Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Letter Date and Reference: The date of issuance and any reference number for the authorization letter
2. Authorizing Party Details: Full name, identification number, and contact details of the person giving permission
3. Authorized Party Details: Full name, identification number, and contact details of the person being authorized to collect
4. Purpose Statement: Clear statement of the authorization being granted and its purpose
5. Scope of Authorization: Specific details of what can be collected and from where
6. Duration of Authority: Clear statement of the time period for which the authorization is valid
7. Authentication: Signature of the authorizing party and any required witnessing details
1. Special Instructions: Used when specific handling or collection procedures need to be followed
2. Multiple Location Authorization: Include when collections are authorized from multiple locations or entities
3. Identification Requirements: When specific forms of identification must be presented during collection
4. Emergency Contact Information: Include when alternate contacts need to be provided for urgent situations
5. Limitations of Authority: When specific restrictions or conditions need to be placed on the authorization
1. Schedule A - List of Items: Detailed list of specific items authorized for collection, if applicable
2. Schedule B - Collection Locations: List of addresses and contact details for all collection points
3. Appendix 1 - Required Documentation: Copies of identification documents or other required supporting documentation
4. Appendix 2 - Authorization Procedures: Step-by-step procedures for the collection process if complex instructions are needed
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
