Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies the disclosing party (typically the business broker and/or business owner), receiving party (potential buyer/investor), and any other relevant parties
2. Background: Establishes the context: business broker's role, proposed transaction, and need for confidentiality
3. Definitions: Defines key terms including 'Confidential Information', 'Permitted Purpose', 'Representatives', and 'Business'
4. Scope of Confidential Information: Specifies what constitutes confidential information in the context of the business sale/purchase
5. Obligations of Confidentiality: Details the receiving party's obligations regarding confidential information
6. Permitted Use and Disclosure: Specifies how and when confidential information may be used or disclosed
7. Security Measures: Outlines required security measures for protecting confidential information
8. Return or Destruction of Information: Procedures for handling confidential information after discussions end
9. Duration of Obligations: Specifies how long confidentiality obligations remain in force
10. Breach and Remedies: Consequences of breaching the agreement and available remedies
11. General Provisions: Standard contract terms including governing law, jurisdiction, and entire agreement
1. Non-Solicitation: Prevents approaching employees/clients; include when protecting business relationships is crucial
2. Non-Circumvention: Prevents direct contact with business owner/seller; include when broker wants to protect commission
3. Publicity and Announcements: Controls public statements about discussions; include for sensitive transactions
4. Costs and Stamp Duty: Allocates responsibility for costs; include when significant expenses anticipated
5. Independent Legal Advice: Acknowledgment of opportunity to seek legal advice; include for complex transactions
6. Privacy Compliance: Additional privacy obligations; include when handling personal information
1. Schedule 1 - Specified Confidential Information: Detailed list of specific confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive confidential information
3. Schedule 3 - Security Protocols: Specific security measures required for information protection
4. Appendix A - Confidentiality Undertaking: Form for additional parties to sign acknowledging confidentiality obligations
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
