Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full details of all parties entering into the agreement
2. Background: Outlines the context and purpose of the agreement, including the nature of the relationship between the parties
3. Definitions: Defines key terms used throughout the agreement, including 'Confidential Information', 'Permitted Purpose', and 'Representatives'
4. Scope of Confidential Information: Clearly specifies what information is considered confidential under the agreement
5. Obligations of Confidentiality: Details the core confidentiality obligations, including non-use and non-disclosure requirements
6. Permitted Disclosures: Specifies circumstances under which confidential information may be disclosed and to whom
7. Security Measures: Outlines required security measures for protecting confidential information
8. Term and Survival: Specifies the duration of the agreement and which obligations survive termination
9. Return or Destruction of Confidential Information: Procedures for handling confidential information upon termination or request
10. Breach and Remedies: Outlines consequences of breach and available remedies
11. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Additional provisions regarding IP ownership and rights when the confidential information includes IP - used when IP is a significant component of the disclosed information
2. Non-Solicitation: Prevents poaching of employees or clients - relevant when parties have access to employee or client information
3. Non-Competition: Restricts competitive activities - used in situations where the disclosed information could provide competitive advantage
4. Data Protection and Privacy: Specific provisions for handling personal data - required when confidential information includes personal information under the Privacy Act
5. Export Control: Provisions for international data transfer restrictions - needed for cross-border information sharing
6. Publicity and Announcements: Controls over public statements about the relationship - useful for high-profile or sensitive commercial relationships
7. Insurance Requirements: Specific insurance obligations - relevant for high-value or high-risk information sharing
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of information covered by the agreement
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures required for information protection
4. Schedule 4 - Permitted Purpose: Detailed description of the specific purposes for which confidential information may be used
5. Appendix A - Form of Confidentiality Undertaking: Template undertaking for representatives or third parties who need to access the confidential information
Find the exact document you need
Confidentiality Non Disclosure Agreement Form
Australian-law governed NDA template for protecting confidential information in business relationships, compliant with Australian federal and state regulations.
Business Confidentiality Agreement Form
An Australian-law governed confidentiality agreement protecting sensitive business information shared between parties.
Mutual Non Disclosure Agreement Form
An Australian law-governed Mutual Non-Disclosure Agreement establishing reciprocal confidentiality obligations between parties exchanging sensitive information.
Non Disclosure Letter
An Australian-law governed formal letter establishing confidentiality obligations between parties, serving as a streamlined alternative to a full non-disclosure agreement.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
