Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the contracting parties with full legal names and registered addresses
2. Background: Context of the agreement and brief description of the parties' business relationship
3. Definitions and Interpretation: Definitions of key terms used throughout the agreement and rules of interpretation
4. Services: Detailed description of services to be provided, including scope and deliverables
5. Term and Termination: Duration of the agreement, renewal provisions, and circumstances for termination
6. Fees and Payment: Payment terms, fee structure, invoicing procedures, and payment schedules
7. Service Provider's Obligations: Key responsibilities and commitments of the service provider
8. Client's Obligations: Key responsibilities and commitments of the client
9. Service Levels: Performance standards, metrics, and quality requirements
10. Intellectual Property Rights: Ownership and usage rights of pre-existing and created IP
11. Confidentiality: Protection and handling of confidential information
12. Data Protection: GDPR compliance and data handling requirements
13. Liability and Indemnification: Limitation of liability and indemnification obligations
14. Force Majeure: Provisions for unforeseen circumstances affecting performance
15. General Provisions: Standard boilerplate clauses including notices, assignment, and governing law
1. Change Control: Procedures for managing changes to services or agreement terms - include for complex or long-term service arrangements
2. Insurance: Specific insurance requirements - include when services involve significant risks or regulatory requirements
3. Compliance with Laws: Specific regulatory compliance obligations - include for regulated industries or services
4. Anti-Bribery and Corruption: Anti-corruption provisions - include for international services or high-value contracts
5. Business Continuity: Disaster recovery and business continuity requirements - include for critical services
6. Security Requirements: Specific security protocols and requirements - include for services involving sensitive data or systems
7. Personnel: Requirements for service provider's personnel - include when specific qualifications or vetting is required
8. Audit Rights: Client's rights to audit service provider - include for regulated services or critical business functions
9. Exit Management: Procedures for contract termination and transition - include for complex or business-critical services
10. Environmental Compliance: Environmental standards and requirements - include for services with environmental impact
1. Schedule 1 - Service Description: Detailed specifications of services, methodologies, and deliverables
2. Schedule 2 - Service Levels and KPIs: Detailed performance metrics, measurement methods, and reporting requirements
3. Schedule 3 - Fees and Payment Schedule: Detailed fee structure, rates, and payment milestones
4. Schedule 4 - Key Personnel: List of key personnel and their roles/responsibilities
5. Schedule 5 - Data Processing Agreement: Detailed GDPR-compliant data processing terms and requirements
6. Schedule 6 - Change Control Procedure: Detailed process for requesting and implementing changes
7. Schedule 7 - Security Requirements: Detailed security protocols, standards, and compliance requirements
8. Schedule 8 - Business Continuity Plan: Detailed disaster recovery and business continuity procedures
9. Appendix A - Form of Change Order: Template for documenting and approving changes
10. Appendix B - Service Report Template: Standard format for service performance reporting
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
