Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing and receiving parties, including registered addresses and company details
2. Background: Context of the agreement, purpose of sharing confidential information, and relationship between the parties
3. Definitions: Definition of Confidential Information, Intellectual Property Rights, and other key terms used throughout the agreement
4. Confidentiality Obligations: Core obligations regarding the protection, use, and non-disclosure of confidential information
5. Permitted Use: Specified purposes for which the confidential information may be used
6. Security Measures: Required security measures for protecting confidential information
7. Return or Destruction: Obligations regarding the return or destruction of confidential information upon request or termination
8. Duration and Survival: Term of the agreement and survival of obligations post-termination
9. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Data Protection: Specific provisions for handling personal data under GDPR - include when confidential information includes personal data
2. Intellectual Property Rights: Specific provisions regarding IP ownership and licenses - include when IP rights might be created or shared
3. Employee and Representative Obligations: Requirements for employees and representatives - include when information will be shared with team members
4. Export Control: Provisions regarding international transfer of information - include for cross-border arrangements
5. Publicity and Announcements: Restrictions on public announcements - include for high-profile or sensitive relationships
6. Insurance Requirements: Specific insurance obligations - include for high-value or high-risk information
7. Audit Rights: Rights to audit compliance - include for highly sensitive information or regulated industries
1. Schedule 1 - Description of Confidential Information: Detailed description or categories of confidential information covered
2. Schedule 2 - Authorized Recipients: List of authorized individuals or roles permitted to access the confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols required for protecting the information
4. Appendix A - Form of Confidentiality Undertaking: Template confidentiality undertaking for employees or representatives
5. Appendix B - Data Processing Requirements: Specific requirements for processing personal data if applicable
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
