Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the accounting firm and the recipient of confidential information
2. Background: Context of the agreement and relationship between parties
3. Definitions: Key terms including 'Confidential Information', 'Professional Services', 'Client Information', 'Trade Secrets', etc.
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in an accounting context
5. Obligations of Confidentiality: Core confidentiality obligations including use, storage, and protection of information
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed
7. Security Measures: Required security protocols for protecting confidential information
8. Return or Destruction of Information: Obligations regarding confidential information upon termination
9. Duration and Survival: Term of the agreement and surviving obligations
10. Breach and Remedies: Consequences of breach and available remedies
11. General Provisions: Standard provisions including governing law, jurisdiction, and entire agreement
1. Professional Standards Compliance: Additional section when the recipient needs to comply with specific accounting standards
2. Third Party Disclosure: Include when information may need to be shared with external advisors or regulators
3. Electronic Information Security: Additional section for digital information handling requirements
4. Client Data Protection: Specific provisions for handling client personal and financial data
5. International Transfer of Data: Include when information may be transferred across borders
6. Audit Rights: Optional right to audit compliance with confidentiality obligations
7. Insurance Requirements: Include when requiring specific insurance coverage for data protection
1. Schedule 1 - Categories of Confidential Information: Detailed list of types of confidential information specific to the accounting practice
2. Schedule 2 - Approved Security Protocols: Specific security measures and protocols required for information protection
3. Schedule 3 - Approved Recipients: List of authorized personnel or roles permitted to access confidential information
4. Appendix A - Data Handling Procedures: Detailed procedures for handling, storing, and disposing of confidential information
5. Appendix B - Incident Response Plan: Procedures for handling and reporting confidentiality breaches
Find the exact document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
