Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and defines the three main parties: Depositor, Beneficiary, and Escrow Agent
2. Background: Explains the context and purpose of the escrow arrangement
3. Definitions: Defines key terms used throughout the agreement
4. Appointment of Escrow Agent: Formal appointment and acceptance of the escrow agent's role
5. Escrow Deposit: Details of the assets/funds to be placed in escrow and the deposit process
6. Escrow Agent's Duties: Comprehensive list of the escrow agent's responsibilities and obligations
7. Release Conditions: Specific conditions that must be met for the release of the escrow deposit
8. Release Mechanism: Process and procedures for releasing the escrow deposit
9. Escrow Agent's Fees: Details of fees, charges, and payment terms for the escrow service
10. Representations and Warranties: Standard representations and warranties from all parties
11. Liability and Indemnification: Limitations of liability and indemnification provisions
12. Term and Termination: Duration of the agreement and termination provisions
13. Notices: Communication procedures and contact details for all parties
14. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, etc.
1. Anti-Money Laundering Compliance: Required when dealing with substantial monetary deposits or when parties are subject to AML regulations
2. Interest on Escrow Funds: Include when interest-bearing accounts are used for the escrow deposit
3. Dispute Resolution: Detailed dispute resolution procedures, recommended for high-value or complex transactions
4. Force Majeure: Include when extended holding periods are contemplated or for international transactions
5. Confidentiality: Required when sensitive commercial information is involved
6. Tax Provisions: Include when tax implications need to be addressed explicitly
7. Multiple Currency Provisions: Required when the escrow involves multiple currencies
8. Electronic Communications: Include when parties agree to use electronic means for notifications and approvals
1. Schedule 1 - Escrow Property Details: Detailed description of the assets/funds being held in escrow
2. Schedule 2 - Fee Schedule: Detailed breakdown of all fees and charges
3. Schedule 3 - Release Instructions: Specific form and format of release instructions
4. Schedule 4 - Required Documents: List of documents required for release conditions
5. Schedule 5 - Authorized Signatories: List of persons authorized to give instructions
6. Appendix A - KYC Requirements: Required documentation for compliance with KYC regulations
7. Appendix B - Form of Notice: Standard forms for various notices under the agreement
Find the document you need
Software End User License Agreement
A Hong Kong law-governed agreement setting out terms and conditions for end users' use of proprietary software.
Sound Recording License Agreement
A Hong Kong law-governed agreement for licensing rights to use and exploit sound recordings, including commercial terms, technical specifications, and legal protections.
Source Code Escrow Agreement
A Hong Kong law-governed agreement establishing source code escrow arrangements between software owner, licensee, and escrow agent, protecting both IP rights and business continuity.
Escrow Account Agreement
A Hong Kong law-governed agreement establishing the terms for holding and managing assets or funds in escrow by a third party until specified conditions are met.
Escrow Deposit Agreement
A Hong Kong law-governed agreement establishing terms for third-party holding of assets/funds between depositor, beneficiary, and escrow agent.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
