Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of all parties to the agreement, including their registered addresses and company details
2. Background: Context of the agreement, purpose of sharing confidential information, and nature of the business relationship
3. Definitions: Detailed definitions including 'Confidential Information', 'Permitted Purpose', 'Authorized Recipients', and jurisdiction-specific terms
4. Confidentiality Obligations: Core obligations regarding use, disclosure, and protection of confidential information
5. Permitted Disclosures: Circumstances under which confidential information can be shared, including with affiliated entities and professional advisors
6. Data Protection and Cross-Border Transfers: Specific provisions for handling data across borders in compliance with relevant privacy laws
7. Security Measures: Required security protocols and measures for protecting confidential information
8. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
9. Term and Termination: Duration of the agreement and termination provisions
10. Governing Law and Jurisdiction: Choice of law and jurisdiction for dispute resolution
11. General Provisions: Standard boilerplate clauses including severability, entire agreement, and amendments
1. Intellectual Property Rights: Additional provisions protecting IP rights when confidential information includes IP - use when sharing technical information or trade secrets
2. Competition Law Compliance: Specific provisions ensuring compliance with competition laws - include when parties are competitors
3. Employee and Contractor Obligations: Additional provisions regarding employees and contractors - include when information will be shared with staff
4. Data Localization Requirements: Specific provisions for countries with data localization laws - include when dealing with such jurisdictions
5. Industry-Specific Compliance: Additional compliance requirements for regulated industries - include for financial services, healthcare, etc.
6. Force Majeure: Provisions for unforeseen circumstances - include when long-term information sharing is contemplated
7. Insurance Requirements: Obligations to maintain specific insurance coverage - include for high-risk information sharing
8. Audit Rights: Rights to audit compliance with the agreement - include for highly sensitive information
1. Schedule 1 - Description of Confidential Information: Detailed categorization and description of confidential information covered
2. Schedule 2 - Authorized Recipients: List of individuals or entities authorized to receive confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols required for different types of confidential information
4. Schedule 4 - Data Transfer Mechanisms: Approved methods and requirements for cross-border data transfers
5. Appendix A - Form of Confidentiality Undertaking: Template confidentiality agreement for authorized recipients
6. Appendix B - Security Breach Notification Procedures: Procedures to be followed in case of security breaches or unauthorized disclosures
Find the document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
