If you follow the OWASP XSS (Cross Site Scripting) Prevention Cheat Sheet, the rule JavaScript Escape Before Inserting Untrusted Data into JavaScript Data Values applies here.
This is defined as:
Except for alphanumeric characters, escape all characters less than 256 with the \xHH format to prevent switching out of the data value into the script context or into another attribute
so you will need to JSEncode using a function.
Note you should adapt this to follow the OWASP recommendation and encode all non alphanumerics otherwise there will be ways for an attacker to break out and cause XSS.
Your code will then become:
BtnUploadDocument.Attributes.Add("onclick",
String.Format("Javascript:var PopUpWin = window.open('{0}','_blank','scrollbars=yes, title=yes,toolbar=no,location=no,resizable=yes,status=no');return false;",
JSEncode.EncodeJsString(SQLManager.GetUploadDocumentLink(poid, pono))))
);