Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Source Code Escrow Agreement
"I need a Source Code Escrow Agreement for our enterprise software license with PT Teknologi Solutions, where we're the beneficiary requiring quarterly code deposits and specific release conditions for business cessation or bankruptcy, compliant with Indonesian law."
1. Parties: Identifies and defines the three main parties: Software Owner/Depositor, Beneficiary, and Escrow Agent
2. Background: Explains the context of the agreement, including the existence of a software license agreement between owner and beneficiary
3. Definitions: Defines key terms including Deposit Materials, Release Events, Verification Tests, etc.
4. Deposit Obligations: Details the depositor's obligations regarding initial and ongoing deposits of source code and related materials
5. Verification Procedures: Specifies procedures for verifying completeness and accuracy of deposited materials
6. Escrow Agent's Duties: Outlines the responsibilities of the escrow agent in maintaining and protecting the deposit materials
7. Release Conditions: Specifies the events or conditions that trigger the release of source code to the beneficiary
8. Release Procedures: Details the process for requesting and executing a release of the deposit materials
9. Confidentiality: Establishes confidentiality obligations for all parties regarding the deposit materials
10. Fees and Payments: Specifies escrow service fees and payment responsibilities
11. Term and Termination: Defines the duration of the agreement and conditions for termination
12. General Provisions: Standard legal provisions including governing law, dispute resolution, and notices
1. Multiple Beneficiaries: Required when there are multiple beneficiaries with rights to the source code
2. Intellectual Property Protection: Additional provisions for protecting IP rights in jurisdictions with specific requirements
3. Insurance Requirements: Specifies insurance obligations for the escrow agent when handling high-value source code
4. Security Measures: Details additional security requirements for storing and handling the deposit materials
5. Third-Party Materials: Addresses handling of third-party components within the source code
6. Disaster Recovery: Specifies procedures for backup and recovery of deposit materials
7. International Transfer Provisions: Required when parties are in different countries or materials cross borders
1. Schedule A - Deposit Materials: Detailed list of all materials to be deposited, including source code, documentation, and build instructions
2. Schedule B - Verification Test Procedures: Step-by-step procedures for verifying the completeness and functionality of deposit materials
3. Schedule C - Release Events: Comprehensive list of events that trigger release of the deposit materials
4. Schedule D - Fee Schedule: Detailed breakdown of all fees and payment terms
5. Schedule E - Contact Information: List of authorized contacts and notice addresses for all parties
6. Appendix 1 - Technical Specifications: Technical requirements for deposit format, media, and delivery methods
7. Appendix 2 - Verification Certificate: Template for documenting successful verification of deposit materials
Authors
Applicable Law
Authorized Representative
Beneficiary
Build Instructions
Confidential Information
Deposit Materials
Deposit Schedule
Depositor
Documentation
Effective Date
Escrow Agent
Escrow Fees
Initial Deposit
Intellectual Property Rights
License Agreement
Maintenance Updates
Material Update
Object Code
Release Events
Release Notice
Release Request
Software
Source Code
Source Code Materials
Specifications
Technical Information
Term
Third-Party Materials
Updates
Verification Testing
Verification Certificate
Work Product
Appointment of Escrow Agent
Deposit Obligations
Verification Rights
Release Conditions
Release Procedures
Confidentiality
Intellectual Property Rights
Fees and Payment
Warranties and Representations
Liability and Indemnification
Term and Termination
Force Majeure
Assignment
Notices
Governing Law
Dispute Resolution
Amendment
Entire Agreement
Severability
Waiver
Third Party Rights
Data Protection
Electronic Execution
Counterparts
Information Technology
Financial Services
Healthcare
Manufacturing
Telecommunications
Government
Defense
E-commerce
Enterprise Software
Critical Infrastructure
Legal
Information Technology
Software Development
Information Security
Risk Management
Procurement
Compliance
Technical Operations
Vendor Management
Intellectual Property
Chief Technology Officer
Chief Information Officer
Software Development Manager
Legal Counsel
IP Attorney
Contract Manager
IT Procurement Manager
Information Security Officer
Software Architect
Technical Operations Director
Risk Management Officer
Compliance Officer
Find the exact document you need
Software Escrow Agreement
An Indonesian law-governed agreement establishing source code escrow arrangements between software owner, beneficiary, and escrow agent, ensuring business continuity while protecting intellectual property rights.
Data Escrow Agreement
An Indonesian law-governed agreement for secure third-party data storage and management, ensuring compliance with local data protection regulations.
Source Code Escrow Agreement
An Indonesian law-governed agreement for securing software source code with an escrow agent, protecting both developer and licensee interests.
Escrow Account Agreement
An Indonesian law-governed agreement establishing the terms for an escrow arrangement between depositor, beneficiary, and bank as escrow agent.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.