Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full details of all parties to the agreement, including their legal capacity
2. Background: Explains the context of the agreement and why the parties are entering into it
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information' and 'Permitted Purpose'
4. Disclosure and Use of Confidential Information: Sets out the core obligations regarding how confidential information can be used and disclosed
5. Protection of Confidential Information: Specifies the security measures required to protect the confidential information
6. Return or Destruction of Confidential Information: Details requirements for handling confidential information after the agreement ends
7. Term and Termination: Specifies how long the agreement lasts and how it can be terminated
8. Breach and Remedies: Outlines what constitutes a breach and the available remedies
9. General Provisions: Standard boilerplate clauses including governing law, entire agreement, and amendments
10. Execution: Formal signing section with execution blocks for all parties
1. Permitted Disclosures: Used when specific categories of people (like employees or advisors) need access to the information
2. Intellectual Property Rights: Include when the idea might involve existing IP rights or potential future IP rights
3. Non-Competition: Add when there's a need to prevent the receiving party from competing using the confidential information
4. Representatives and Warranties: Include for complex ideas or when dealing with sophisticated parties
5. Insurance: Add when requiring the receiving party to maintain specific insurance coverage
6. Publicity and Announcements: Include when there's a need to control public statements about the relationship
7. Survival: Add when certain obligations need to explicitly survive termination
8. Security Requirements: Include when specific security protocols or systems are required to protect the information
1. Schedule 1 - Description of Confidential Information: Detailed description of the idea and related confidential information
2. Schedule 2 - Permitted Purpose: Detailed description of how the confidential information can be used
3. Schedule 3 - Authorized Representatives: List of individuals authorized to receive and handle the confidential information
4. Schedule 4 - Security Protocols: Specific security measures and procedures required for protecting the information
5. Appendix A - Confirmation of Destruction: Template form for confirming destruction of confidential information
Find the exact document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)