Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the parties entering into the agreement, including their full legal names, registration numbers, and registered addresses
2. Background: Context of the agreement, relationship between parties, and purpose of entering into the agreement
3. Definitions: Detailed definitions of key terms including 'Confidential Information', 'Exclusivity Period', 'Permitted Purpose', and other relevant terms
4. Confidentiality Obligations: Core obligations regarding the protection, use, and non-disclosure of confidential information
5. Exclusivity Provisions: Terms of exclusive dealing, including scope, duration, and territorial limits of exclusivity
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees, advisors, or as required by law
7. Security Measures: Required measures for protecting confidential information
8. Return or Destruction of Information: Obligations regarding the return or destruction of confidential information upon termination or request
9. Duration and Survival: Term of the agreement and which provisions survive termination
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard provisions including governing law, jurisdiction, entire agreement, and variation
1. Non-Solicitation: Prevents parties from soliciting each other's employees or customers. Include when protecting business relationships is crucial
2. Data Protection: Specific provisions for handling personal data under PDPA 2010. Include when confidential information includes personal data
3. Intellectual Property Rights: Provisions clarifying ownership and usage rights of IP. Include when confidential information includes IP
4. Assignment and Subcontracting: Rights to transfer obligations or involve third parties. Include for complex commercial relationships
5. Force Majeure: Provisions for unforeseen circumstances affecting performance. Include for long-term exclusivity arrangements
6. Audit Rights: Rights to audit compliance with confidentiality obligations. Include for high-risk or regulated industries
7. Insurance: Requirements for insurance coverage. Include when significant potential damages could arise from breach
1. Schedule 1 - Confidential Information: Detailed list or categories of information considered confidential
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive or handle confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols to be followed
4. Schedule 4 - Excluded Information: Information specifically excluded from confidentiality obligations
5. Schedule 5 - Permitted Purpose: Detailed description of the permitted use of confidential information
6. Appendix A - Form of Confidentiality Undertaking: Template undertaking for employees or third parties who need access to confidential information
Find the document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
