Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Confidentiality Agreement For Employees
I need a Confidentiality Agreement For Employees for our Dublin-based software development company, with strong provisions for protecting source code and technical information, and specific clauses addressing remote work security protocols.
1. Parties: Identification of the employer company and the employee
2. Background: Context of the agreement, employment relationship, and reason for confidentiality obligations
3. Definitions: Define key terms including 'Confidential Information', 'Trade Secrets', 'Intellectual Property', and 'Permitted Recipients'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information within the organization
5. Employee Obligations: Specific duties and responsibilities regarding confidential information handling and protection
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including statutory rights and protected disclosures
7. Data Protection Compliance: Obligations regarding personal data handling in accordance with GDPR and Irish Data Protection Act
8. Duration of Obligations: Time period for confidentiality obligations, including post-employment
9. Return of Confidential Information: Requirements for returning or destroying confidential information upon employment termination
10. Breach and Consequences: Actions constituting breach and resulting consequences, including potential remedies
11. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Additional section when the employee will be involved in creating IP or handling sensitive technical information
2. Third Party Information: Include when employee will handle confidential information belonging to clients, customers, or business partners
3. Information Security Protocols: Detailed security measures when employee has access to highly sensitive data or IT systems
4. Non-Competition Provisions: Optional restrictions on post-employment activities, must be reasonable and limited in scope
5. Monitoring and Compliance: Include when implementing specific monitoring systems or compliance protocols
6. International Transfers: Required when employee will handle data that may be transferred outside the EEA
1. Schedule 1 - Categories of Confidential Information: Detailed list of specific types of confidential information relevant to the employee's role
2. Schedule 2 - Approved Information Security Procedures: Specific protocols for handling and protecting confidential information
3. Schedule 3 - Permitted Recipients: List of authorized persons or entities with whom confidential information may be shared
4. Appendix A - Acknowledgment Form: Form for employee to sign confirming receipt and understanding of confidentiality obligations
5. Appendix B - Exit Procedures: Checklist of steps to be followed regarding confidential information when employment ends
Authors
Company
Employee
Trade Secrets
Intellectual Property Rights
Personal Data
Processing
Permitted Purpose
Permitted Recipients
Protected Disclosure
Restricted Period
Group Companies
Business Day
Effective Date
Employment Contract
Information Security Policies
Technical Information
Commercial Information
Business Methods
Customer Data
Supplier Information
Marketing Information
Financial Information
Research and Development
Know-How
Unauthorized Disclosure
Security Breach
Termination Date
Working Hours
Company Systems
Confidentiality Obligations
Data Protection
Permitted Disclosures
Return of Information
Intellectual Property
Duration
Security Measures
Protected Disclosures
Non-Competition
Non-Solicitation
Breach Consequences
Indemnification
Survival
Severability
Assignment
Waiver
Variation
Notices
Entire Agreement
Third Party Rights
Governing Law
Jurisdiction
Technology
Financial Services
Healthcare
Professional Services
Manufacturing
Research and Development
Pharmaceuticals
Telecommunications
Retail
Education
Media and Entertainment
Biotechnology
Energy
Consulting
Legal Services
Human Resources
Legal
Information Technology
Research and Development
Executive Leadership
Finance
Sales
Marketing
Operations
Customer Support
Product Development
Administration
Information Security
Business Development
Quality Assurance
Chief Executive Officer
Chief Technology Officer
Software Developer
Human Resources Manager
Financial Controller
Research Scientist
Product Manager
Sales Representative
Marketing Director
Data Analyst
Legal Counsel
Project Manager
Systems Administrator
Business Development Manager
Executive Assistant
Operations Manager
Customer Service Representative
Technical Support Specialist
Research and Development Engineer
Administrative Assistant
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.