Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the broker, the disclosing party, and any other relevant parties to the agreement
2. Background: Context of the broker relationship and purpose of the confidentiality agreement
3. Definitions: Detailed definitions including Confidential Information, Broker Services, Permitted Purpose, and other key terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the broker context
5. Confidentiality Obligations: Core obligations regarding the protection and non-disclosure of confidential information
6. Permitted Uses and Disclosures: Specified circumstances under which confidential information may be used or disclosed
7. Security Measures: Required security protocols and measures for protecting confidential information
8. Return or Destruction of Information: Procedures for handling confidential information upon termination or request
9. Duration of Obligations: Time period for which confidentiality obligations remain in effect
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Third Party Disclosure: Additional provisions for cases where disclosure to third parties (such as subcontractors) may be necessary
2. International Transfer of Data: Required when confidential information may be transferred across borders
3. Regulatory Compliance: Specific provisions for regulated industries or when dealing with regulated information
4. Intellectual Property Rights: Additional provisions when confidential information includes IP rights
5. Insurance Requirements: Specific insurance obligations for high-value or high-risk broker relationships
6. Conflict of Interest: Provisions addressing potential conflicts in broker relationships
7. Data Privacy Compliance: Detailed privacy requirements when personal data is involved
1. Schedule A - Specified Confidential Information: Detailed list of specific confidential information covered by the agreement
2. Schedule B - Authorized Representatives: List of authorized personnel who may access confidential information
3. Schedule C - Security Protocols: Detailed security measures and procedures to be followed
4. Schedule D - Permitted Purposes: Detailed description of authorized uses of confidential information
5. Appendix 1 - Data Handling Procedures: Specific procedures for handling, storing, and transmitting confidential information
6. Appendix 2 - Incident Response Plan: Procedures to be followed in case of data breach or unauthorized disclosure
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
