Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing and receiving parties, including registered addresses and company details
2. Background: Context of the agreement and purpose for sharing confidential information
3. Definitions: Detailed definitions of key terms, especially 'Confidential Information', 'Representatives', and 'Permitted Purpose'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Confidentiality Obligations: Core obligations regarding the protection and non-disclosure of confidential information
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to representatives and by legal requirement
7. Information Security Measures: Required measures for protecting and securing confidential information
8. Return or Destruction of Information: Obligations regarding the handling of confidential information upon termination or request
9. Duration and Survival: Term of the agreement and survival of obligations after termination
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Mutual Obligations: Used when both parties will be sharing confidential information (for mutual NDAs)
2. Data Protection Compliance: Required when personal data will be shared, ensuring GDPR compliance
3. Intellectual Property Rights: When confidential information includes IP that needs specific protection
4. Export Control: Required when information may be subject to export control regulations
5. Non-Solicitation: Optional restriction on soliciting employees or customers, if relevant to the business relationship
6. Competitive Activities: Restrictions on competitive activities, if appropriate for the business context
7. Digital Security Measures: Specific provisions for digital information handling and cybersecurity requirements
1. Schedule 1 - Specified Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Procedures: Specific security protocols and procedures for handling confidential information
4. Schedule 4 - Data Processing Requirements: GDPR-compliant data processing terms if personal data is involved
5. Schedule 5 - Information Handling Protocols: Specific procedures for marking, storing, and transmitting confidential information
Find the exact document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)