Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full details of all parties to the agreement
2. Background: Sets out the context and purpose of the agreement, including the nature of the business relationship
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information'
4. Confidentiality Obligations: Core obligations regarding the protection and non-disclosure of confidential information
5. Permitted Use: Specifies how the receiving party may use the confidential information
6. Security Measures: Required measures for protecting and securing confidential information
7. Return or Destruction of Information: Requirements for handling confidential information upon termination or request
8. Term and Termination: Duration of the agreement and circumstances for termination
9. Breach and Remedies: Consequences of breach and available remedies
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Include when confidential information includes or relates to IP rights
2. Non-Solicitation: Add when there's a risk of employee or customer poaching
3. Publicity and Announcements: Include for high-profile relationships or when public disclosure is a concern
4. Data Protection Compliance: Add when personal data is involved in the confidential information
5. Subcontractors and Agents: Include when the receiving party may need to share information with third parties
6. Export Control: Add when confidential information may be subject to export control laws
7. Insurance Requirements: Include for high-value or high-risk confidential information
8. Competing Projects: Add when parties may be working on similar projects with competitors
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of information covered by the agreement
2. Schedule 2 - Authorized Personnel: List of individuals authorized to access the confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures to be followed
4. Schedule 4 - Approved Purpose: Detailed description of the permitted use of confidential information
5. Appendix A - Form of Acknowledgment: Template for authorized personnel to acknowledge confidentiality obligations
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
