Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party, receiving party, and their authorized representatives
2. Background: Context of the due diligence process and purpose of the agreement
3. Definitions: Key terms including Confidential Information, Due Diligence Exercise, Permitted Purpose, Representatives
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the context of the due diligence
5. Permitted Use and Disclosure: Specific purposes for which confidential information may be used and conditions for disclosure to authorized representatives
6. Security Measures: Required procedures and systems for protecting confidential information
7. Return or Destruction of Information: Obligations regarding the handling of confidential information after the due diligence process
8. Duration of Obligations: Term of the agreement and survival of confidentiality obligations
9. Breach and Remedies: Consequences of breach and available remedies under South African law
10. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Data Protection Compliance: Specific provisions addressing POPIA compliance, necessary when personal information is involved
2. Competition Law Compliance: Required when parties are competitors or in the same industry to ensure compliance with Competition Act
3. Digital Information Handling: Specific provisions for electronic data rooms and digital information sharing
4. Third Party Information: Provisions dealing with information owned by or relating to third parties
5. Insider Trading Prevention: Required when listed companies are involved or when dealing with price-sensitive information
6. Clean Team Arrangements: Used when highly sensitive competitive information needs to be restricted to specific individuals
1. Schedule 1: Authorized Representatives: List of individuals authorized to access confidential information
2. Schedule 2: Security Protocols: Detailed security measures and procedures for handling confidential information
3. Schedule 3: Categories of Confidential Information: Specific types and categories of confidential information covered
4. Schedule 4: Data Room Rules: Procedures and rules for accessing and using electronic or physical data rooms
5. Appendix A: Confidentiality Undertaking: Form of confidentiality undertaking for representatives and advisors
6. Appendix B: Information Return/Destruction Certificate: Template certificate confirming return or destruction of confidential information
Find the document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
