Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification and details of the parties entering into the NDA
2. Background: Context of the agreement and purpose for sharing confidential information
3. Definitions: Key terms used in the agreement, particularly the definition of 'Confidential Information'
4. Confidentiality Obligations: Core obligations regarding non-disclosure, protection, and use of confidential information
5. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees and advisors
6. Term and Survival: Duration of the agreement and survival of obligations after termination
7. Return or Destruction of Confidential Information: Requirements for handling confidential information upon termination or request
8. Remedies: Available remedies in case of breach, including injunctive relief
9. General Provisions: Standard provisions including governing law, jurisdiction, and entire agreement
1. Security Measures: Specific security protocols required for protecting confidential information, recommended for technical or highly sensitive information
2. Non-Solicitation: Restrictions on soliciting employees or customers, useful when parties are competitors or in sensitive business relationships
3. Non-Competition: Restrictions on competitive activities, recommended when sharing highly sensitive business information
4. Intellectual Property Rights: Clarification of IP ownership and rights, important when confidential information includes IP
5. Data Privacy Compliance: Specific obligations regarding personal data handling, necessary when confidential information includes personal data
6. Representatives and Warranties: Additional assurances from parties, useful in complex commercial relationships
7. Assignment and Succession: Rules for transferring rights under the agreement, important for corporate parties
1. Schedule 1 - Categories of Confidential Information: Detailed list or description of types of confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures required for protecting the confidential information
4. Schedule 4 - Permitted Purpose: Detailed description of the specific purpose(s) for which confidential information may be used
Find the document you need
Year End Performance Review
A Hong Kong-compliant annual employee performance evaluation document for assessing achievements, setting goals, and documenting employment-related decisions.
360 Review For Manager
A Hong Kong-compliant framework for conducting comprehensive 360-degree performance reviews for managers, incorporating multi-source feedback and development guidelines.
Performance Management And Appraisal
A Hong Kong-compliant framework for managing employee performance evaluations and appraisals, aligned with local employment laws.
360 Performance Evaluation System
A Hong Kong-compliant framework for implementing and managing a 360-degree performance evaluation system that ensures legal compliance while facilitating comprehensive employee assessment.
Vendor Managed Inventory Agreement
A Hong Kong law-governed agreement establishing a vendor managed inventory arrangement, detailing inventory management responsibilities, operational requirements, and performance metrics.
Individual Loan Agreement
A Hong Kong law-governed agreement setting out terms and conditions for a loan between a lender and individual borrower, compliant with local lending regulations.
Trading Agreement
A Hong Kong law-governed Trading Agreement establishing terms and conditions for commercial trading relationships between parties engaged in sale, purchase, or distribution of goods.
Basic Non Disclosure Agreement
A basic Non-Disclosure Agreement under Hong Kong law for protecting confidential information shared between parties.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
