Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full details of all parties entering into the agreement
2. Background: Explains the context and purpose of the agreement, including the relationship between the parties
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information'
4. Scope of Confidential Information: Clearly identifies what information is considered confidential under the agreement
5. Obligations of Confidentiality: Details the core obligations to maintain confidentiality and permitted uses of the information
6. Security Measures: Specifies the required measures to protect confidential information
7. Term and Survival: Specifies how long the agreement lasts and which obligations survive termination
8. Return or Destruction of Information: Requirements for handling confidential information after the agreement ends
9. Breach and Remedies: Outlines consequences of breaching the agreement and available remedies
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Include when confidential information includes IP or when IP might be created during the relationship
2. Permitted Disclosures: Include when certain third parties need access to the confidential information
3. Competition and Non-Solicitation: Include when there's a risk of competitive activity or poaching of employees/clients
4. Data Protection Compliance: Include when personal data is involved, especially if dealing with international transfers
5. Representatives and Employees: Include when confidential information will be shared with employees or representatives
6. Special Industry Requirements: Include when specific industry regulations affect confidentiality obligations
7. Publicity and Announcements: Include when there's a need to control public statements about the relationship
8. Insurance Requirements: Include when parties need specific insurance coverage for confidential information
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of information covered by the agreement
2. Schedule 2 - Authorized Personnel: List of individuals authorized to access the confidential information
3. Schedule 3 - Security Protocols: Detailed security measures and procedures for protecting confidential information
4. Appendix A - Disclosure Log: Template for recording all disclosures of confidential information
5. Appendix B - Return/Destruction Certificate: Template certificate confirming return or destruction of confidential information
Find the exact document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)