Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing and receiving parties, including registered addresses and company details
2. Background: Context of the agreement and business relationship between the parties
3. Definitions: Definitions of key terms including 'Confidential Information', 'Representatives', 'Permitted Purpose'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations and permitted uses of confidential information
6. Security Measures: Required security measures for protecting confidential information
7. Permitted Disclosures: Circumstances under which confidential information may be disclosed to third parties
8. Data Protection: GDPR compliance provisions and data protection obligations
9. Term and Termination: Duration of the agreement and termination provisions
10. Return or Destruction of Confidential Information: Obligations regarding confidential information upon termination
11. Remedies: Available remedies in case of breach, including injunctive relief
12. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Reverse Engineering: Prohibition on reverse engineering, used when technical information or trade secrets are involved
2. Residual Rights: Provisions regarding use of residual knowledge, often requested by receiving parties in technology-related NDAs
3. Non-Solicitation: Restrictions on soliciting employees or customers, used when there's risk of poaching
4. Export Control: Compliance with export control laws, needed when dealing with regulated technologies or international transfers
5. Marking Requirements: Requirements for marking confidential information, used in situations requiring formal designation processes
6. Competitive Activities: Provisions regarding competitive activities, used when parties are competitors
7. Information Security Standards: Specific security standards compliance requirements, used for highly sensitive information
1. Schedule 1 - Specified Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Authorized Representatives: List of authorized representatives who may access confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols for handling confidential information
4. Schedule 4 - Permitted Purpose Details: Detailed description of the permitted purpose for using confidential information
5. Appendix A - Data Processing Requirements: GDPR-specific requirements and procedures for processing personal data
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
