Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and defines the parties entering into the agreement
2. Background: Establishes the context of the relationship and reason for the agreement
3. Definitions: Defines key terms used throughout the agreement, including 'Confidential Information' and 'Permitted Purpose'
4. Scope of Confidential Information: Clearly outlines what information is considered confidential under the agreement
5. Obligations of Confidentiality: Details the core responsibilities regarding keeping information confidential
6. Permitted Disclosures: Specifies circumstances under which confidential information may be shared
7. Duration of Obligations: Specifies how long the confidentiality obligations last, including post-relationship
8. Return of Confidential Information: Requirements for returning or destroying confidential information upon request or relationship termination
9. Breach and Remedies: Outlines consequences and available remedies for breach of the agreement
10. General Provisions: Standard contract clauses including governing law, entire agreement, and amendments
1. Social Media and Online Presence: Specific provisions regarding sharing information on social media platforms and online behavior
2. Mutual Privacy Rights: Additional section establishing reciprocal privacy rights and obligations
3. Third Party Obligations: Provisions regarding sharing information with family members, close friends, or therapists
4. Relationship Termination Protocol: Specific procedures to follow regarding confidential information if the relationship ends
5. Mental Health and Medical Information: Special provisions for handling sensitive health-related information
6. Financial Information Protection: Specific provisions for protecting financial and business-related information
7. Dispute Resolution: Alternative dispute resolution procedures to avoid court proceedings
8. Photography and Recording: Specific provisions regarding intimate photos, videos, or recordings
1. Schedule A - Specified Confidential Information: Detailed list of specific information deemed confidential
2. Schedule B - Permitted Recipients: List of individuals who may receive certain confidential information (e.g., therapists, legal advisors)
3. Schedule C - Information Handling Protocols: Specific procedures for storing and handling different types of confidential information
4. Appendix 1 - Acknowledgment Form: Form for acknowledging receipt and return of confidential information
5. Appendix 2 - Destruction Certificate: Template for certifying destruction of confidential information when required
Find the exact document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)