Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the service provider and recipient, including full legal names and registered addresses
2. Background: Context of the agreement, typically referencing the main transaction (e.g., merger, acquisition) necessitating the TSA
3. Definitions: Defined terms used throughout the agreement, including Service Periods, Service Levels, Transition Period, etc.
4. Services: Overview of services to be provided, referencing detailed service descriptions in schedules
5. Term and Termination: Duration of the agreement, extension options, and termination rights
6. Service Levels: Performance standards and quality requirements for the services
7. Fees and Payment: Pricing structure, payment terms, and invoicing procedures
8. Governance and Reporting: Management structure, periodic reviews, and reporting requirements
9. Obligations of the Parties: Key responsibilities and commitments of both service provider and recipient
10. Personnel: Requirements regarding staff providing services, including key personnel provisions
11. Intellectual Property: Ownership and usage rights of IP during and after the transition period
12. Confidentiality: Protection of confidential information exchanged during service provision
13. Data Protection: GDPR compliance and data handling requirements
14. Liability and Indemnification: Limitations of liability and indemnification obligations
15. Force Majeure: Provisions for handling events beyond parties' reasonable control
16. Exit Management: Procedures for service transition at agreement termination
17. Governing Law and Jurisdiction: Application of Dutch law and jurisdiction for dispute resolution
1. Migration Services: Include when specific data or system migration services are required
2. Third Party Contracts: Include when services involve management or assignment of third-party contracts
3. Business Continuity: Include for critical services requiring specific disaster recovery provisions
4. Regulatory Compliance: Include when services are subject to specific regulatory requirements
5. Security Requirements: Include when services involve access to sensitive systems or data
6. Asset Usage: Include when physical or IT assets are being shared during transition
7. Employee Matters: Include when staff transfers or secondments are part of the transition
8. Insurance: Include when specific insurance coverage is required for services
9. Step-In Rights: Include when service recipient needs rights to take over service provision in certain circumstances
1. Schedule 1 - Service Descriptions: Detailed descriptions of each service to be provided
2. Schedule 2 - Service Levels and KPIs: Specific performance metrics and measurement methods
3. Schedule 3 - Pricing and Charging Structure: Detailed fee calculations, rates, and charging mechanisms
4. Schedule 4 - Governance Procedures: Detailed procedures for service management and oversight
5. Schedule 5 - Contact Details and Escalation Procedures: Key personnel and communication protocols
6. Schedule 6 - Exit Plan: Detailed procedures for service handover or termination
7. Schedule 7 - Data Processing Agreement: GDPR-compliant data processing terms and procedures
8. Schedule 8 - Security Requirements: Detailed security protocols and requirements
9. Appendix A - Service Request Form: Template for requesting additional or modified services
10. Appendix B - Reports: Templates for required service reports and monitoring
11. Appendix C - Transition Plan: Detailed timeline and milestones for service transition
Is a Transition Services Agreement legally binding under Dutch law?
Do I need a lawyer to draft a Transition Services Agreement in the Netherlands?
Can I complete a business transaction in Netherlands without a Transition Services Agreement?
Find the document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
