Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing and receiving parties, including registration numbers for companies
2. Background: Context of the relationship and purpose of sharing confidential information
3. Definitions: Key terms including 'Confidential Information', 'Representatives', 'Permitted Purpose'
4. Confidentiality Obligations: Core obligations regarding protection and non-disclosure of confidential information
5. Permitted Disclosures: Circumstances under which confidential information may be shared with representatives or as required by law
6. Protection Measures: Specific security measures required to protect confidential information
7. Return or Destruction: Obligations regarding the return or destruction of confidential information upon termination
8. Duration and Termination: Term of the agreement and survival of obligations
9. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
10. General Provisions: Standard provisions including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Specific provisions regarding IP ownership and rights, particularly relevant for technology startups
2. Data Protection: Additional provisions when personal data is involved, ensuring PDPA compliance
3. Non-Solicitation: Restrictions on soliciting employees or customers, important for protecting human capital
4. Reverse Engineering: Prohibitions on reverse engineering, particularly relevant for software or technology startups
5. Export Control: Compliance with export control laws, relevant for international operations
6. Competition Law Compliance: Ensures compliance with Malaysian Competition Act, particularly for market-sensitive information
1. Schedule 1 - Description of Confidential Information: Detailed description or categories of information considered confidential
2. Schedule 2 - Authorized Representatives: List of authorized representatives who may access confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols for handling confidential information
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
