Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the digital marketing agency and the disclosing party
2. Background: Context of the relationship and purpose of sharing confidential information
3. Definitions: Key terms including 'Confidential Information', 'Digital Marketing Services', 'Marketing Analytics', 'Client Data', etc.
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the digital marketing context
5. Obligations of Confidentiality: Core confidentiality obligations and permitted uses of confidential information
6. Data Protection and Security: Specific measures required to protect digital marketing data and compliance with privacy laws
7. Term and Survival: Duration of the agreement and obligations that continue after termination
8. Return or Destruction of Confidential Information: Procedures for handling confidential information upon termination
9. Breach and Remedies: Consequences of breach and available remedies
10. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Third Party Access: Rules for sharing information with contractors or subcontractors, used when the agency works with external partners
2. Social Media Management: Specific provisions for handling social media accounts and related confidential information
3. Intellectual Property Rights: Additional provisions regarding IP ownership and licensing, used when creative works are involved
4. Client Customer Data: Specific provisions for handling end-customer data, used when the agency has access to client's customer database
5. Competition Restrictions: Non-compete provisions, used when sharing sensitive competitive information
6. International Data Transfers: Provisions for cross-border data transfers, used when operating internationally
1. Schedule 1 - Categories of Confidential Information: Detailed list of types of confidential information specific to the digital marketing context
2. Schedule 2 - Authorized Personnel: List of personnel authorized to access confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols for handling digital information
4. Appendix A - Data Handling Procedures: Step-by-step procedures for handling different types of confidential information
5. Appendix B - Incident Response Plan: Procedures to follow in case of data breach or unauthorized disclosure
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
