Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party (typically the business) and receiving party (the customer)
2. Background: Context of the relationship and purpose for sharing confidential information
3. Definitions: Definitions of key terms including 'Confidential Information', 'Permitted Purpose', 'Representatives'
4. Confidentiality Obligations: Core obligations regarding non-disclosure, non-use, and protection of confidential information
5. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to representatives and as required by law
6. Security Measures: Required measures for protecting and securing confidential information
7. Return or Destruction: Obligations regarding the return or destruction of confidential information upon request or termination
8. Term and Termination: Duration of the agreement and termination rights
9. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Additional provisions protecting IP rights when confidential information includes IP
2. Data Privacy Compliance: Specific obligations regarding personal data handling when confidential information includes personal information
3. Export Control: Requirements for international transfer of confidential information
4. Marking Requirements: Specific requirements for marking or identifying confidential information
5. Residual Knowledge: Provisions addressing use of general knowledge retained by recipients
6. Competition Law Compliance: Specific provisions ensuring compliance with competition laws when parties are competitors
7. Insurance Requirements: Obligations to maintain specific insurance coverage for data breaches
1. Schedule 1 - Confidential Information: Detailed description or categories of information considered confidential
2. Schedule 2 - Security Protocols: Specific security measures and protocols to be followed
3. Schedule 3 - Authorized Representatives: List of authorized representatives who may access confidential information
4. Schedule 4 - Permitted Purpose: Detailed description of the permitted use of confidential information
5. Appendix A - Information Handling Procedures: Step-by-step procedures for handling, storing, and disposing of confidential information
Find the document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
