Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Shared Software License
"I need a Shared Software License agreement for our enterprise resource planning software to be used across three subsidiary companies in Canada, with specific provisions for data privacy compliance and graduated access levels for different user types, planned to take effect from March 2025."
1. Parties: Identification of the licensor and licensee(s), including full legal names and addresses
2. Background: Context of the agreement, including the nature of the software and the purpose of the shared licensing arrangement
3. Definitions: Detailed definitions of technical terms, key concepts, and any abbreviations used throughout the agreement
4. Grant of License: Specific rights being granted, including scope, territory, and nature of the license (non-exclusive, transferable/non-transferable)
5. License Fees and Payment Terms: Financial terms, payment schedule, and any usage-based fee calculations
6. Use Restrictions: Specific limitations on use, including user numbers, locations, and prohibited activities
7. Intellectual Property Rights: Clear statement of IP ownership and protection of rights
8. Confidentiality: Obligations regarding confidential information and trade secrets
9. Technical Requirements: Minimum system requirements and technical specifications for software use
10. Support and Maintenance: Terms for technical support, updates, and maintenance services
11. Warranties and Representations: Warranties provided and disclaimers regarding software performance
12. Liability and Indemnification: Limitation of liability and indemnification obligations
13. Term and Termination: Duration of the agreement and circumstances for termination
14. General Provisions: Standard legal provisions including governing law, dispute resolution, and notice requirements
1. Third-Party Components: Required when the software includes third-party elements, detailing additional terms and obligations
2. Data Protection: Necessary when the software processes personal data, ensuring PIPEDA compliance
3. Security Requirements: Important for software handling sensitive information or requiring specific security protocols
4. Service Level Agreement: Required when specific performance metrics and availability standards are guaranteed
5. Disaster Recovery: Needed for critical software applications requiring business continuity provisions
6. Geographic Restrictions: Required when there are specific territorial limitations or requirements
7. Export Control: Necessary when the software may be subject to international trade restrictions
8. Source Code Escrow: Optional provision for source code protection and access under specific conditions
1. Schedule A - Software Description: Detailed technical specifications and functionality description of the licensed software
2. Schedule B - License Fee Schedule: Detailed breakdown of licensing fees, payment terms, and calculation methods
3. Schedule C - Support Services: Specific support and maintenance terms, including service levels and response times
4. Schedule D - Authorized Users: Definition and listing of authorized users or user categories
5. Schedule E - Technical Requirements: Detailed technical specifications for hardware, software, and network requirements
6. Appendix 1 - Security Standards: Detailed security requirements and compliance standards
7. Appendix 2 - Service Level Metrics: Specific performance metrics and measurement criteria
Authors
Authorized Users
Business Day
Confidential Information
Documentation
Effective Date
Error
Fees
Force Majeure
Intellectual Property Rights
License Period
Licensed Software
Maintenance Services
Major Release
Minor Release
Normal Business Hours
Operating Environment
Patch
Personal Data
Primary Licensee
Security Breach
Service Level Agreement
Software Components
Source Code
Specifications
Sub-licensee
Support Services
System Requirements
Technical Requirements
Term
Territory
Third-Party Software
Update
Upgrade
User Account
User Data
Virus
Work Product
Working Hours
License Restrictions
Intellectual Property Rights
Payment Terms
Access Rights
Usage Limitations
Technical Requirements
Support and Maintenance
Service Levels
Confidentiality
Data Protection
Security Requirements
Warranties
Liability
Indemnification
Force Majeure
Term and Termination
Assignment
Dispute Resolution
Governing Law
Audit Rights
Compliance
Notice
Severability
Entire Agreement
Amendment
Waiver
Third Party Rights
Counterparts
Survival
Information Technology
Software Development
Financial Services
Healthcare
Manufacturing
Professional Services
Education
Telecommunications
Research & Development
Government & Public Sector
Retail
Consulting Services
Legal
Information Technology
Procurement
Compliance
Risk Management
Software Development
Operations
Information Security
Contract Administration
Business Development
Project Management
Chief Technology Officer
IT Director
Legal Counsel
Procurement Manager
Software Development Manager
Information Security Officer
Contract Administrator
Technology Compliance Manager
Software Asset Manager
Enterprise Architect
Operations Manager
Risk Management Officer
Business Development Manager
Project Manager
Technical Account Manager
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.