Besides employees in training, who are Fitstop franchisees prohibited from disclosing or revealing any portion of the Franchise System to?
Fitstop Franchise · 2024 FDDAnswer from 2024 FDD Document
- 11.2 You shall not appropriate, use, or duplicate the Franchise System, or any portion thereof, for use at any other similar business and you shall not disclose or reveal any portion of the Franchise System to a non-franchisee other than to your employees as an incident of their training.
Source: Item 23 — RECEIPTS (FDD pages 50–135)
What This Means (2024 FDD)
According to Fitstop's 2024 Franchise Disclosure Document, franchisees are prohibited from disclosing any portion of the Franchise System to non-franchisees, except to their employees as an incident of their training. This restriction is in place to protect the value and proprietary nature of the Fitstop system.
This means a Fitstop franchisee must ensure that the operating procedures, methods, techniques, and processes that encompass the Franchise System are kept confidential. The franchisee cannot share these details with anyone outside of the franchise network, including potential competitors or other business ventures they may be involved in. The only exception is when training their own employees, and even then, the disclosure should be limited to what is necessary for the employee to perform their job.
The FDD emphasizes that Fitstop has invested significant time and resources in developing the Franchise System, and its value depends on maintaining its exclusivity. Unauthorized disclosure could undermine the brand's competitive advantage and potentially harm other franchisees within the system. This is a fairly standard clause in franchise agreements, as franchisors need to protect their intellectual property.
As a prospective Fitstop franchisee, it is important to understand the scope of this confidentiality obligation and to implement appropriate measures to safeguard the Franchise System's information. This may include having employees sign confidentiality agreements and implementing security protocols to prevent unauthorized access to sensitive information.