Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the employer and employee, including full legal names and addresses
2. Background: Brief context explaining the employment relationship and need for confidentiality
3. Definitions: Detailed definitions of key terms, especially 'Confidential Information', 'Trade Secrets', and 'Intellectual Property'
4. Scope of Confidential Information: Comprehensive description of what constitutes confidential information within the organization
5. Confidentiality Obligations: Core obligations regarding non-disclosure, protection, and handling of confidential information
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including legal requirements and authorized business purposes
7. Security Measures: Specific measures employee must take to protect confidential information
8. Return of Confidential Information: Requirements for returning or destroying confidential information upon employment termination
9. Duration of Obligations: Timeframe for confidentiality obligations, including post-employment period
10. Breach and Consequences: Consequences of breaching the agreement, including potential legal actions and damages
11. General Provisions: Standard legal clauses including governing law, jurisdiction, and entire agreement
1. Third Party Information: Additional provisions for handling confidential information belonging to clients, partners, or other third parties
2. Social Media and Public Communications: Guidelines for social media usage and public communications about company-related matters
3. Remote Working Provisions: Special confidentiality measures for employees working remotely
4. International Transfer of Data: Provisions for handling confidential information across borders, if employee's role involves international operations
5. Industry-Specific Regulations: Additional provisions for regulated industries (e.g., banking, healthcare, etc.)
6. Non-Competition: Post-employment competition restrictions, if applicable under Swiss law
7. Inventions and Developments: Provisions regarding ownership of employee-created intellectual property, if relevant to the role
1. Schedule 1 - Categories of Confidential Information: Detailed list of specific types of confidential information relevant to the employee's role
2. Schedule 2 - Approved Security Protocols: Specific security measures and protocols to be followed
3. Schedule 3 - Authorized Disclosure Recipients: List of persons or entities to whom confidential information may be disclosed
4. Appendix A - Acknowledgment Form: Form for employee to sign acknowledging receipt and understanding of confidentiality obligations
5. Appendix B - Exit Procedures: Checklist of confidentiality-related procedures to be followed upon employment termination
Find the document you need
SOW In Software Project Management
A Swiss law-governed Statement of Work defining scope, deliverables, and terms for software project management services.
SOW Form
A Swiss law-governed Statement of Work defining specific services, deliverables, and terms for project or service engagement under Swiss Code of Obligations.
SOW Proposal
A Swiss law-governed Statement of Work Proposal outlining proposed services, deliverables, and commercial terms for client engagement.
Employment Confidentiality Agreement
A Swiss law-governed agreement establishing employee obligations for protecting company confidential information during and after employment.
Statement Of Work Contract
A Swiss law-governed contract defining specific project work or services, including scope, deliverables, timeline, and commercial terms.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
