Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party (typically the company) and receiving party (typically the software developer/contractor)
2. Background: Context of the software development project and purpose of the NDA
3. Definitions: Key terms including 'Confidential Information', 'Software', 'Source Code', 'Intellectual Property Rights', 'Derivative Works', etc.
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the software development context, including source code, algorithms, architectures, etc.
5. Obligations of Confidentiality: Core confidentiality duties, security measures, and permitted uses of confidential information
6. Authorized Personnel: Provisions regarding which employees/contractors can access confidential information and their obligations
7. Term and Survival: Duration of the agreement and which obligations survive termination
8. Return or Destruction of Confidential Information: Procedures for handling confidential information after project completion or termination
9. Intellectual Property Rights: Clarification that the NDA doesn't transfer any IP rights and protection of existing IP
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard clauses including governing law, jurisdiction, amendments, and notices
1. Source Code Protection: Additional provisions specifically for source code protection, used when direct access to source code is involved
2. Third Party Disclosure: Rules for sharing information with authorized third parties, used when subcontractors or external consultants are involved
3. Data Protection Compliance: Specific provisions for PDPA compliance, used when personal data processing is involved
4. Cloud Services: Special provisions for cloud-based development environments, used when cloud services are part of the development process
5. Open Source Components: Provisions regarding confidentiality in relation to open source elements, used when open source software is involved
6. Remote Work Provisions: Special security measures for remote development work, used when remote work is permitted
7. Exit Management: Detailed procedures for project transition or termination, used in larger or complex projects
1. Schedule 1: Description of Project: Detailed description of the software development project scope
2. Schedule 2: Authorized Personnel: List of authorized personnel who will have access to confidential information
3. Schedule 3: Security Protocols: Specific security measures and protocols to be followed
4. Schedule 4: Approved Subcontractors: List of approved third parties who may receive confidential information
5. Appendix A: Confidential Information Categories: Detailed categorization of different types of confidential information
6. Appendix B: Return/Destruction Certificate: Template certificate for confirming return or destruction of confidential information
Find the document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
