Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Shared Software License
"I need a Shared Software License agreement for an enterprise resource planning software to be used by my company and three subsidiary companies in India, with implementation starting January 2025, including specific provisions for data security and cost sharing between entities."
1. Parties: Identification of the licensor and all licensees participating in the shared license arrangement
2. Background: Context of the agreement, including the software's purpose and the basis for shared licensing
3. Definitions: Detailed definitions of technical terms, parties, software components, and other key terms used in the agreement
4. Grant of License: Scope and nature of the license being granted, including usage rights and restrictions
5. License Fee and Payment Terms: Details of licensing costs, payment schedule, and cost-sharing arrangements between licensees
6. Term and Termination: Duration of the license and conditions for termination or renewal
7. User Rights and Restrictions: Specific permissions and limitations on software usage, including user numbers and locations
8. Maintenance and Support: Terms for ongoing software maintenance, updates, and technical support
9. Intellectual Property Rights: Protection of IP rights and ownership of the software and derivative works
10. Warranties and Representations: Guarantees regarding software performance, ownership, and non-infringement
11. Limitation of Liability: Limits on liability and indemnification provisions
12. Confidentiality: Protection of confidential information and trade secrets
13. Governing Law and Jurisdiction: Applicable law and jurisdiction for dispute resolution
14. General Provisions: Standard boilerplate clauses including notices, assignment, and severability
1. Data Protection and Privacy: Required when the software processes personal data or when compliance with specific data protection regulations is needed
2. Source Code Escrow: Optional provision for source code protection through third-party escrow services
3. Geographic Restrictions: Needed when the license has territorial limitations or specific jurisdictional requirements
4. Third-Party Software: Required when the software incorporates third-party components or dependencies
5. Export Control: Necessary when the software is subject to export control regulations
6. Training and Implementation: Include when the agreement covers initial setup and user training services
7. Service Level Agreement: Optional section defining performance metrics and service standards
8. Disaster Recovery: Required for critical software implementations requiring business continuity provisions
1. Schedule A - Software Description: Detailed technical specifications and components of the licensed software
2. Schedule B - License Fee Structure: Breakdown of licensing costs, payment terms, and cost allocation between licensees
3. Schedule C - Service Level Requirements: Technical performance standards, response times, and support levels
4. Schedule D - Authorized Users: List of authorized users or user categories and their access rights
5. Schedule E - Technical Requirements: Minimum system requirements and technical specifications for software operation
6. Appendix 1 - Support and Maintenance Procedures: Detailed procedures for obtaining technical support and maintenance services
7. Appendix 2 - Security Requirements: Security protocols and requirements for software usage and data protection
8. Appendix 3 - Acceptance Testing Criteria: Criteria and procedures for software acceptance testing
Authors
Authorized Users
Business Day
Confidential Information
Documentation
Effective Date
Force Majeure
Intellectual Property Rights
License Fee
License Period
Licensed Software
Licensee Group
Maintenance Services
Primary Licensee
Secondary Licensees
Service Level Agreement
Software Updates
Source Code
Support Services
System Requirements
Technical Specifications
Territory
Third-Party Software
User Access Levels
Implementation Period
Acceptance Testing
Critical Defect
Data Protection Laws
Disaster Recovery Plan
Escrow Agreement
Installation Site
License Metrics
Maintenance Window
Operating Environment
Performance Standards
Related Applications
Security Requirements
Shared Resources
Software Interface
Usage Reports
User Authentication
Version Release
Working Hours
License Grant
Payment Terms
Usage Rights
Access Control
Service Levels
Performance Standards
Maintenance and Support
Confidentiality
Data Protection
Intellectual Property
Warranties
Indemnification
Limitation of Liability
Term and Termination
Force Majeure
Assignment
Dispute Resolution
Governing Law
Technical Requirements
Security
Audit Rights
Compliance
Documentation
Training
Implementation
Updates and Upgrades
User Management
Cost Allocation
Third-Party Rights
Export Control
Source Code
Business Continuity
Notice
Severability
Entire Agreement
Information Technology
Banking and Financial Services
Healthcare
Manufacturing
Retail
Education
Professional Services
Telecommunications
Government and Public Sector
Insurance
E-commerce
Logistics and Supply Chain
Legal
Information Technology
Procurement
Compliance
Finance
Risk Management
Information Security
Operations
Software Asset Management
Vendor Management
Chief Technology Officer
IT Director
Legal Counsel
Procurement Manager
Software Licensing Manager
Compliance Officer
Information Security Manager
Contract Manager
Chief Information Officer
IT Operations Manager
Enterprise Architect
Chief Financial Officer
Risk Manager
Technology Procurement Specialist
Software Asset Manager
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.