Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Embedded License
1. Parties: Identification of licensor and licensee with full legal details
2. Background: Context of the agreement, nature of the embedded system, and business purpose
3. Definitions: Definitions of technical terms, embedded system components, and key contract terms
4. Grant of License: Scope of license, permitted uses, and integration rights for the embedded software
5. Technical Specifications: Detailed specifications of the embedded software and integration requirements
6. Implementation and Integration: Requirements and procedures for implementing the embedded software
7. License Restrictions: Limitations on use, modification, and distribution of the embedded software
8. Intellectual Property Rights: Ownership of IP, protection measures, and infringement handling
9. Payment Terms: License fees, payment schedule, and related financial terms
10. Warranties and Representations: Warranties regarding software functionality and performance
11. Liability and Indemnification: Allocation of risks and responsibilities between parties
12. Term and Termination: Duration, renewal terms, and termination conditions
13. Confidentiality: Protection of proprietary information and trade secrets
14. General Provisions: Standard legal provisions including governing law and dispute resolution
1. Source Code Escrow: Terms for source code escrow arrangement, used when source code access might be needed
2. Export Control: Export compliance terms, required when software may be subject to export restrictions
3. Data Protection: GDPR compliance terms, needed when personal data is processed
4. Maintenance and Support: Terms for ongoing support and maintenance, if offered
5. Quality Assurance: Quality standards and testing requirements, for critical applications
6. Security Requirements: Specific security measures and compliance requirements, for sensitive applications
7. Change Management: Procedures for managing software updates and changes
8. Disaster Recovery: Business continuity provisions, important for critical systems
1. Technical Specification Schedule: Detailed technical specifications of the embedded software
2. Integration Requirements: Specific requirements for hardware integration
3. Pricing Schedule: Detailed pricing structure and payment terms
4. Service Level Agreement: Performance metrics and service levels if applicable
5. Approved Hardware List: List of hardware platforms approved for software integration
6. Security Standards: Required security standards and compliance requirements
7. Support and Maintenance Terms: Detailed support and maintenance procedures
8. Change Request Procedure: Process for requesting and implementing changes
Authors
Licensed Product
Hardware Platform
Integration Requirements
Technical Specifications
Source Code
Object Code
API
Documentation
Intellectual Property Rights
Derivative Works
Updates
Patches
Bug Fix
Critical Error
Implementation Period
Acceptance Testing
Acceptance Criteria
Integration Testing
Quality Standards
Performance Metrics
Service Levels
Support Services
Maintenance Services
Emergency Maintenance
Security Requirements
Compliance Standards
Confidential Information
Trade Secrets
Background IP
Foreground IP
License Fee
Royalties
Territory
Authorized Users
End User
OEM Products
Development Environment
Production Environment
Test Environment
Release Version
Major Release
Minor Release
Integration Tools
System Requirements
Hardware Dependencies
Technical Documentation
User Manual
Configuration Requirements
Security Protocols
Access Credentials
Error Conditions
Response Time
Uptime
Disaster Recovery
Business Continuity
Change Request
Modification
Enhancement
Third-Party Components
Open Source Software
Proprietary Software
Product Roadmap
Support Term
Warranty Period
Force Majeure Event
Integration Rights
Technical Requirements
Implementation
Testing and Acceptance
Payment Terms
Intellectual Property
Confidentiality
Data Protection
Warranties
Indemnification
Limitation of Liability
Term and Termination
Support and Maintenance
Security Requirements
Quality Standards
Change Management
Export Control
Source Code Escrow
Performance Standards
Documentation
Training
Audit Rights
Force Majeure
Assignment
Subcontracting
Dispute Resolution
Governing Law
Insurance
Notices
Entire Agreement
Severability
Survival
Updates and Upgrades
Third-Party Components
Compliance with Laws
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.