Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the parties entering into the NDA, including their legal names, addresses, and registration details
2. Background: Context of the software development project and purpose of the NDA
3. Definitions: Detailed definitions of key terms including Confidential Information, Software, Development Materials, Source Code, and other relevant technical terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the software development context
5. Confidentiality Obligations: Core obligations regarding the protection and non-disclosure of confidential information
6. Permitted Use: Specific allowed uses of confidential information within the software development project
7. Security Measures: Required security protocols and measures for protecting confidential information
8. Return or Destruction of Confidential Information: Procedures for handling confidential information upon project completion or termination
9. Term and Survival: Duration of the agreement and surviving obligations
10. Breach and Remedies: Consequences of breach and available remedies under Qatari law
11. Governing Law and Jurisdiction: Specification of Qatar law as governing law and jurisdiction for disputes
1. Third Party Disclosure: Include when project requires sharing information with subcontractors or other third parties
2. Cloud Storage and Data Transfer: Add when confidential information will be stored or processed in cloud environments
3. Source Code Protection: Include for projects involving access to source code
4. Employee and Contractor Obligations: Add when team members beyond primary parties need access to confidential information
5. Intellectual Property Rights: Include when development involves creation of new IP requiring protection
6. Data Protection Compliance: Add when personal data processing is involved in the development
7. Non-Solicitation: Include to prevent poaching of employees involved in the development
8. Export Control: Add for international projects or technology with export restrictions
1. Schedule A - Detailed Description of Confidential Information: Comprehensive list of specific confidential information types covered
2. Schedule B - Authorized Personnel: List of individuals authorized to access confidential information
3. Schedule C - Security Protocols: Detailed security measures and protocols to be followed
4. Schedule D - Project Scope: Description of the software development project scope and context
5. Appendix 1 - Data Handling Procedures: Specific procedures for handling different types of confidential data
6. Appendix 2 - Incident Response Plan: Procedures for handling potential data breaches or unauthorized disclosures
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
