Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
NDA Non Solicitation
1. Parties: Identification of the contracting parties, including full legal names, company registration numbers (CVR), and registered addresses
2. Background: Context of the agreement, including the purpose of sharing confidential information and the general business relationship between the parties
3. Definitions: Detailed definitions of key terms, including 'Confidential Information', 'Trade Secrets', 'Representatives', and 'Permitted Purpose'
4. Confidentiality Obligations: Core obligations regarding the protection, use, and non-disclosure of confidential information
5. Non-Solicitation Provisions: Restrictions on soliciting employees, customers, or suppliers, including scope and duration
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to representatives and when required by law
7. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
8. Term and Termination: Duration of the agreement and circumstances for termination
9. Breach and Remedies: Consequences of breach and available remedies, including injunctive relief
10. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement provisions
1. Data Protection Compliance: Specific provisions for GDPR compliance when confidential information includes personal data
2. Intellectual Property Rights: Provisions clarifying ownership and usage rights of any IP disclosed under the agreement
3. Surviving Obligations: Specific provisions about which obligations survive termination, if different from standard terms
4. Assignment and Succession: Rules about transferability of the agreement, used when parties anticipate potential corporate changes
5. Competition Law Compliance: Specific provisions ensuring compliance with competition laws, particularly relevant for agreements between competitors
6. Internal Compliance Procedures: Detailed procedures for handling confidential information, recommended for complex organizations
7. Third Party Rights: Provisions regarding the rights of third parties, particularly relevant when group companies are involved
1. Schedule 1 - Specified Confidential Information: Detailed list or categories of information considered confidential under the agreement
2. Schedule 2 - Authorized Representatives: List of individuals or roles authorized to receive and handle confidential information
3. Schedule 3 - Security Measures: Specific security protocols and measures required for protecting confidential information
4. Schedule 4 - Restricted Entities: List of specific competitors or entities covered by non-solicitation provisions
5. Appendix A - Data Processing Terms: Detailed GDPR-compliant data processing terms if personal data is involved
Authors
Trade Secrets
Permitted Purpose
Representatives
Affiliated Companies
Business Relationship
Confidential Materials
Disclosing Party
Receiving Party
Protected Employees
Protected Customers
Protected Suppliers
Restricted Period
Permitted Disclosures
Group Companies
Personal Data
Business Day
Effective Date
Territory
Intellectual Property Rights
Professional Advisers
Security Requirements
Restricted Activities
Authorized Recipients
Data Protection Laws
Competitive Business
Third Party
Legitimate Interest
Non-Solicitation
Non-Disclosure
Information Protection
Return of Information
Data Protection
Permitted Use
Term and Duration
Breach and Remedies
Enforcement
Governing Law
Jurisdiction
Intellectual Property
Exceptions
Assignment
Severability
Entire Agreement
Notices
Third Party Rights
Survival
Amendment
Force Majeure
Waiver
Indemnification
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.