Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full details of all parties entering into the agreement
2. Background: Explains the context and purpose of the agreement, including the nature of the business relationship
3. Definitions: Defines key terms used throughout the agreement, including 'Confidential Information', 'Circumvention', 'Business Opportunity', etc.
4. Confidentiality Obligations: Details the obligations regarding handling and protecting confidential information
5. Non-Circumvention Obligations: Specifies prohibited activities and direct/indirect circumvention restrictions
6. Term and Survival: Specifies the duration of the agreement and which provisions survive termination
7. Permitted Disclosures: Outlines circumstances under which confidential information may be disclosed
8. Return or Destruction of Confidential Information: Procedures for handling confidential information upon agreement termination
9. Breach and Remedies: Specifies consequences of breach and available remedies
10. General Provisions: Standard clauses including governing law, jurisdiction, entire agreement, etc.
1. Intellectual Property Rights: Additional provisions protecting IP rights when the confidential information includes intellectual property
2. Non-Solicitation: Prevents parties from soliciting each other's employees or clients, used when parties have access to internal information
3. Data Protection Compliance: Special provisions for compliance with privacy laws when personal data is involved
4. Commission Structures: Details of commission arrangements for successful business introductions, used in broker/agent relationships
5. Dispute Resolution: Specific procedures for resolving disputes, such as mediation or arbitration
6. Insurance Requirements: Obligations to maintain specific insurance coverage, used in high-value or high-risk relationships
1. Schedule A - Confidential Information: Detailed list or categories of information deemed confidential
2. Schedule B - Authorized Representatives: List of individuals authorized to receive or handle confidential information
3. Schedule C - Prohibited Activities: Specific activities or transactions that constitute circumvention
4. Schedule D - Security Protocols: Required security measures for handling confidential information
5. Appendix 1 - Notification Requirements: Procedures and timeframes for required notices under the agreement
6. Appendix 2 - Approved Third Parties: List of pre-approved third parties who may receive confidential information
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
