Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of all parties to the agreement, including full legal names and addresses
2. Background: Context of the agreement, relationship between parties, and purpose of the protective covenants
3. Definitions: Detailed definitions of key terms used throughout the agreement, including 'Confidential Information', 'Trade Secrets', 'Intellectual Property', and 'Restricted Activities'
4. Duration and Term: Specified period for which the protective covenants will remain in effect
5. Confidentiality Obligations: Detailed provisions regarding the protection and non-disclosure of confidential information
6. Non-Competition Covenant: Restrictions on competitive activities, including geographic and temporal scope
7. Non-Solicitation Provisions: Restrictions on soliciting employees, customers, or business partners
8. Intellectual Property Protection: Provisions protecting intellectual property rights and preventing unauthorized use
9. Return of Materials: Requirements for returning company materials and information upon termination
10. Breach and Remedies: Consequences of breach and available remedies, including injunctive relief
11. Governing Law and Jurisdiction: Specification of Indonesian law as governing law and jurisdiction for disputes
12. Execution: Signature blocks and execution requirements
1. Assignment and Succession: Include when the agreement needs to address transferability of obligations or rights
2. Separation or Severability: Include when there's a need to ensure remaining provisions stay valid if some are found unenforceable
3. Training and Trade Secrets: Include when specific training or trade secrets are provided to the restricted party
4. Garden Leave Provisions: Include for senior employees where applicable under Indonesian law
5. International Operations: Include when the protected business operates across multiple jurisdictions
6. Digital Assets Protection: Include when dealing with digital intellectual property or online business assets
7. Third Party Rights: Include when protection needs to extend to affiliated companies or specific third parties
1. Schedule A - Protected Information: Detailed list of confidential information and trade secrets covered by the agreement
2. Schedule B - Restricted Territory: Geographic areas where non-compete and non-solicitation provisions apply
3. Schedule C - Restricted Activities: Detailed description of prohibited business activities
4. Schedule D - Company Intellectual Property: Comprehensive list of protected intellectual property
5. Appendix 1 - Acknowledgment Form: Form for periodic reaffirmation of obligations under the agreement
6. Appendix 2 - Exit Procedures: Procedures for ensuring compliance upon termination of relationship
Find the exact document you need
Restrictive Covenant Agreement Employment
An Indonesian law-governed agreement establishing post-employment restrictions to protect employer's business interests while ensuring compliance with local employment laws.
Protective Covenants Agreement
An Indonesian law-governed agreement establishing employee obligations regarding confidentiality, non-competition, and intellectual property protection.
Confidentiality And Restrictive Covenant Agreement
An Indonesian law-governed agreement establishing confidentiality obligations and competitive restrictions to protect business interests and confidential information.
Protective Covenant Agreement
An Indonesian law-governed agreement establishing protective covenants to safeguard business interests, confidential information, and competitive advantages.
Employee Covenant Agreement
An Indonesian law-governed agreement establishing employee obligations regarding confidentiality, IP rights, and non-competition commitments.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)