Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the employer company and the employee, including full legal names and addresses
2. Background: Context of the agreement, including the employee's role and reason for access to confidential information
3. Definitions: Clear definitions of key terms, especially 'Confidential Information', 'Trade Secrets', and 'Intellectual Property'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information within the organization
5. Confidentiality Obligations: Core obligations of the employee regarding the handling and protection of confidential information
6. Permitted Uses and Disclosures: Circumstances under which confidential information may be used or disclosed
7. Security Measures: Specific measures the employee must take to protect confidential information
8. Duration of Obligations: Period during which confidentiality obligations remain in effect, including post-employment
9. Return of Confidential Information: Requirements for returning or destroying confidential information upon employment termination
10. Breach and Remedies: Consequences of breaching the agreement and available remedies
11. Governing Law: Specification of Malaysian law as the governing law and jurisdiction
1. Non-Solicitation: Restrictions on soliciting other employees or customers, included when business relationships need additional protection
2. Non-Competition: Restrictions on competing activities, used when permitted under Malaysian law and necessary for business protection
3. Intellectual Property Rights: Additional provisions regarding IP created during employment, used when employee role involves creative or innovative work
4. Third Party Information: Specific obligations regarding information belonging to third parties, used when employee will handle customer or partner data
5. Data Protection Obligations: Specific provisions relating to personal data protection, included when employee handles personal data
6. Audit Rights: Company's right to audit employee's compliance, included for highly sensitive positions
7. Survival Clause: Specification of which provisions survive termination, included for enhanced post-employment protection
1. Schedule 1 - Categories of Confidential Information: Detailed list of types and categories of confidential information covered
2. Schedule 2 - Security Procedures: Specific security protocols and procedures to be followed
3. Schedule 3 - Authorized Persons: List of persons or roles with whom confidential information may be shared
4. Appendix A - Acknowledgment Form: Form for employee to acknowledge receipt and understanding of confidential information
5. Appendix B - Information Return Form: Checklist and form for returning confidential information upon termination
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
