Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party, receiving party, and their authorized representatives
2. Background: Context of the potential acquisition and purpose of the NDA
3. Definitions: Key terms including Confidential Information, Permitted Purpose, Representatives, Transaction
4. Disclosure and Use of Confidential Information: Core obligations regarding the handling and use of confidential information
5. Permitted Disclosures: Circumstances under which confidential information may be shared with representatives and advisors
6. Security and Control Measures: Required procedures for protecting confidential information
7. Return or Destruction of Confidential Information: Obligations regarding confidential information upon termination or request
8. Duration and Survival: Term of the agreement and surviving obligations
9. Non-Circumvention: Restrictions on using information to compete or circumvent the potential transaction
10. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Standstill Provisions: Used when the target is a public company to prevent unauthorized share acquisitions
2. Non-Solicitation: Include when there's a risk of poaching employees or clients during the due diligence process
3. Deal Team Restrictions: Used for larger transactions to limit information access to specific deal team members
4. Exclusivity Period: Include when parties agree to negotiate exclusively for a defined period
5. Clean Team Arrangements: Used when sharing commercially sensitive information between competitors
6. Data Room Provisions: Include when using a virtual data room for due diligence
7. Securities Law Compliance: Required for public companies to address insider trading concerns
1. Authorized Representatives: List of individuals authorized to access confidential information
2. Specific Confidential Information: Detailed description of categories of confidential information covered
3. Security Protocols: Specific procedures for handling and protecting confidential information
4. Excluded Information: List of information explicitly excluded from confidentiality obligations
5. Data Room Rules: Specific rules and procedures for virtual data room access and use
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
