Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Email Subject Line: Clear, professional subject line indicating the nature of the communication regarding the vendor selection outcome
2. Greeting: Professional salutation addressing the appropriate contact person
3. Appreciation Statement: Thank the vendor for their time and effort in participating in the selection process
4. Decision Communication: Clear and direct statement about the selection decision
5. Brief Explanation: High-level, non-controversial explanation for the decision without providing specific details that could create legal exposure
6. Professional Closure: Positive closing statement maintaining professional relationships for potential future opportunities
1. Specific Feedback: When appropriate and requested, provide constructive feedback about the vendor's proposal or offering, being careful not to create potential legal issues
2. Future Opportunities: Include when the vendor might be suitable for future projects or when you want to maintain a relationship for potential future engagement
3. Alternative Contact: Include when there's a different contact person or department for future opportunities or follow-up questions
4. Selection Criteria Reference: When transparency is required or beneficial, include a brief reference to the key selection criteria that guided the decision
1. No schedules typically required: As this is an email communication, schedules and appendices are not typically included. Any necessary information should be incorporated into the main email body for clarity and directness
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
