Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of all parties to the agreement, including full legal names and addresses
2. Background: Context of the agreement, relationship between parties, and purpose of the confidentiality arrangement
3. Definitions: Detailed definitions of key terms including 'Confidential Information', 'Compensation', 'Trade Secrets', and other relevant terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Compensation Terms: Details of compensation including amount, payment schedule, and conditions for payment
6. Confidentiality Obligations: Core obligations regarding the protection, use, and non-disclosure of confidential information
7. Term and Duration: Period of the agreement and duration of confidentiality obligations
8. Return of Confidential Information: Requirements for returning or destroying confidential information
9. Breach and Remedies: Consequences of breach and available remedies
10. Governing Law and Jurisdiction: Specification of Nigerian law as governing law and jurisdiction for disputes
1. Non-Competition: Additional restrictions on competitive activities, used when the receiving party might compete with the disclosing party
2. Non-Solicitation: Restrictions on soliciting employees or customers, included when there's risk of poaching
3. Data Protection Compliance: Specific provisions for NDPR compliance, required when personal data is involved
4. Third Party Disclosure: Rules for sharing information with authorized third parties, included when third-party access may be necessary
5. Survival Clause: Specifies which provisions survive termination, used in long-term relationships
6. Force Majeure: Provisions for unforeseen circumstances, included when long-term obligations exist
7. Insurance Requirements: Obligations to maintain specific insurance coverage, used in high-value agreements
8. Audit Rights: Rights to audit compliance with confidentiality obligations, used in complex business relationships
1. Schedule A - Compensation Details: Detailed breakdown of compensation structure, payment terms, and calculations
2. Schedule B - Specified Confidential Information: Detailed list or categories of confidential information covered
3. Schedule C - Authorized Representatives: List of individuals authorized to receive or handle confidential information
4. Schedule D - Security Protocols: Specific security measures required for protecting confidential information
5. Appendix 1 - Acknowledgment Form: Form for employees or representatives to acknowledge confidentiality obligations
6. Appendix 2 - Return/Destruction Certificate: Template for certifying return or destruction of confidential information
Find the document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
