Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party (typically the company) and receiving party (the client), including full legal names, registration numbers, and registered addresses
2. Background: Brief context of the business relationship and purpose of sharing confidential information
3. Definitions: Detailed definitions of key terms, especially 'Confidential Information', 'Permitted Purpose', 'Representatives', and 'Authorized Recipients'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations, including use restrictions, security measures, and standard of care
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees, advisors, or as required by law
7. Term and Survival: Duration of the agreement and which obligations survive termination
8. Return or Destruction of Confidential Information: Requirements for handling confidential information upon termination or request
9. Breach and Remedies: Consequences of breach, including injunctive relief and damages
10. General Provisions: Standard contract clauses including governing law, jurisdiction, entire agreement, and amendments
1. Intellectual Property Rights: Section clarifying ownership and protection of IP rights - include when confidential information involves patents, trademarks, or other IP
2. Data Protection Compliance: Specific obligations under PDPA 2010 - include when personal data will be shared
3. Non-Solicitation: Restrictions on soliciting employees or clients - include for strategic client relationships
4. Security Measures: Specific technical and organizational measures required - include for highly sensitive information or regulated industries
5. Publicity and Announcements: Restrictions on public statements about the relationship - include for high-profile clients
6. Export Control: Compliance with export control laws - include when dealing with international clients or regulated technology
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of confidential information covered by the agreement
2. Schedule 2 - Authorized Recipients: List of individuals or roles authorized to receive confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols for handling confidential information, if required
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
