Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party (typically the company) and receiving party (the vendor), including full legal names, ABN/ACN, and registered addresses
2. Background: Context of the relationship between parties and purpose of sharing confidential information
3. Definitions: Clear definitions of key terms including 'Confidential Information', 'Permitted Purpose', 'Representatives', and other relevant terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations, including use restrictions and security measures
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees and professional advisors
7. Term and Survival: Duration of the agreement and which obligations survive termination
8. Return or Destruction of Confidential Information: Requirements for handling confidential information upon termination or request
9. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
10. General Provisions: Standard legal provisions including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Section clarifying ownership and protection of IP rights when the vendor relationship involves IP creation or access
2. Data Protection and Privacy: Additional provisions for handling personal information when the vendor will have access to personal data
3. Security Requirements: Specific security protocols and requirements when dealing with highly sensitive information or regulated industries
4. Subcontractors: Provisions governing the use of subcontractors and ensuring their compliance with confidentiality obligations
5. Export Control: Provisions for international vendors or when dealing with export-controlled information
6. Non-Solicitation: Restrictions on soliciting employees or customers, when relevant to the vendor relationship
7. Competitive Restrictions: Additional provisions preventing vendor from using information for competitive purposes
1. Schedule 1 - Specified Confidential Information: Detailed list of specific confidential information covered by the agreement
2. Schedule 2 - Authorized Representatives: List of authorized representatives who may access confidential information
3. Schedule 3 - Security Protocols: Detailed security requirements and procedures for handling confidential information
4. Appendix A - Acknowledgment Form: Form for vendor's employees or subcontractors to acknowledge confidentiality obligations
Find the exact document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)
.png)