Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Purpose and Scope: Outlines the objectives of the policy and its application to employees, contractors, and other stakeholders
2. Definitions: Clear definitions of key terms including 'confidential information', 'personal information', 'sensitive information', and 'client'
3. Legal Framework: Reference to relevant legislation and regulatory requirements the policy adheres to
4. Confidentiality Obligations: Core obligations regarding the protection and handling of client information
5. Data Collection and Storage: Procedures for collecting, recording, and storing client information securely
6. Access and Disclosure: Rules governing who can access client information and under what circumstances
7. Security Measures: Technical and organizational measures to protect client information
8. Breach Reporting: Procedures for reporting and handling confidentiality breaches
9. Staff Training and Compliance: Requirements for staff training and ongoing compliance monitoring
10. Review and Updates: Process for regular review and updating of the policy
1. International Data Transfer: Required if client data is transferred across international borders
2. Industry-Specific Requirements: Additional requirements for specific industries (e.g., healthcare, legal, financial services)
3. Client Consent Procedures: Detailed procedures for obtaining and managing client consent
4. Third-Party Management: Procedures for managing confidentiality with third-party service providers
5. Remote Working Provisions: Specific guidelines for maintaining confidentiality while working remotely
6. Digital Communications: Specific guidelines for handling client information in digital communications
7. Record Retention: Specific timeframes and procedures for retaining and destroying client information
1. Schedule A - Confidentiality Agreement Template: Template for confidentiality agreements to be signed by employees and contractors
2. Schedule B - Security Protocols: Detailed technical security protocols and procedures
3. Schedule C - Breach Response Plan: Detailed steps for responding to confidentiality breaches
4. Schedule D - Training Requirements: Detailed training requirements and schedule for different roles
5. Appendix 1 - Information Classification Guide: Guide for classifying different types of client information
6. Appendix 2 - Compliance Checklist: Checklist for regular compliance self-assessment
7. Appendix 3 - Incident Report Form: Template for reporting confidentiality breaches or incidents
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
