nda-review

Reviews incoming one-way (unilateral) commercial NDAs in a jurisdiction-agnostic way, from either a Recipient or Discloser perspective (user-selected), producing a clause-by-clause issue log with preferred redlines, fallbacks, rationales, owners, and deadlines.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "nda-review" with this command: npx skills add jamietso/nda-review-skill/jamietso-nda-review-skill-nda-review

NDA Review Playbook (Commercial, Jurisdiction-Agnostic)

Version 1.0 — December 2025

This skill is a structured review playbook. It is not legal advice. When the NDA is high-risk, high-value, cross-border, or otherwise sensitive, escalate to qualified counsel.

1) Overview

What this skill doesWhat it does not do
Reviews an NDA and outputs issues, risks, and suggested redlinesProvide jurisdiction-specific legal conclusions
Supports Recipient or Discloser perspectives (user-chosen)Guarantee enforceability
Produces an executive summary + clause-by-clause markup guidanceReplace counsel for complex deals

Scope limitation (important): this playbook supports one-way (unilateral) commercial NDAs only.

If the NDA is mutual, stop: this playbook is out of scope and you should escalate to counsel or use a separate mutual-NDA review approach.

Variation callouts appear throughout:

  • M&A / Due diligence
  • Employment / contractor
  • Investor / VC

2) Inputs to collect (ask before reviewing)

A. Role and deal context (required)

  • Are we reviewing as Recipient (we receive confidential info) or Discloser (we disclose confidential info)?
  • Confirm the NDA is one-way (unilateral).
    • If it is mutual, stop: this playbook cannot be used.
  • What is the purpose / permitted use (e.g., evaluation of partnership, vendor RFP, diligence)?
  • What are the parties (legal names) and any affiliates that should be covered?
  • What information types are expected (tech, pricing, customer data, product roadmap, source code)?
  • Desired timeline: when do we need to sign?

B. Practical constraints (recommended)

  • Do we need to share with affiliates, advisors, contractors, auditors, or potential acquirers?
  • Will we need to export data across borders or store in cloud tools?
  • Will any personal data be shared? If yes, are there separate data-processing terms?

Jurisdiction-agnostic note: avoid asserting “this clause is invalid” without the governing law details; focus on commercial risk, operational feasibility, and market norms.

3) Deliverables (output format)

Quick start (default output template)

ALWAYS output:

  1. Executive summary
  2. Clause-by-clause issue log (single table)

A. Executive summary (1 page)

  • Party role (Recipient or Discloser) and confirmation it is one-way (unilateral)
  • Top 5 negotiation points (ranked)
  • “Sign as-is” / “Sign with changes” / “Escalate” recommendation

B. Clause-by-clause issue log (lawyer-style, thorough)

Use a single table so counsel and business owners can track issues, owners, and deadlines.

ClauseIssue (1 line)Risk (H/M/L)Preferred redlineFallbackRationale (1–2 sentences)OwnerDeadline
DefinitionOverbroad; includes unmarked info with no reasonableness
Term & survivalPerpetual confidentiality for all information
Use restrictionPurpose too broad; blocks internal evaluation
DisclosuresRepresentatives undefined; strict liability
Return/destructionNo backup carve-out
RemediesOne-way fees + automatic injunction
LiabilityIndemnity + unlimited consequential damages
BoilerplateAssignment prohibits change of control

Example (compact)

Executive summary (example skeleton):

  • Role: Recipient (one-way NDA)
  • Recommendation: Sign with changes
  • Top 5 points: definition scope; term/survival; representatives; backup carve-out; remedies/fees

Issue log (example rows):

ClauseIssue (1 line)Risk (H/M/L)Preferred redlineFallbackRationale (1–2 sentences)OwnerDeadline
Term & survivalPerpetual confidentiality for all informationHAdd 2–5 year survival; trade secret carve-out only5-year survival for allReduces indefinite operational burden while protecting truly sensitive infoLegalBefore signature
Return/destructionNo backup carve-outMAdd backup/legal hold exception + continued confidentialityAllow retention in immutable backups onlyRequired for standard IT operations; avoids impossible complianceSecurity + LegalBefore signature

4) 5-step workflow

Step 1 — Identify stance (Recipient vs Discloser)

  • Confirm which side we are on for this specific NDA (titles are often misleading).
  • Confirm the NDA is one-way (unilateral). If it is mutual, stop (out of scope).

Quick heuristic:

  • If we are being asked to keep their info secret → we are Recipient.
  • If we are sharing our sensitive info → we are Discloser (if the NDA is mutual, stop: out of scope).

Step 2 — Triage the NDA (fast risk scan)

Flag these immediately:

  • Perpetual confidentiality for all information (no trade secret distinction)
  • Residuals clause allowing use of “memory” or generalized knowledge
  • Injunctive relief + attorneys’ fees one-way against Recipient
  • Indemnity for breach or broad third-party claims
  • No carve-outs for compelled disclosure or prior knowledge
  • Overbroad definition: “all information, whether marked or not” with no reasonableness
  • Affiliate coverage missing when we must share internally

If any are present and the NDA matters, proceed with full review and consider escalation.

Step 3 — Clause-by-clause review (use the reference modules)

Use these references while reviewing:

Step 4 — Draft redlines and negotiation positions

For each issue, produce:

  • Preferred redline (best risk outcome)
  • Fallback position (acceptable compromise)
  • Rationale (1–2 sentences: business + operational feasibility)
  • Owner (who needs to approve / negotiate: Legal, Sales, Security, Product)
  • Deadline (by when the counterparty needs the change)

Negotiation discipline: do not propose 20 changes. Focus on the 5–10 that materially change risk.

Step 5 — Finalize the package

  • Ensure consistency (definitions used the same way everywhere)
  • Confirm operational feasibility (can we actually comply?)
  • Re-scan the Step 2 triage list and ensure each flagged item is represented in the issue log
  • Provide a short “what we changed and why” summary

5) Perspective-specific checklists

A. Recipient checklist (incoming NDA — typical case)

TopicRed flagsTypical ask
Definition of Confidential InformationOverbroad; includes independently developed info; no marking/identification standardAdd reasonableness + identification standard; add exclusions
Purpose / Permitted UseAny use restriction beyond evaluation; bans on internal sharingTie to stated purpose; allow internal need-to-know
RepresentativesWe are liable for any representative breach without controlLimit to those under written confidentiality; commercially reasonable care
Term & survivalPerpetual for everything; unclear start dateFixed term; longer only for trade secrets
Return / destructionRequires deletion of backups immediatelyAdd practical backup carve-out
RemediesOne-way fees + broad injunction languageMutuality or reasonableness; clarify equitable relief scope
Liability / indemnityIndemnity; unlimited damages; consequential damagesCap or exclude categories; remove indemnity
ResidualsAllows use of “retained in memory”Delete or narrow heavily

M&A / Due diligence: ensure diligence sharing (advisors, financing, affiliates) is permitted and that data room exports/notes are covered.

B. Discloser checklist (when we are sharing sensitive info)

TopicRed flagsTypical ask
DefinitionToo narrow; requires marking only; excludes oral disclosuresAdd oral confirmation mechanism; broaden categories reasonably
Security standardOnly “reasonable” with no baselineAdd minimum safeguards, or align with internal policy
ExclusionsToo broad (e.g., “independently developed” with no proof)Require written evidence of prior knowledge/independent development
Term & survivalToo shortExtend for sensitive categories; trade secret survival
RemediesNo equitable relief, no feesAdd equitable relief and/or fees (carefully)

Investor / VC: watch for standstill, solicitation, and “no contact” provisions—these are not standard in plain NDAs and may need separate agreement.

6) Risk rating guide

RatingMeaningExample
HighCreates material, uncapped, or operationally impossible riskBroad indemnity + unlimited damages for any breach
MediumRisk is real but manageable with process controlsStrict notice deadlines for compelled disclosure
LowMostly cosmetic or market-standardMinor notice method issues

7) Common pitfalls (issue → risk → fix)

IssueRiskSuggested fix
“All information is confidential forever”Operational burden; unfair risk allocationAdd fixed term + trade secret carve-out
No compelled disclosure carve-outBreach if subpoenaedAdd “required by law” disclosure path
Return/destruction requires purge of backupsImpossible to complyAdd backup and system integrity exception
Recipient indemnifies discloserOpen-ended exposureRemove indemnity; use direct damages only
Residuals clauseAllows de facto use of confidential infoDelete or restrict to non-trade-secret, non-source-code

8) Review prompts (copy/paste)

A. Minimal prompt (fast)

  • Role: Recipient/Discloser
  • NDA type: one-way (unilateral)
  • Purpose: …
  • Please produce (1) exec summary, (2) clause-by-clause issue log table with: Clause, Issue, Risk, Preferred redline, Fallback, Rationale, Owner, Deadline, (3) top 5 negotiation points.

B. Deep prompt (recommended)

  • Add constraints: affiliates, advisors, contractors, cross-border sharing, personal data, cloud tools.
  • Ask for: preferred redline + fallback + rationale per issue.

9) Ownership & timing defaults (if the user does not specify)

Use these defaults to populate Owner and Deadline in the issue log:

TopicDefault ownerDefault deadline
Confidentiality scope/definition, exceptions, term/survivalLegalBefore signature
Security standards / audit rightsSecurity + LegalBefore signature
Return/destruction and backupsSecurity + IT + LegalBefore signature
Liability cap / damages / indemnity / feesLegal + FinanceBefore signature
Operational constraints (representatives, affiliates, tooling)Legal + Business ownerBefore signature

If you want, I can add a short “model answer” example output format inside this file, but I kept v1 focused on the playbook structure (no extra templates/assets as requested).

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

nda-review

No summary provided by upstream source.

Repository SourceNeeds Review
General

neo

Browse websites, read web pages, interact with web apps, call website APIs, and automate web tasks. Use Neo when: user asks to check a website, read a web page, post on social media (Twitter/X), interact with any web app, look up information on a specific site, scrape data from websites, automate browser tasks, or when you need to call any website's API. Keywords: website, web page, browse, URL, http, API, twitter, tweet, post, scrape, web app, open site, check site, read page, social media, online service.

Archived SourceRecently Updated
General

image-gen

Generate AI images from text prompts. Triggers on: "生成图片", "画一张", "AI图", "generate image", "配图", "create picture", "draw", "visualize", "generate an image".

Archived SourceRecently Updated
General

explainer

Create explainer videos with narration and AI-generated visuals. Triggers on: "解说视频", "explainer video", "explain this as a video", "tutorial video", "introduce X (video)", "解释一下XX(视频形式)".

Archived SourceRecently Updated