Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identifies and provides full details of all parties to the agreement, including the system/facility owner and the third party requiring access
2. Background: Explains the context and purpose of the agreement, including the systems or facilities to which access is being granted
3. Definitions: Defines key terms used throughout the agreement, including technical terms, system components, and access-related terminology
4. Grant of Access: Specifies the scope and nature of access being granted, including any limitations and conditions
5. Access Requirements: Details the technical and procedural requirements for accessing the systems or facilities
6. Security Protocols: Outlines mandatory security measures, authentication procedures, and compliance requirements
7. Data Protection and Privacy: Addresses data handling requirements and compliance with the Data Privacy Act
8. Confidentiality Obligations: Details confidentiality requirements and restrictions on information usage
9. Third Party Obligations: Lists specific responsibilities and obligations of the third party
10. Monitoring and Audit Rights: Describes the owner's rights to monitor access and conduct security audits
11. Term and Termination: Specifies the duration of access rights and circumstances for termination
12. Liability and Indemnification: Addresses risk allocation, limitations of liability, and indemnification obligations
13. General Provisions: Contains standard legal provisions including governing law, dispute resolution, and notices
1. Emergency Access Procedures: Used when access might be required in emergency situations, detailing special protocols and authorizations
2. Intellectual Property Rights: Required when access involves proprietary systems or information that needs IP protection
3. Insurance Requirements: Include when specific insurance coverage is required from the third party
4. Business Continuity: Needed when access is critical to business operations and continuity planning is essential
5. Regulatory Compliance: Required for regulated industries or when specific regulatory requirements apply
6. Sub-contractor provisions: Include when the third party may need to engage sub-contractors for access-related activities
1. Schedule 1 - Access Specifications: Detailed technical specifications of the systems/facilities and access methods
2. Schedule 2 - Security Requirements: Specific security protocols, standards, and compliance requirements
3. Schedule 3 - Authorized Personnel: List of authorized individuals and their access levels
4. Schedule 4 - Fee Schedule: Details of any fees or charges associated with access rights
5. Schedule 5 - Service Levels: Performance metrics and service levels for access availability
6. Appendix A - Incident Response Plan: Procedures for handling security incidents and breaches
7. Appendix B - Compliance Checklist: Checklist of regulatory and security compliance requirements
Find the exact document you need
Reciprocal Access Easement
A Philippine law-compliant agreement establishing mutual access rights and obligations between property owners for shared access areas.
Site Access Agreement
A Philippine law-governed agreement establishing terms for authorized access to and use of a specific site or facility.
Cross Access Agreement
A Philippine law-governed agreement establishing mutual access rights and obligations between property owners for shared spaces and facilities.
Author And Publisher Agreement
A Philippine law-governed agreement between authors and publishers defining rights, royalties, and obligations for literary work publication.
Pedestrian Access Easement
A Philippine law-compliant agreement establishing pedestrian access rights across property, defining terms, responsibilities, and obligations for all parties involved.
Mutual Access Easement
A Philippine law-governed agreement establishing reciprocal access rights between property owners, defining shared access areas and related obligations.
Access Easement Agreement
A Philippine law-compliant agreement establishing access rights over one property for the benefit of another property or party, defining terms and conditions of the easement.
Collateral Access Agreement
A Philippine law-governed agreement establishing terms for secured parties to access and inspect collateral held by custodians.
User Access Agreement
A Philippine law-governed agreement defining terms and conditions for digital service access, incorporating local data privacy and e-commerce requirements.
Third Party Access Agreement
A Philippine law-governed agreement establishing terms for third-party access to organizational systems, incorporating local data privacy and cybersecurity requirements.
Road Access Agreement
A legal agreement under Philippine law establishing rights and regulations for road access between parties, including usage terms, maintenance responsibilities, and compliance requirements.
Private Road Access Agreement
A Philippine law-compliant agreement establishing terms and conditions for using privately owned roads, defining access rights and responsibilities between road owners and users.
Neighbor Access Agreement
A Philippine law-governed agreement establishing access rights between neighboring property owners, defining terms, conditions, and responsibilities for property access.
Land Access Agreement
A Philippine law-governed agreement establishing terms and conditions for accessing and using land owned by another party, ensuring compliance with local regulations and protecting both parties' interests.
Emergency Access Easement
A Philippine law-compliant agreement granting emergency access rights over private property for specified emergency situations and responders.
Early Access Agreement
Philippine law-governed agreement for pre-release access to products/services, covering usage rights, obligations, and compliance requirements.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)