Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Purpose and Scope: Outlines the purpose of the policy and its application scope, including who is bound by it
2. Definitions: Defines key terms used throughout the policy, including 'Confidential Information', 'Personal Data', and 'Processing'
3. Legal Framework: References to applicable laws and regulations, including GDPR and Maltese legislation
4. Confidentiality Obligations: Core confidentiality requirements and duties of staff members
5. Types of Confidential Information: Categorization and examples of what constitutes confidential information
6. Data Protection Measures: Specific measures for protecting confidential information and personal data
7. Security Procedures: Procedures for handling, storing, and transmitting confidential information
8. Breach Reporting: Procedures for reporting and handling confidentiality breaches
9. Consequences of Non-Compliance: Disciplinary actions and legal consequences for policy violations
10. Duration of Obligations: Timeframe for confidentiality obligations, including post-employment duties
1. Industry-Specific Requirements: Additional requirements for specific industries (e.g., financial services, healthcare)
2. International Data Transfers: Include if the organization transfers data outside of the EU/Malta
3. Third-Party Contractors: Include if the organization regularly shares confidential information with contractors or service providers
4. Remote Working Provisions: Include specific provisions for handling confidential information while working remotely
5. Digital Security Protocols: Detailed IT security requirements if the organization handles sensitive digital information
6. Client-Specific Arrangements: Include if different categories of clients require different levels of confidentiality
1. Confidentiality Agreement Template: Standard form for employees/contractors to sign acknowledging the policy
2. Security Procedures Checklist: Detailed checklist of security procedures for handling different types of confidential information
3. Breach Reporting Form: Template for reporting confidentiality breaches
4. Data Classification Guide: Guide for classifying different types of confidential information and required security measures
5. Compliance Checklist: Checklist for ensuring compliance with the policy requirements
Find the exact document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)