Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides details of the contracting parties - the lessor (staffing company) and lessee (client company)
2. Background: Explains the context of the agreement, including the lessor's business of providing staffing services and the lessee's requirement for temporary staff
3. Definitions: Defines key terms used throughout the agreement, including 'Leased Employees', 'Services', 'Term', etc.
4. Scope of Services: Details the employee leasing services to be provided, including recruitment, deployment, and management of leased employees
5. Term and Termination: Specifies the duration of the agreement and conditions for termination
6. Rights and Obligations of the Lessor: Outlines the staffing company's responsibilities including employee management, payroll, and statutory compliance
7. Rights and Obligations of the Lessee: Defines the client company's responsibilities including workplace safety, day-to-day supervision, and payment obligations
8. Payment Terms: Details the fee structure, billing process, and payment schedule
9. Statutory Compliance: Addresses compliance with labor laws, social security regulations, and other applicable legislation
10. Confidentiality: Provisions for protecting confidential information of all parties
11. Indemnification: Mutual indemnification clauses covering various risks and liabilities
12. Dispute Resolution: Procedures for resolving disputes between parties
13. Governing Law: Specifies Indian law as the governing law and jurisdiction
1. Insurance Requirements: Additional insurance coverage requirements beyond statutory obligations - used when specific industry risks need to be covered
2. Intellectual Property Rights: Provisions for IP protection - included when leased employees may be involved in creative or technical work
3. Non-Compete and Non-Solicitation: Restrictions on competitive activities - used when employees have access to sensitive business information
4. Performance Standards: Specific performance metrics and evaluation criteria - included when service levels need to be strictly monitored
5. Training and Development: Provisions for employee training - used when specific skills or certifications are required
6. Transition Services: Procedures for transitioning employees - included when there's potential for permanent hiring
7. Force Majeure: Provisions for unforeseen circumstances - particularly relevant post-COVID
8. Data Protection: Specific data privacy requirements - included when handling sensitive personal or business data
1. Schedule A - Employee Details: List of leased employees with their designations, qualifications, and deployment details
2. Schedule B - Fee Structure: Detailed breakdown of service fees, markup percentages, and additional charges
3. Schedule C - Statutory Benefits: List of statutory benefits and allocation of responsibilities between lessor and lessee
4. Schedule D - Service Level Requirements: Specific performance metrics, reporting requirements, and service standards
5. Schedule E - Compliance Checklist: List of applicable laws and compliance requirements with responsibility matrix
6. Appendix 1 - Standard Operating Procedures: Detailed procedures for employee management, timekeeping, and issue resolution
7. Appendix 2 - Required Documentation: List of mandatory documents to be maintained for statutory compliance
8. Appendix 3 - Incident Reporting Format: Templates for reporting workplace incidents, grievances, or compliance issues
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
