Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the business owner/operator and the cleaning service provider
2. Background: Context of the cleaning services arrangement and need for confidentiality
3. Definitions: Definitions of key terms including 'Confidential Information', 'Cleaning Services', 'Premises', 'Personnel', and 'Security Protocols'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the context of cleaning services, including business operations, security arrangements, access codes, and customer information
5. Confidentiality Obligations: Core obligations regarding non-disclosure, protection, and handling of confidential information
6. Permitted Use and Disclosure: Circumstances under which confidential information may be used or disclosed in the course of providing cleaning services
7. Security Measures: Specific security protocols to be followed while accessing premises and handling confidential information
8. Personnel Obligations: Requirements for cleaning staff including confidentiality training and compliance
9. Term and Survival: Duration of the agreement and obligations that continue after termination
10. Return of Confidential Information: Process for returning or destroying any confidential information upon request or termination
11. Breach and Remedies: Consequences of breaching the agreement and available remedies
12. General Provisions: Standard provisions including governing law, jurisdiction, and entire agreement
1. Subcontractors: Include when the cleaning service provider may use subcontractors, detailing their obligations regarding confidentiality
2. Insurance Requirements: Include when specific insurance coverage for confidentiality breaches is required
3. Audit Rights: Include for high-security premises where regular audits of confidentiality compliance may be necessary
4. International Operations: Include when cleaning services involve cross-border operations or information transfer
5. Data Protection: Include when cleaning staff may have access to personal data protected under privacy laws
6. Emergency Protocols: Include when specific procedures are needed for handling confidential information during emergencies
1. Schedule 1 - Specified Confidential Information: Detailed list of specific types of confidential information relevant to the cleaning services context
2. Schedule 2 - Security Protocols: Detailed security procedures and protocols for accessing and working in different areas of the premises
3. Schedule 3 - Approved Personnel: List of authorized cleaning staff who have completed confidentiality training
4. Appendix A - Confidentiality Acknowledgment Form: Form to be signed by individual cleaning staff members acknowledging confidentiality obligations
5. Appendix B - Incident Reporting Procedures: Procedures for reporting potential or actual confidentiality breaches
6. Appendix C - Restricted Areas Register: Register of areas with special confidentiality requirements or restricted access
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
