Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
3 Way NDA
"I need a 3 Way NDA under Australian law for a technology development project between my software company, a manufacturing partner, and a research institution, with special emphasis on protecting source code and research data, to be effective from March 2025."
1. Parties: Identifies and provides full legal details of all three parties to the agreement
2. Background: Explains the context and purpose of the three-way confidentiality arrangement
3. Definitions: Defines key terms including 'Confidential Information', 'Permitted Purpose', 'Representatives', and other relevant terms
4. Disclosure and Use of Confidential Information: Details how confidential information can be shared and used between the three parties
5. Obligations of Confidentiality: Specifies the core confidentiality obligations of each party
6. Security Measures: Outlines required security measures for protecting confidential information
7. Return or Destruction of Confidential Information: Procedures for handling confidential information upon termination or request
8. Term and Termination: Duration of the agreement and circumstances for termination
9. Breach and Remedies: Consequences of breach and available remedies
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Permitted Disclosures: Additional section when specific categories of permitted disclosures need to be detailed, such as to professional advisors or regulators
2. Special Handling Requirements: Used when certain information requires specific security or handling protocols
3. Non-Solicitation: Added when parties wish to prevent poaching of employees or clients
4. Publicity and Announcements: Included when public communications about the relationship need to be regulated
5. Competition and Future Projects: Used when parties need to address potential future competitive situations
6. Data Protection Compliance: Required when personal data will be shared under the agreement
1. Schedule 1 - Description of Confidential Information: Detailed categorization of confidential information for each party
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols to be followed
4. Appendix A - Information Handling Procedures: Detailed procedures for handling, storing, and transmitting confidential information
5. Appendix B - Notice Requirements: Contact details and procedures for serving notices under the agreement
Authors
Technology
Manufacturing
Healthcare
Financial Services
Professional Services
Research & Development
Energy
Real Estate
Telecommunications
Biotechnology
Aerospace
Consumer Goods
Education
Media & Entertainment
Legal
Executive Leadership
Business Development
Research and Development
Information Technology
Finance
Operations
Compliance
Corporate Development
Innovation
Partnerships
Product Development
Strategy
Procurement
Chief Executive Officer
Chief Legal Officer
General Counsel
Legal Counsel
Chief Financial Officer
Business Development Manager
Project Manager
Research Director
Chief Technology Officer
Chief Information Officer
Contract Manager
Compliance Officer
Innovation Manager
Partnership Manager
Operations Director
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.