Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Escrow Agreement
"I need a Data Escrow Agreement for our Indonesian software company that will be depositing source code with an international escrow agent starting March 2025, with specific provisions for quarterly code updates and cross-border data transfer compliance."
1. Parties: Identification of the Data Depositor, Escrow Agent, and Beneficiary
2. Background: Context of the agreement, purpose of the escrow arrangement, and relationship between parties
3. Definitions: Detailed definitions of technical terms, Escrow Materials, Deposit Materials, and other key concepts
4. Appointment of Escrow Agent: Terms of appointment and acceptance of the escrow agent's role
5. Deposit Procedures: Procedures and timeframes for depositing data, including format and verification requirements
6. Verification and Testing: Procedures for verifying and testing deposited materials
7. Release Conditions: Specific conditions under which the escrowed data will be released to the beneficiary
8. Security and Confidentiality: Security measures and confidentiality obligations for protecting the escrowed data
9. Fees and Expenses: Payment terms, fee structure, and allocation of costs
10. Representations and Warranties: Warranties regarding data ownership, rights, and compliance with laws
11. Limitation of Liability: Scope of escrow agent's liability and indemnification provisions
12. Term and Termination: Duration of agreement and circumstances for termination
13. Governing Law and Dispute Resolution: Choice of Indonesian law and dispute resolution procedures
14. General Provisions: Standard boilerplate clauses including notices, amendments, and assignment
1. Data Protection Compliance: Specific section addressing compliance with Indonesian PDP Law - required if personal data is involved
2. Cross-border Transfers: Provisions for international data transfers - needed if any party or data storage is outside Indonesia
3. Disaster Recovery: Specific provisions for backup and recovery procedures - recommended for critical data
4. Update Procedures: Procedures for updating or replacing escrowed data - needed for dynamic data sets
5. Third-Party Rights: Rights of third parties in relation to the escrowed data - needed if third-party software or data is involved
6. Source Code Escrow: Specific provisions for source code deposit - required if software source code is part of escrow
7. Intellectual Property Rights: Detailed IP provisions - needed if proprietary technology or trade secrets are involved
1. Schedule 1 - Deposit Materials: Detailed description of all materials to be held in escrow
2. Schedule 2 - Technical Specifications: Technical requirements for data format, storage, and verification
3. Schedule 3 - Fee Schedule: Detailed breakdown of all fees and payment terms
4. Schedule 4 - Verification Procedures: Step-by-step procedures for verification testing
5. Schedule 5 - Security Requirements: Detailed security protocols and requirements
6. Appendix A - Contact Information: List of key contacts and authorized representatives for all parties
7. Appendix B - Release Request Form: Standard form for requesting release of escrowed materials
Authors
Applicable Law
Authorized Representative
Beneficiary
Confidential Information
Data Center
Data Protection Laws
Deposit Materials
Deposit Schedule
Depositor
Disaster Recovery Center
Electronic System
Escrow Agent
Escrow Fee
Escrow Materials
Force Majeure Event
Intellectual Property Rights
Notice of Release
Personal Data
Release Conditions
Release Request
Security Requirements
Services
Source Code
Technical Documentation
Technical Specifications
Term
Testing Procedures
Trigger Event
Update
Verification Process
Working Day
Deposit
Verification
Release
Security
Confidentiality
Data Protection
Fees
Payment
Warranties
Representations
Liability
Indemnification
Force Majeure
Term
Termination
Insurance
Intellectual Property
Dispute Resolution
Governing Law
Assignment
Notices
Amendment
Entire Agreement
Severability
Counterparts
Third Party Rights
Compliance with Laws
Audit Rights
Business Continuity
Regulatory Compliance
Data Localization
Subcontracting
Technology
Financial Services
Healthcare
E-commerce
Telecommunications
Manufacturing
Software Development
Cloud Services
Banking
Insurance
Government Services
Education
Legal
Information Technology
Compliance
Information Security
Risk Management
Software Development
Operations
Data Protection
Digital Assets
Vendor Management
Contract Administration
Chief Technology Officer
Chief Information Officer
Data Protection Officer
Legal Counsel
Compliance Manager
IT Security Manager
Risk Manager
Software Development Manager
Contract Manager
Information Security Officer
Technology Licensing Manager
Digital Assets Manager
Operations Director
Chief Legal Officer
Chief Compliance Officer
Find the exact document you need
Software Escrow Agreement
An Indonesian law-governed agreement establishing source code escrow arrangements between software owner, beneficiary, and escrow agent, ensuring business continuity while protecting intellectual property rights.
Data Escrow Agreement
An Indonesian law-governed agreement for secure third-party data storage and management, ensuring compliance with local data protection regulations.
Source Code Escrow Agreement
An Indonesian law-governed agreement for securing software source code with an escrow agent, protecting both developer and licensee interests.
Escrow Account Agreement
An Indonesian law-governed agreement establishing the terms for an escrow arrangement between depositor, beneficiary, and bank as escrow agent.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.