Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification and details of all parties to the agreement
2. Background: Context of the agreement and relationship between the parties
3. Definitions: Detailed definitions of key terms, especially 'Confidential Information', 'Permitted Purpose', and other critical concepts
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations and permitted uses of the confidential information
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees and professional advisors
7. Security Measures: Required measures for protecting and securing confidential information
8. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
9. Duration and Survival: Term of the agreement and which provisions survive termination
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
12. Execution: Signature blocks and execution provisions
1. Data Protection Compliance: Required when confidential information includes personal data subject to GDPR/Data Protection Act 2018
2. Intellectual Property Rights: Used when confidential information includes or relates to intellectual property
3. Non-Solicitation: Optional restrictions on soliciting employees or customers, if relevant to the business relationship
4. Non-Competition: Used when parties are potential competitors and additional restrictions are needed
5. Export Control: Required when confidential information may be subject to export control regulations
6. Force Majeure: Optional clause for circumstances preventing performance, though less common in NDAs
7. Independent Contractor Relationship: Used to clarify relationship between parties when needed
8. Assignment and Succession: Detailed provisions for transfer of rights, used in more complex business relationships
1. Schedule 1 - Description of Confidential Information: Detailed listing or categorization of the specific confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols required for protecting the confidential information
4. Appendix A - Form of Acknowledgment: Template for acknowledgment by employees or third parties who will access confidential information
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
