Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the employer and employee/contractor
2. Background: Context of the agreement and relationship between parties
3. Definitions: Key terms used throughout the agreement, including definition of confidential information
4. Confidentiality Obligations: Core obligations regarding handling of confidential information
5. Duration of Obligations: Timeframe for confidentiality obligations
6. Return of Confidential Information: Procedures for returning or destroying confidential information
7. Governing Law: Specification of applicable law and jurisdiction
1. Intellectual Property Rights: Protection of IP rights, used when confidential information includes intellectual property
2. Data Protection Compliance: Specific obligations regarding personal data handling and protection
3. Third Party Disclosure: Rules and procedures for sharing confidential information with authorized third parties
4. Non-Competition: Additional restrictions on competitive activities for senior employees or those with access to sensitive information
1. Schedule 1: Categories of Confidential Information: Detailed list of types of confidential information covered by the agreement
2. Schedule 2: Authorized Third Parties: List of pre-approved third parties who may receive confidential information
3. Schedule 3: Security Procedures: Specific procedures for handling and storing confidential information
4. Appendix A: Data Processing Requirements: Detailed data protection obligations and requirements for handling personal data
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
