Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full details of all parties to the agreement
2. Background: Sets out the context and purpose of the agreement, including the nature of the business relationship
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information' and 'Trade Secrets'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information and trade secrets under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations, including non-use, non-disclosure, and protection requirements
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees and professional advisors
7. Security Measures: Required procedures and safeguards for protecting confidential information
8. Return or Destruction of Confidential Information: Procedures for handling confidential information upon termination or request
9. Term and Termination: Duration of the agreement and circumstances for termination
10. Breach and Remedies: Consequences of breach and available remedies, including injunctive relief
11. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Non-Competition: Restrictions on competitive activities, used when there's a risk of the recipient competing with the discloser
2. Non-Solicitation: Restrictions on soliciting employees or customers, included when there's a business relationship between parties
3. Intellectual Property Rights: Provisions regarding IP ownership and rights, used when confidential information includes IP
4. Data Protection Compliance: Specific obligations regarding personal data protection, required when confidential information includes personal data
5. Export Control: Provisions regarding international transfer of information, needed for cross-border agreements
6. Insurance Requirements: Insurance obligations for the recipient, included for high-value or high-risk information
7. Audit Rights: Right to audit recipient's compliance, used for complex or high-risk relationships
1. Schedule 1 - Specified Confidential Information: Detailed list of specific confidential information and trade secrets covered
2. Schedule 2 - Authorized Personnel: List of individuals authorized to access the confidential information
3. Schedule 3 - Security Protocols: Detailed security procedures and requirements for handling confidential information
4. Schedule 4 - Approved Third Party Recipients: List of approved third parties who may receive the confidential information
5. Appendix A - Confidentiality Acknowledgment Form: Form to be signed by employees or third parties accessing the information
6. Appendix B - Information Classification Guidelines: Guidelines for classifying different types of confidential information
Find the exact document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)