Confidentiality Agreements

To meet the HITRUST confidentiality agreements requirement, you must define what your confidentiality/NDA terms need to protect, review those requirements on a regular basis, and ensure signed agreements exist for every employee, contractor, and third-party user who can access sensitive information. You also need to keep evidence that agreements are current, complete, and tied to actual access.

Key takeaways:

  • Define NDA/confidentiality requirements based on your data types, access paths, and third-party model, not a generic template.
  • Operationalize signing as an access gate for workforce members and third-party users, with traceable coverage and renewals.
  • Retain auditor-ready evidence: templates, review history, signature records, exceptions, and offboarding attestations.

“Confidentiality agreements” sounds like a legal formality until you try to prove coverage under audit: who signed, which version, when, and whether it applies to the sensitive information they actually touch. HITRUST CSF v11 05.e makes this practical. You must (1) identify NDA/confidentiality agreement requirements that reflect your organization’s information protection needs, (2) review those requirements regularly, and (3) ensure employees, contractors, and third-party users with access to sensitive information sign agreements.

For a Compliance Officer, CCO, or GRC lead, the fastest path to operationalizing this is to treat confidentiality agreements as an access control dependency with lifecycle management: onboarding triggers signatures, changes in role or data access trigger re-attestation, and offboarding triggers confidentiality reminders and return/destruction obligations. This page gives you requirement-level steps, evidence to retain, and common audit hangups to avoid so you can pass an assessment without relying on “legal says we have NDAs” as your control narrative.

Regulatory text

HITRUST CSF v11 05.e requires that: (a) confidentiality/NDA requirements “reflecting the organization’s needs for the protection of information” are identified and regularly reviewed, and (b) agreements are signed by employees, contractors, and third-party users with access to sensitive information. 1

What the operator must do: translate “needs for protection of information” into concrete agreement terms (scope of confidential information, permitted use, retention/return, incident reporting, survival after termination, subcontractor flow-down), then prove signed coverage for every in-scope person and third-party user, plus a repeatable review and update mechanism. 1

Plain-English interpretation (what auditors expect)

You need two things that are often missing in real programs:

  1. A defined standard for confidentiality agreements that matches your environment (data classification, regulated data types, remote access, production access, customer data handling, use of AI tools, subcontractors).
  2. A reliable method to ensure signatures exist and stay current for everyone who can access sensitive information, including non-employees and “third-party users” who may access systems directly (support portals, VPN, EHR integrations, ticketing tools, cloud consoles).

If you cannot quickly produce (a) the required agreement language/version and (b) a population list showing all in-scope identities mapped to signed agreements, this control will become a time sink during assessments.

Who it applies to

Entity scope: Any organization seeking alignment with HITRUST CSF v11, including healthcare entities and service providers that handle sensitive information. 1

Operational scope (who must sign):

  • Employees (full-time, part-time, temporary)
  • Contractors (1099s, staff augmentation, agency workers)
  • Third-party users with access to sensitive information (support providers, implementation partners, outsourced IT, revenue cycle partners, call centers, consultants, and any external identity with system/data access)

Systems/data scope (what triggers “sensitive information”):

  • Regulated health information, customer data, internal security data (logs, vulnerability reports), credentials/secrets, proprietary code, and any data your classification policy labels restricted/confidential.
  • Access can be direct (system account) or indirect (shared tools, file shares, ticket attachments, screen sharing).

What you actually need to do (step-by-step)

Step 1: Define your confidentiality agreement requirements

Create a short “Confidentiality Agreement Requirements Standard” owned by Compliance with Legal review. Keep it actionable. Include:

  • Definition of confidential/sensitive information aligned to your data classification scheme.
  • Permitted use (business purposes only) and prohibition on personal use or re-disclosure.
  • Access and handling expectations (minimum necessary, secure storage, no unapproved sharing channels).
  • Return/destroy obligations at end of engagement and on request.
  • Survival clause (confidentiality survives termination/contract end).
  • Third-party flow-down requirement (no subcontractor access without equivalent written obligations).
  • Breach/incident reporting obligation to your security contact within your required timeframe (state your internal requirement; don’t rely on “promptly”).
  • Exceptions process (who can approve deviations and how they are documented).

Output: a one-to-two page standard plus approved templates (employee confidentiality, contractor NDA, third-party user NDA, and mutual NDA if needed).

Step 2: Align templates to roles and access models

Map agreement type to populations:

  • Workforce confidentiality agreement: required for all employees and contractors at hire/onboarding.
  • Third-party access NDA: required for any external party with accounts, badges, VPN, admin tool access, or visibility into sensitive tickets/files.
  • Customer/partner mutual NDA: optional, but ensure it does not conflict with your security obligations.

Practical tip: avoid maintaining a different NDA for every department. Maintain a small set of templates and control deviations through an addendum.

Step 3: Implement signing as an access gate

Make signatures non-optional by tying them to operational workflows:

  • HR onboarding: offer letter or onboarding packet includes confidentiality terms; signature captured before Day 1 system access.
  • Contractor onboarding: procurement/engagement intake cannot progress without NDA completion.
  • IAM provisioning: create a control point where accounts are issued only after the signature record exists (or a formally approved exception exists).

If you can’t make it a hard technical gate, make it a procedural gate with a documented checklist and periodic reconciliation.

Step 4: Build a coverage register and reconcile it

You need a repeatable way to answer: “Who has access to sensitive information, and did they sign the right agreement version?”

Minimum viable approach:

  • Build an in-scope identity list from HR roster + contractor list + third-party user accounts from IAM/SSO/VPN/support tools.
  • Maintain a Confidentiality Agreements Coverage Register with fields: name/entity, role, employer (your org or third party), access type, agreement type, version, signed date, location of signature record, and status.
  • Run a recurring reconciliation: identify new joiners, rehires, role changes, and orphaned accounts.

Step 5: Review “requirements” regularly and record the review

HITRUST requires the requirements be reviewed regularly, not only the contracts. Set a review cadence you can sustain (for example, aligned to policy review cycles or major change events) and document:

  • What changed in your environment (new systems, new data types, new third-party access model).
  • Whether the confidentiality requirements and templates still address those risks.
  • Approval and effective date of updates.

Step 6: Manage exceptions and edge cases

Common exceptions you must handle cleanly:

  • Open-source contributors or community testers: usually exclude from sensitive access; if they will see sensitive data, require signing.
  • Third parties refusing your NDA: document negotiation outcome, ensure equivalent confidentiality obligations exist in the master services agreement, and record approval.
  • M&A or acquired workforce: require re-attestation to your templates or a documented equivalency review.

Step 7: Offboarding and post-termination controls

Offboarding must include:

  • Account disablement (handled under access management controls).
  • A confidentiality reminder (exit acknowledgment or checklist) and confirmation of return/destruction of sensitive materials where applicable. Keep the evidence tied to the offboarding record.

Required evidence and artifacts to retain

Keep these artifacts ready for assessors:

Governance

  • Confidentiality Agreement Requirements Standard (current + prior versions)
  • Documented review history (meeting notes, ticket, approval record)

Templates

  • Approved NDA/confidentiality templates (employee, contractor, third-party user)
  • Clause library or approved addenda (if used)

Execution evidence

  • Signed agreements (or centralized e-signature audit logs)
  • Coverage Register with population reconciliation notes
  • Exception log (who approved, rationale, compensating terms, expiration)

Lifecycle evidence

  • Onboarding checklists showing NDA completion before access
  • Offboarding checklists/attestations (return/destroy, confidentiality reminder)

If you use Daydream to manage third-party due diligence workflows, store NDAs as required intake artifacts, auto-chase signatures, and keep a single coverage view that ties third-party users to access and contract records. That makes audits faster because evidence is centralized and status is measurable.

Common exam/audit questions and hangups

Assessors tend to ask:

  • “Define sensitive information. Who determines whether a person is in scope?”
  • “Show the full list of third-party users with access to sensitive information.”
  • “Prove each person on that list signed an agreement, and show the version they signed.”
  • “How do you handle subcontractors or fourth parties?”
  • “Show evidence of regular review of confidentiality requirements.”
  • “What happens if a third party refuses to sign?”

Hangup: teams can produce templates and random signed PDFs, but cannot prove complete coverage against a system-derived population of accounts.

Frequent implementation mistakes (and how to avoid them)

  1. Mistake: NDAs exist, but not tied to access.
    Fix: reconcile to IAM/SSO/VPN/support-tool user lists; build the coverage register.

  2. Mistake: third-party “users” are missed because procurement only tracks companies.
    Fix: require named user lists for any third party with logins; update on personnel changes.

  3. Mistake: outdated templates with no review record.
    Fix: schedule a recurring review and record the decision even when no changes are made.

  4. Mistake: relying on a master services agreement while individuals get accounts.
    Fix: if individuals access sensitive information, require individual acknowledgments or ensure the contract explicitly binds those users and you can show the linkage.

  5. Mistake: exceptions are informal (email threads).
    Fix: log exceptions with expiry, compensating obligations, and approver.

Risk implications (why this matters operationally)

Without enforceable confidentiality obligations, you have weaker legal and contractual footing to:

  • restrict re-disclosure of sensitive information,
  • require timely incident reporting by third parties,
  • compel return/destruction of sensitive data at end of engagement,
  • enforce flow-down requirements to subcontractors.

From a control perspective, weak NDA coverage also signals gaps in onboarding discipline and third-party access governance, which can cascade into broader HITRUST findings.

Practical 30/60/90-day execution plan

First 30 days (stabilize and size the gap)

  • Inventory current templates and where signatures live (HRIS, e-signature tool, contract repo).
  • Define “sensitive information” scope for this control using your existing classification or security policy.
  • Extract population lists: HR roster, contractor roster, and third-party user accounts from IAM/SSO/VPN and key tools.
  • Stand up a draft Coverage Register and quantify missing signatures or unknown status.
  • Draft the Confidentiality Agreement Requirements Standard and route for Legal/Compliance approval.

Next 60 days (operationalize the workflow)

  • Finalize and publish templates and the requirements standard.
  • Implement onboarding gates: HR and procurement checklists updated; IAM provisioning workflow updated to require NDA status.
  • Run a remediation sprint to obtain missing signatures or remove access.
  • Create an exception process and log; train procurement and IT admin teams on when exceptions are allowed.

Next 90 days (make it auditable and repeatable)

  • Implement recurring reconciliation between account inventories and signature records.
  • Conduct the first documented “regular review” of requirements; log results and approvals.
  • Test audit readiness: sample third-party users from system accounts and trace to signed agreements and versions.
  • If tooling is fragmented, centralize evidence tracking (Daydream can serve as the operational system of record for third-party agreement intake and renewal tracking).

Frequently Asked Questions

Do we need confidentiality agreements for every third party, or only those with system access?

HITRUST CSF v11 05.e targets employees, contractors, and third-party users with access to sensitive information. If a third party can access sensitive data indirectly (tickets, shared drives, screen sharing), treat them as in scope and document your rationale.

Are “third-party users” covered if our contract is with the company, not the individuals?

Sometimes, but you must be able to show that the company agreement legally binds its personnel who access your sensitive information and that you can map those individuals to that agreement. If you issue named accounts, individual acknowledgments are usually cleaner to evidence.

What counts as “regularly reviewed” for confidentiality agreement requirements?

HITRUST requires a recurring review, but it does not prescribe a specific cadence in the control text. Pick a cadence you can sustain, document each review (even “no changes”), and trigger out-of-cycle reviews for major changes like new data types or new third-party access paths.

Can we accept a third party’s NDA instead of ours?

Yes, if Legal approves equivalency and the terms meet your confidentiality requirements. Record the approval, store the executed document, and link it to the in-scope users and the services they perform.

How do we handle third-party subcontractors (fourth parties)?

Your confidentiality requirements should include a flow-down expectation. Contractually require the third party to bind subcontractors to equivalent obligations and to provide evidence on request, then document how you verify compliance for high-risk relationships.

What evidence is most likely to fail an audit for this requirement?

Missing coverage against the actual access population is the most common failure mode. If you cannot produce a complete list of in-scope users and show a signed agreement record for each, auditors will treat the control as ineffective.

Footnotes

  1. HITRUST CSF v11 Control Reference

Frequently Asked Questions

Do we need confidentiality agreements for every third party, or only those with system access?

HITRUST CSF v11 05.e targets employees, contractors, and third-party users with access to sensitive information. If a third party can access sensitive data indirectly (tickets, shared drives, screen sharing), treat them as in scope and document your rationale.

Are “third-party users” covered if our contract is with the company, not the individuals?

Sometimes, but you must be able to show that the company agreement legally binds its personnel who access your sensitive information and that you can map those individuals to that agreement. If you issue named accounts, individual acknowledgments are usually cleaner to evidence.

What counts as “regularly reviewed” for confidentiality agreement requirements?

HITRUST requires a recurring review, but it does not prescribe a specific cadence in the control text. Pick a cadence you can sustain, document each review (even “no changes”), and trigger out-of-cycle reviews for major changes like new data types or new third-party access paths.

Can we accept a third party’s NDA instead of ours?

Yes, if Legal approves equivalency and the terms meet your confidentiality requirements. Record the approval, store the executed document, and link it to the in-scope users and the services they perform.

How do we handle third-party subcontractors (fourth parties)?

Your confidentiality requirements should include a flow-down expectation. Contractually require the third party to bind subcontractors to equivalent obligations and to provide evidence on request, then document how you verify compliance for high-risk relationships.

What evidence is most likely to fail an audit for this requirement?

Missing coverage against the actual access population is the most common failure mode. If you cannot produce a complete list of in-scope users and show a signed agreement record for each, auditors will treat the control as ineffective.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
HITRUST CSF Confidentiality Agreements: Implementation Guide | Daydream