Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full details of all parties entering into the agreement, including registration numbers for companies or ID numbers for individuals
2. Background: Explains the context and purpose of the agreement, including the nature of the relationship between the parties
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information', 'Authorized Purpose', and 'Representatives'
4. Scope of Confidential Information: Clearly delineates what information is considered confidential under the agreement
5. Obligations of Confidentiality: Details the core confidentiality obligations, including non-disclosure, non-use, and security measures
6. Permitted Disclosures: Specifies circumstances under which confidential information may be disclosed and to whom
7. Term and Survival: Defines the duration of the agreement and which obligations survive termination
8. Return or Destruction of Confidential Information: Procedures for handling confidential information upon termination or request
9. Breach and Remedies: Outlines consequences of breach and available remedies including injunctive relief
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Data Protection Compliance: Additional provisions for compliance with PDPA 2010 when personal data is involved
2. Intellectual Property Rights: Specific provisions regarding IP ownership and rights when proprietary technology or innovations are involved
3. Non-Competition: Additional restrictions on competitive activities, used when there's a risk of business competition
4. Non-Solicitation: Restrictions on soliciting employees or customers, typically used in business-to-business contexts
5. Digital Security Measures: Specific requirements for handling digital information, including cybersecurity protocols
6. Export Control Compliance: Required when confidential information may be subject to export control regulations
7. Force Majeure: Provisions for handling confidentiality obligations during unexpected events or emergencies
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of information considered confidential under the agreement
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures required for handling confidential information
4. Schedule 4 - Permitted Purpose: Detailed description of the authorized uses of the confidential information
5. Appendix A - Form of Acknowledgment: Template for acknowledgment to be signed by representatives who will access confidential information
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
