

  • Oxley JE, Sampson RC (2004) The scope and governance of international R&D alliances. Strateg Manag J 25:723–749

    Article  Google Scholar 

  • Polanyi M (1966) The tacit dimension. Routledge, London

    Google Scholar 

  • Ricks TA, Tillet BG, Meter CWV (1994) Principles of security. Anderson Publishing, Cincinnati, OH

    Google Scholar 

  • Rosoff M (2003) Security, patents occupy legal front. http://www.directionsonmicrosoft.com/sample/DOMIS/update/2003/11nov/1103spolf.htm. Retrieved 20 Nov 2007

  • Spender JC (1996) Organizational knowledge, learning and memory: three concepts in search of a theory. J Organ Change Manag 9:63–78

    Article  Google Scholar 

  • Stim R, Fishman S (2001). Nondisclosure agreements. Nolo, Berkley

  • Teece D (1986) Profiting from technological innovation: implications for integration, collaboration, licensing and public policy. Res Policy 15:285–305

    Article  Google Scholar 

  • Thurow LC (1997) Needed: a new system of intellectual property rights. Harv Busi Rev 75:94–103

    Google Scholar 

  • Whitman ME, Mattord HJ (2005). Principles of information security: course Technology

  • Williamson OE (1979) Transaction cost economics: the governance of contractual relations. J Law Econ 22:223–261

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abiola O. Fanimokun.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fanimokun, A.O. The use of NDAs in the IT service sector. Serv Bus 4, 123–136 (2010). https://doi.org/10.1007/s11628-009-0076-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11628-009-0076-4

Keywords

Navigation