Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and defines the parties entering into the confidentiality agreement
2. Background: Sets out the context and purpose of the agreement, including the relationship between the parties
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information'
4. Scope of Confidential Information: Clearly defines what information is covered by the agreement
5. Obligations of Confidentiality: Details the core confidentiality obligations and permitted uses of confidential information
6. Security Measures: Specifies the security measures required to protect confidential information
7. Term and Survival: Specifies the duration of the agreement and which obligations survive termination
8. Return or Destruction of Information: Requirements for handling confidential information upon termination
9. Breach and Remedies: Outlines consequences of breach and available remedies
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Permitted Disclosures: Used when specific exceptions to confidentiality obligations need to be detailed, such as disclosures required by law or to professional advisors
2. Non-Competition: Include when the agreement needs to restrict competitive activities
3. Non-Solicitation: Include when the agreement needs to prevent solicitation of employees, customers, or suppliers
4. Intellectual Property Rights: Include when confidential information includes IP that requires specific protection
5. Data Privacy Compliance: Include when personal data is part of the confidential information
6. Export Control: Include when confidential information may be subject to export control laws
7. Insurance Requirements: Include when specific insurance coverage is required for handling confidential information
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of information covered by the agreement
2. Schedule 2 - Authorized Personnel: List of individuals authorized to access the confidential information
3. Schedule 3 - Security Protocols: Detailed security measures and protocols for handling confidential information
4. Appendix A - Acknowledgment Form: Form to be signed by individuals who will have access to confidential information
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
