Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full details of all parties to the agreement
2. Background: Sets out the context and purpose of the agreement, including the nature of the confidential information and exclusivity arrangement
3. Definitions: Defines key terms used throughout the agreement, including 'Confidential Information', 'Exclusivity Period', and other relevant terms
4. Confidentiality Obligations: Details the core obligations regarding confidential information, including use, disclosure, and protection requirements
5. Exclusivity Provisions: Specifies the nature and scope of exclusivity, including duration and territorial limits
6. Term and Termination: Specifies the duration of the agreement and circumstances for termination
7. Security Measures: Outlines required security measures for protecting confidential information
8. Return or Destruction of Information: Procedures for handling confidential information upon termination
9. Breach and Remedies: Consequences of breach and available remedies
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Include when confidential information includes or relates to intellectual property
2. Employee and Contractor Obligations: Include when the receiving party needs to share information with employees or contractors
3. Data Privacy Compliance: Include when personal information is involved, addressing compliance with privacy laws
4. Transaction-Specific Provisions: Include when the agreement relates to a specific transaction or deal
5. Non-Solicitation: Include when parties wish to prevent solicitation of employees or customers
6. Insurance Requirements: Include when specific insurance coverage is required for information protection
7. Audit Rights: Include when the disclosing party requires rights to audit compliance
8. Force Majeure: Include when parties want to address circumstances beyond their control
1. Schedule 1 - Confidential Information: Detailed list or description of information deemed confidential
2. Schedule 2 - Authorized Personnel: List of individuals authorized to access confidential information
3. Schedule 3 - Security Procedures: Detailed security protocols and procedures
4. Schedule 4 - Excluded Information: Information specifically excluded from confidentiality obligations
5. Appendix A - Form of Confidentiality Undertaking: Template undertaking for employees or contractors who will access confidential information
6. Appendix B - Information Handling Procedures: Detailed procedures for handling, storing, and destroying confidential information
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
