Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies the organization implementing the policy and to whom it applies (employees, contractors, consultants, etc.)
2. Background: Explains the purpose and importance of the confidentiality policy and its role in protecting organizational interests
3. Definitions: Defines key terms including 'Confidential Information', 'Authorized Personnel', 'Security Breach', and other relevant terminology
4. Scope of Confidential Information: Detailed description of what constitutes confidential information within the organization
5. Confidentiality Obligations: Core obligations regarding handling, protection, and non-disclosure of confidential information
6. Security Measures: Required procedures and practices for protecting confidential information
7. Breach Reporting: Procedures for reporting suspected or actual breaches of confidentiality
8. Consequences of Breach: Disciplinary actions and legal consequences for policy violations
9. Duration of Obligations: Timeframe for confidentiality obligations, including post-employment/engagement obligations
10. Return of Confidential Information: Requirements for returning or destroying confidential information upon request or termination
1. Third Party Disclosure: Additional section for organizations that regularly need to share confidential information with third parties
2. International Data Transfer: Required for organizations operating across multiple jurisdictions
3. Industry-Specific Requirements: Additional requirements for regulated industries (e.g., healthcare, financial services)
4. Remote Working Provisions: Specific provisions for protecting confidential information while working remotely
5. Digital Security Measures: Detailed IT security requirements for digital information
6. Social Media Guidelines: Specific provisions regarding confidentiality in social media usage
7. Intellectual Property Protection: Additional provisions specifically focused on IP protection
1. Schedule A - Confidentiality Agreement Form: Template agreement to be signed by employees/contractors acknowledging the policy
2. Schedule B - Information Classification Guide: Detailed guide for classifying different types of confidential information
3. Schedule C - Security Procedures Checklist: Checklist of required security measures for different types of confidential information
4. Schedule D - Breach Reporting Form: Standard form for reporting confidentiality breaches
5. Appendix 1 - Approved Security Software: List of approved software and tools for protecting confidential information
6. Appendix 2 - Emergency Contacts: List of key contacts for reporting breaches or seeking guidance on confidentiality matters
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
