Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing and receiving parties, including registration details and addresses
2. Background: Context of the relationship and purpose of sharing confidential information
3. Definitions: Detailed definitions including 'Confidential Information', 'Technology', 'Authorized Purpose', and other key terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information, particularly focusing on technical data, trade secrets, and intellectual property
5. Obligations of Confidentiality: Core confidentiality obligations, including storage, handling, and protection of confidential information
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed to employees, advisors, or as required by law
7. Data Protection Compliance: Specific provisions ensuring compliance with POPIA and other data protection requirements
8. Security Measures: Required technical and organizational measures to protect confidential information
9. Return or Destruction of Information: Procedures for handling confidential information upon termination or request
10. Duration and Termination: Term of the agreement and survival of obligations
11. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Electronic Communications: Specific provisions for electronic sharing and storage of confidential information, used when information will be shared digitally
2. Third Party Disclosure: Additional provisions for cases where third party contractors or advisors need access to information
3. International Transfer of Data: Used when confidential information may be transferred across borders
4. Competitive Restrictions: Non-compete and non-solicitation provisions, if relevant to the relationship
5. Source Code Protection: Specific provisions for protecting software source code, used in software technology NDAs
6. Reverse Engineering Prohibition: Specific restrictions on reverse engineering, used for hardware or software technology
7. Patent Rights: Provisions relating to potential patent applications and rights, used when patentable technology might be disclosed
1. Schedule 1 - Description of Confidential Information: Detailed list of specific confidential information, technologies, and materials covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific technical and organizational security measures required
4. Appendix A - Acknowledgment Form: Form to be signed by employees or representatives who will have access to confidential information
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
