Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party, receiving party (VA service provider), and any relevant affiliated entities
2. Background: Context of the agreement, nature of the VA services, and purpose of information sharing
3. Definitions: Definitions of key terms including Confidential Information, Virtual Assistant, Authorized Purpose, Security Standards, and Processing Activities
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the context of VA services
5. Confidentiality Obligations: Core obligations regarding the protection and non-disclosure of confidential information
6. Permitted Use and Access: Specific permissions for how the VA can use, process, and access confidential information
7. Security Requirements: Specific security measures required for protecting digital information and VA system access
8. Data Handling Procedures: Procedures for processing, storing, and managing confidential information in VA systems
9. Return or Destruction of Information: Requirements for returning or destroying confidential information, including digital copies and cached data
10. Breach Notification: Procedures for reporting and handling any breach of confidentiality
11. Term and Termination: Duration of the agreement and termination provisions
12. General Provisions: Standard legal provisions including governing law, jurisdiction, and entire agreement
1. Third Party Access: Provisions governing access by third-party systems or providers, used when the VA service involves third-party integrations
2. International Data Transfers: Provisions for cross-border data transfers, required when VA services operate across multiple jurisdictions
3. Intellectual Property Rights: Specific IP provisions, needed when VA services involve creation or processing of IP-sensitive materials
4. Training and Development: Provisions regarding use of information for VA training purposes, included when applicable to the service model
5. Audit Rights: Provisions for auditing VA systems and compliance, included for high-security requirements
6. Insurance Requirements: Specific insurance obligations, included for high-value or high-risk services
7. Service Level Requirements: Specific performance and availability requirements, included when critical to service delivery
1. Schedule 1 - Confidential Information Categories: Detailed list of specific types of confidential information covered
2. Schedule 2 - Security Standards: Technical specifications for security measures and protocols
3. Schedule 3 - Authorized Personnel: List of authorized users and access levels
4. Schedule 4 - Processing Activities: Detailed description of permitted VA processing activities
5. Appendix A - Data Handling Procedures: Step-by-step procedures for handling different types of confidential information
6. Appendix B - Incident Response Plan: Detailed procedures for handling security incidents and breaches
Find the exact document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)
.png)