Create a bespoke document in minutes, 聽or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership聽of your information
Security Sharing Agreement
"I need a Security Sharing Agreement for my cybersecurity company based in Riyadh to share threat intelligence data with three other security firms, with specific provisions for real-time threat data sharing and incident response coordination."
1. Parties: Identification of all parties to the agreement, including full legal names, registration numbers, and addresses
2. Background: Context of the agreement, relationship between parties, and general purpose of the security sharing arrangement
3. Definitions: Detailed definitions of technical terms, security-related concepts, and other key terms used throughout the agreement
4. Scope of Information Sharing: Clear delineation of what security information will be shared, including types, categories, and classification levels
5. Security Classifications: Definition of security levels and classification system used for shared information
6. Information Handling Procedures: Detailed procedures for handling, storing, transmitting, and protecting shared security information
7. Access Control: Requirements and procedures for controlling access to shared security information, including authentication and authorization
8. Confidentiality Obligations: Specific obligations regarding the confidentiality of shared information and security measures
9. Use Restrictions: Limitations and restrictions on how shared security information may be used
10. Security Incident Response: Procedures for handling and reporting security incidents or breaches
11. Compliance Requirements: Obligations to comply with relevant laws, regulations, and standards
12. Term and Termination: Duration of the agreement and conditions for termination
13. Post-Termination Obligations: Obligations that survive termination, including ongoing security measures
14. Governing Law and Jurisdiction: Specification of Saudi Arabian law as governing law and jurisdiction for disputes
1. Third Party Access: Rules for granting access to third parties, used when third-party contractors or consultants may need access to shared information
2. International Transfer Provisions: Specific provisions for international transfer of security information, required when parties operate across multiple jurisdictions
3. Audit Rights: Provisions for security audits and compliance verification, recommended for high-security arrangements
4. Insurance Requirements: Specific insurance obligations related to security risks, used in high-risk sharing arrangements
5. Cost Allocation: Distribution of costs related to security measures, needed when implementation costs are significant
6. Training Requirements: Specific training obligations for personnel handling shared information, recommended for complex security arrangements
1. Technical Security Requirements: Detailed technical specifications for security measures and controls
2. Information Classification Matrix: Detailed matrix showing different types of information and their security classifications
3. Authorized Personnel List: List of personnel authorized to access different security levels of information
4. Security Incident Response Plan: Detailed procedures and contact information for security incident response
5. Data Handling Procedures: Specific procedures for handling different types of security information
6. Compliance Checklist: Checklist of compliance requirements and verification procedures
7. Contact Details: List of key contacts for security-related communications and escalations
Authors
Defense & Security
Government & Public Sector
Financial Services
Healthcare
Energy & Utilities
Technology & Communications
Transportation & Logistics
Critical Infrastructure
Manufacturing
Professional Services
Information Security
Legal
Compliance
Risk Management
IT Security
Operations
Procurement
Data Protection
Corporate Security
Cyber Defense
Vendor Management
Emergency Response
Chief Information Security Officer
Security Director
Compliance Manager
Risk Management Officer
Information Security Manager
Legal Counsel
Data Protection Officer
IT Security Manager
Security Operations Manager
Chief Technology Officer
Security Analyst
Procurement Manager
Contract Manager
Chief Risk Officer
Find the exact document you need
Security Sharing Agreement
A Saudi Arabian law-compliant agreement governing the sharing and protection of security-related information between organizations, incorporating local cybersecurity and data protection requirements.
Stock Borrowing Agreement
A Shariah-compliant securities borrowing agreement under Saudi Arabian law, establishing terms for temporary securities transfers between parties with associated collateral arrangements.
Reverse Repurchase Agreement
A Sharia-compliant Reverse Repurchase Agreement under Saudi Arabian law, governing securities transactions with buyback provisions in compliance with local regulations and Islamic principles.
Contract Of Sale Of Shares
A Saudi Arabian law-governed agreement documenting the sale and transfer of shares between parties, incorporating both Sharia and commercial law principles.
Negative Pledge Agreement
A Shariah-compliant agreement under Saudi Arabian law that restricts a borrower from creating security interests over its assets in favor of third parties.
Security Lending Agreement
A Shariah-compliant security lending agreement under Saudi Arabian law, establishing terms for temporary securities transfers between financial institutions with collateral arrangements.
Stock Repurchase Agreement
A Saudi law-governed agreement documenting terms and conditions for a company's repurchase of its own shares, ensuring compliance with CMA regulations and Companies Law.
Download our whitepaper on the future of AI in Legal
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a 拢1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.