Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and defines the parties to the agreement, including their registered addresses and company details
2. Background: Sets out the context and purpose of the agreement, including the nature of the business relationship
3. Definitions: Defines key terms including 'Confidential Information', 'Representatives', 'Permitted Purpose', and other relevant terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations, including duty to maintain secrecy and permitted uses
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to representatives and professional advisors
7. Security Measures: Required measures to protect and safeguard confidential information
8. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
9. Duration and Survival: Term of the agreement and which obligations survive termination
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Data Protection Compliance: Required when confidential information includes personal data subject to GDPR
2. Employee and Contractor Obligations: Used when the receiving party needs to ensure compliance by its employees and contractors
3. Reverse Engineering Prohibition: Important for technical or product-related confidential information
4. Non-Solicitation Provisions: Optional protection against hiring of employees or solicitation of customers
5. Publicity and Announcements: Controls on public statements about the business relationship
6. Competition Law Compliance: Required when parties are competitors or in regulated industries
7. Assignment and Succession: Used when transfer rights need to be specifically addressed
8. Independent Development: Protects receiving party's right to develop similar information independently
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures required
4. Schedule 4 - Permitted Purpose: Detailed description of the permitted use of confidential information
5. Appendix A - Form of Confidentiality Undertaking: Template confidentiality agreement for representatives/employees
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
