Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of disclosing party (seller), receiving party (potential buyer), and their authorized representatives
2. Background: Context of the proposed business sale and purpose of the agreement
3. Definitions: Definitions of key terms including 'Confidential Information', 'Permitted Purpose', 'Representatives', 'Business', and 'Transaction'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the context of the business sale
5. Permitted Disclosure and Use: Specifications for how confidential information may be used and to whom it may be disclosed
6. Non-Disclosure Obligations: Core obligations regarding protection and non-disclosure of confidential information
7. Security Measures: Required measures for protecting and securing confidential information
8. Return or Destruction of Information: Obligations regarding the return or destruction of confidential information if the transaction doesn't proceed
9. Duration and Survival: Term of the agreement and surviving obligations
10. Remedies: Available remedies in case of breach, including injunctive relief
11. Governing Law and Jurisdiction: Specification of Hong Kong law and jurisdiction
1. Non-Solicitation: Prevents poaching of employees or customers, particularly relevant if buyer is a competitor
2. Exclusivity Period: Optional period during which seller won't negotiate with other potential buyers
3. Securities Laws Compliance: Required if either party is a listed company or if transaction might involve inside information
4. Data Privacy Compliance: Specific provisions for handling personal data under Hong Kong's PDPO
5. Anti-Trust Compliance: Required when parties are competitors or transaction might raise competition concerns
6. Non-Circumvention: Prevents buyer from circumventing seller to directly approach key customers/suppliers
7. Public Announcements: Controls over public statements about the potential transaction
1. Schedule 1: Authorized Representatives: List of authorized representatives from each party who may access confidential information
2. Schedule 2: Specific Categories of Confidential Information: Detailed categorization of confidential information to be disclosed
3. Schedule 3: Security Protocols: Specific security measures and protocols for handling confidential information
4. Schedule 4: Data Room Rules: Rules and procedures for accessing and using the data room if applicable
5. Appendix A: Form of Confidentiality Undertaking: Template confidentiality undertaking for representatives and advisors
6. Appendix B: Destruction Certificate: Template certificate confirming destruction of confidential information
Find the document you need
International Shipping Invoice
A Hong Kong law-governed commercial document that combines shipping details and payment requirements for international trade transactions.
Digital Image License For Photographers
A Hong Kong law-governed agreement for licensing digital photographs, establishing usage rights and conditions between photographers and clients.
Confidentiality Agreement For Sale Of Business
A Hong Kong law-governed confidentiality agreement protecting sensitive information during business sale transactions.
Student Request For Recommendation Letter
A formal request document used in Hong Kong's educational system for students to obtain letters of recommendation from academic staff.
Donation Solicitation Letter For Death Financial Assistance
A Hong Kong-compliant solicitation letter requesting donations to provide financial assistance to families following a death, issued by registered charitable organizations.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
