Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing and receiving parties, including full legal names, registration numbers, and registered addresses
2. Background: Context of the agreement, purpose of sharing confidential information, and nature of the business relationship
3. Definitions: Detailed definitions of key terms, especially 'Confidential Information', 'Permitted Purpose', and 'Representatives'
4. Confidentiality Obligations: Core obligations regarding the protection and non-disclosure of confidential information
5. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees, advisors, or as required by law
6. Security Measures: Specific measures required to protect confidential information
7. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
8. Duration and Survival: Term of the agreement and provisions that survive termination
9. Breach and Remedies: Consequences of breach and available remedies, including injunctive relief
10. General Provisions: Standard clauses including governing law, jurisdiction, entire agreement, and amendments
1. Data Protection Compliance: Required when confidential information includes personal data subject to GDPR or Maltese Data Protection Act
2. Intellectual Property Rights: Include when confidential information involves IP rights or when development of new IP is contemplated
3. Non-Solicitation: Add when there's a risk of poaching employees or clients
4. Non-Competition: Include when sharing information could enable competitive activities
5. Export Control: Required when confidential information may be subject to export control regulations
6. Group Company Rights: Include when either party needs to share information with group companies
7. Reverse Engineering Prohibition: Add when protecting technical information or trade secrets that could be reverse engineered
8. Force Majeure: Include when long-term confidentiality obligations might be affected by extraordinary events
1. Schedule 1 - Description of Confidential Information: Detailed categorization and description of the confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific technical and organizational security measures required
4. Schedule 4 - Permitted Purpose Details: Detailed description of the permitted use of confidential information
5. Appendix A - Data Processing Terms: Required when personal data processing is involved, ensuring GDPR compliance
Find the exact document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)