Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Software Tool Evaluation
1. Parties: Identification of the parties entering into the agreement
2. Background: Context of the agreement and purpose of the software tool evaluation
3. Definitions: Key terms used throughout the agreement
4. Scope of Evaluation: Details of what software tools will be evaluated and the extent of testing permitted
5. Duration: Time period for the evaluation, including start and end dates
6. License Grant: Limited license terms for evaluation purposes
7. Evaluation Process: Steps, methodology, and requirements for conducting the evaluation
8. Confidentiality: Protection of confidential information exchanged during evaluation
9. Intellectual Property Rights: Ownership and protection of IP rights during and after evaluation
10. Data Security: Basic security requirements for handling the software and associated data
11. Feedback and Reporting: Requirements for providing evaluation feedback and reports
12. Warranties and Disclaimers: Limited warranties for evaluation period and associated disclaimers
13. Limitation of Liability: Limitations on liability during evaluation period
14. Termination: Conditions and process for early termination of evaluation
15. General Provisions: Standard boilerplate provisions including governing law, notices, and entire agreement
1. Data Processing Terms: Required when personal data will be processed during evaluation
2. Special Security Requirements: Needed for evaluation of security-sensitive software or in regulated industries
3. Third-Party Components: Required when software includes third-party elements requiring separate terms
4. Export Control: Needed when software is subject to export control regulations
5. Professional Services: Include when vendor provides installation or training services
6. Acceptance Testing: Required for more formal evaluation processes with specific acceptance criteria
7. Fees: Include if the evaluation involves any payment or cost reimbursement
8. Insurance: Required for high-risk evaluations or when mandated by company policy
1. Technical Specifications: Detailed technical specifications of the software tool being evaluated
2. Evaluation Criteria: Specific criteria and metrics for evaluating the software
3. Testing Environment Requirements: Technical requirements for the evaluation environment
4. Security Requirements: Detailed security protocols and requirements
5. Data Processing Agreement: GDPR-compliant data processing terms if personal data is involved
6. Service Level Metrics: Performance metrics and standards to be evaluated
7. Authorized Users: List of personnel authorized to participate in the evaluation
8. Feedback Form: Template for providing structured feedback on the software
Authors
Authorized Users
Business Day
Commencement Date
Confidential Information
Data Protection Laws
Documentation
Evaluation Environment
Evaluation Feedback
Evaluation Period
Evaluation Purpose
Evaluation Report
Intellectual Property Rights
Licensed Software
Personal Data
Provider Materials
Security Requirements
Services
Software
Software Tools
Source Code
Specifications
Test Data
Third-Party Components
User Access
Working Hours
Evaluation License
Technical Requirements
Implementation Plan
Maintenance Window
Performance Metrics
Security Breach
Service Levels
System Requirements
Test Results
Updates
User Documentation
Vulnerability
Evaluation Rights
Access Rights
Usage Restrictions
Evaluation Period
Confidentiality
Data Protection
Intellectual Property
Security Requirements
Performance Testing
Technical Requirements
Service Levels
Warranties
Limitation of Liability
Indemnification
Termination
Exit Rights
Force Majeure
Assignment
Feedback Rights
Support Services
Documentation
Acceptance Testing
Audit Rights
Insurance
Governing Law
Dispute Resolution
Notices
Entire Agreement
Severability
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.