Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Non Standard EULA
"I need a Non-Standard EULA for our enterprise AI software platform that will be deployed to Hong Kong financial institutions, with specific provisions for custom modifications, data processing requirements, and integration with client systems."
1. Parties: Identification of the licensor (software provider) and licensee (end user), including full legal names and addresses
2. Background: Context of the agreement, brief description of the software, and purpose of the license
3. Definitions: Detailed definitions of technical terms, software components, and key concepts used throughout the agreement
4. Grant of License: Scope of the license, permitted uses, and any territorial or user number restrictions
5. License Restrictions: Specific prohibited activities, limitations on use, and restrictions on modification or redistribution
6. Intellectual Property Rights: Declaration of ownership rights, protection of IP, and handling of derivative works
7. Payment Terms: License fees, payment schedule, and consequences of non-payment
8. User Data and Privacy: Terms regarding collection, processing, and protection of user data in compliance with Hong Kong's PDPO
9. Warranties and Disclaimers: Software performance warranties and limitations in accordance with Hong Kong law
10. Limitation of Liability: Limits on liability compliant with Hong Kong's Control of Exemption Clauses Ordinance
11. Term and Termination: Duration of the license, renewal terms, and grounds for termination
12. Post-Termination Obligations: Requirements and procedures following agreement termination
13. Governing Law and Jurisdiction: Specification of Hong Kong law as governing law and jurisdiction for disputes
1. Third-Party Software Components: Include when the software incorporates third-party components, detailing their licenses and terms
2. Service Level Agreement: Include for software that includes ongoing services or cloud-based components
3. Security Requirements: Include when software handles sensitive data or requires specific security protocols
4. Audit Rights: Include when usage monitoring or compliance verification is required
5. Professional Services: Include when implementation, training, or support services are provided
6. Export Control: Include when software is subject to international distribution or export restrictions
7. Source Code Escrow: Include when source code escrow arrangements are part of the agreement
8. Data Processing Agreement: Include when software processes personal data as defined under PDPO
1. Schedule 1 - Software Description: Detailed technical specifications and functionality description
2. Schedule 2 - License Fees: Detailed pricing structure, payment terms, and fee calculations
3. Schedule 3 - Service Levels: Performance metrics, support levels, and response times if applicable
4. Schedule 4 - Security Standards: Required security measures and compliance standards
5. Appendix A - Acceptable Use Policy: Detailed rules and guidelines for software usage
6. Appendix B - Technical Requirements: Minimum system requirements and technical prerequisites
7. Appendix C - Data Processing Terms: Detailed terms for handling personal data in compliance with PDPO
Authors
Authorized Users
Business Day
Confidential Information
Configuration
Custom Modifications
Data Protection Laws
Documentation
Effective Date
Error
Fees
Force Majeure Event
Hong Kong
Intellectual Property Rights
License Key
Licensed Software
Maintenance Services
Personal Data
PDPO
Professional Services
Security Requirements
Service Levels
Software Updates
Source Code
Specifications
Support Services
System Requirements
Term
Territory
Third Party Components
Third Party Licenses
Updates
Upgrades
User Data
User Interface
Use Rights
Virus
Warranty Period
Work Product
License Restrictions
Intellectual Property Rights
Software Delivery
Acceptance Testing
Payment Terms
Data Protection
Confidentiality
User Obligations
Technical Requirements
Warranties
Limitation of Liability
Indemnification
Force Majeure
Term and Termination
Service Levels
Support Services
Security Requirements
Audit Rights
Export Control
Assignment
Governing Law
Dispute Resolution
Entire Agreement
Third Party Rights
Severability
Notices
Amendments
Survival
Software Updates
Source Code
Custom Modifications
Implementation Services
Training Services
Data Processing
Backup and Recovery
Usage Monitoring
Performance Standards
Compliance with Laws
Technology
Financial Services
Healthcare
E-commerce
Manufacturing
Professional Services
Education
Telecommunications
Banking
Insurance
Government and Public Sector
Research and Development
Biotechnology
Media and Entertainment
Legal
Information Technology
Compliance
Product Development
Information Security
Procurement
Risk Management
Software Development
Contract Administration
Enterprise Architecture
Solutions Engineering
Technical Operations
Data Protection
Chief Technology Officer
Legal Counsel
Compliance Officer
IT Director
Software Development Manager
Product Manager
Information Security Officer
Data Protection Officer
Procurement Manager
Contract Manager
Enterprise Architect
Solutions Architect
Technical Director
Licensing Manager
Risk Manager
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.