Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the organization implementing the policy and the scope of individuals/entities to whom it applies
2. Background: Context of the policy implementation and its importance to the organization
3. Definitions: Clear definitions of key terms including 'Confidential Information', 'Trade Secrets', 'Authorized Personnel', etc.
4. Scope and Purpose: Detailed explanation of what the policy aims to achieve and its application scope
5. Classification of Confidential Information: Categories of confidential information and their respective security levels
6. Confidentiality Obligations: Core obligations regarding the protection and non-disclosure of confidential information
7. Security Measures: Required procedures and measures for protecting confidential information
8. Authorized Access and Disclosure: Rules and procedures for accessing and sharing confidential information
9. Data Protection Compliance: Compliance requirements with Malaysian Personal Data Protection Act 2010
10. Breach Reporting: Procedures for reporting and handling confidentiality breaches
11. Duration of Obligations: Timeframe for which confidentiality obligations remain in effect
12. Return or Destruction of Confidential Information: Procedures for handling confidential information upon termination or request
13. Enforcement and Disciplinary Actions: Consequences of policy violations and enforcement procedures
1. International Data Transfer: Additional requirements for international transfer of confidential information, needed if organization operates across borders
2. Digital Security Protocols: Specific IT and digital security measures, relevant for organizations with significant digital assets
3. Third Party Contractors: Specific provisions for handling confidential information with external contractors and service providers
4. Remote Working Provisions: Special measures for protecting confidential information during remote work, needed if organization allows remote working
5. Industry-Specific Requirements: Additional requirements specific to regulated industries (e.g., healthcare, financial services)
6. Intellectual Property Protection: Specific provisions for protecting IP-related confidential information, needed if organization has significant IP assets
1. Schedule A - Categories of Confidential Information: Detailed list and examples of what constitutes confidential information within the organization
2. Schedule B - Security Protocols: Detailed technical and procedural security measures for different types of confidential information
3. Schedule C - Authorized Personnel: List of roles and positions authorized to access different levels of confidential information
4. Schedule D - Confidentiality Acknowledgment Form: Template form for employees/contractors to acknowledge policy understanding and compliance
5. Appendix 1 - Incident Response Plan: Detailed procedures for responding to confidentiality breaches
6. Appendix 2 - Data Classification Guide: Detailed guidelines for classifying different types of information
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
