Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Non Standard EULA
"I need a Non-Standard EULA for enterprise-level accounting software that will be distributed to Malaysian financial institutions starting March 2025, with specific provisions for data privacy compliance and custom integration capabilities with existing banking systems."
1. Parties: Identification of the licensor (software provider) and licensee (end user), including full legal names and addresses
2. Background: Context of the agreement, nature of the software, and purpose of the license
3. Definitions: Detailed definitions of technical terms, software components, and key concepts used throughout the agreement
4. Grant of License: Scope of the license, usage rights, and any territorial or user number restrictions
5. License Fees and Payment: Details of license fees, payment terms, and any recurring charges
6. User Obligations: Licensee's responsibilities, acceptable use policies, and compliance requirements
7. Intellectual Property Rights: Declaration of IP ownership, protection measures, and handling of derivative works
8. Confidentiality: Protection of proprietary information, trade secrets, and user data
9. Data Protection and Privacy: Compliance with PDPA 2010, data handling procedures, and privacy policies
10. Warranties and Disclaimers: Software performance warranties, disclaimer of implied warranties, and limitation of liability
11. Support and Maintenance: Terms for technical support, updates, and maintenance services
12. Term and Termination: Duration of the agreement, renewal terms, and termination conditions
13. Consequences of Termination: Post-termination obligations, data handling, and software removal requirements
14. General Provisions: Standard legal clauses including governing law, dispute resolution, and entire agreement
1. Third-Party Integration: Use when software interfaces with third-party applications or services, defining integration terms and responsibilities
2. Service Level Agreement: Include for software requiring specific performance metrics, uptime guarantees, or response times
3. Custom Development: Add when the agreement covers custom modifications or development work
4. Export Control: Include for software subject to international distribution restrictions
5. Disaster Recovery: Add for critical software requiring specific backup and recovery procedures
6. Security Requirements: Include for software handling sensitive data or requiring specific security protocols
7. Training and Documentation: Add when comprehensive training or documentation is part of the license
8. Audit Rights: Include when licensor requires rights to audit licensee's use of the software
1. Schedule 1 - Software Description: Detailed technical specifications, components, and functionality of the licensed software
2. Schedule 2 - License Fees: Breakdown of all fees, payment schedules, and pricing terms
3. Schedule 3 - Service Levels: Detailed performance metrics, support levels, and response times
4. Schedule 4 - Technical Requirements: Minimum system requirements and technical specifications for software operation
5. Schedule 5 - Support Services: Detailed description of support and maintenance services provided
6. Appendix A - Acceptable Use Policy: Detailed guidelines for acceptable use of the software
7. Appendix B - Data Processing Terms: Specific terms for handling personal and sensitive data in compliance with PDPA 2010
8. Appendix C - Security Protocols: Detailed security requirements and procedures for software use and data protection
Authors
Authorized Users
Confidential Information
Documentation
Effective Date
Intellectual Property Rights
License Fee
License Term
Licensed Software
Maintenance Services
Personal Data
Security Breach
Service Levels
Software Updates
Source Code
Specification
Support Services
System Requirements
Technical Support
Territory
Third Party Software
User Data
Usage Rights
Access Credentials
Acceptance Tests
Affiliate
Authorized Device
Business Day
Business Hours
Customization
Data Protection Laws
Defect
Deliverables
Development Services
Disaster Recovery Plan
Error
Force Majeure Event
Implementation Services
Installation
Integration
License Key
Maintenance Window
Material Breach
Modifications
Operating Environment
Performance Standards
Privacy Policy
Processing
Response Time
Software Interface
Support Request
Training Services
Upgrade
User Interface
Virus
Warranty Period
License Grant
License Restrictions
Intellectual Property
Confidentiality
Data Protection
Payment Terms
Warranties
Limitation of Liability
Indemnification
Term and Termination
Force Majeure
Assignment
Governing Law
Dispute Resolution
Notices
Support Services
Maintenance
Security Requirements
Access Rights
Usage Monitoring
Audit Rights
Export Control
Software Updates
Integration
Performance Standards
Documentation
Training
Acceptance Testing
Implementation
Service Levels
Technical Requirements
Disaster Recovery
Third Party Rights
Compliance
Amendment
Severability
Entire Agreement
Information Technology
Financial Services
Healthcare
E-commerce
Manufacturing
Education
Telecommunications
Professional Services
Government and Public Sector
Retail
Media and Entertainment
Banking
Insurance
Logistics and Supply Chain
Legal
Information Technology
Compliance
Procurement
Software Development
Product Management
Risk Management
Information Security
Operations
Business Development
Vendor Management
Technical Support
Contract Administration
Legal Counsel
Software Licensing Manager
Compliance Officer
IT Director
Chief Technology Officer
Procurement Manager
Contract Manager
Software Development Manager
Chief Information Officer
Legal Operations Manager
Risk Management Officer
Information Security Manager
Product Manager
Business Development Manager
Technology Consultant
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.