Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies the Disclosing Party and Receiving Party with full legal names and addresses
2. Background: Explains the context and purpose of the NDA, including the nature of the business relationship
3. Definitions: Defines key terms including 'Confidential Information', 'Representatives', 'Permitted Purpose'
4. Disclosure of Confidential Information: Establishes the scope and manner of information disclosure
5. Obligations of Confidentiality: Details the receiving party's obligations regarding confidential information
6. Permitted Disclosures: Specifies circumstances under which confidential information may be disclosed
7. Return or Destruction of Confidential Information: Requirements for handling confidential information upon agreement termination
8. Duration of Obligations: Specifies the term of the agreement and survival of obligations
9. Remedies: Outlines available remedies in case of breach
10. Governing Law and Jurisdiction: Specifies Malaysian law as governing law and jurisdiction for disputes
1. Intellectual Property Rights: Include when confidential information includes IP - clarifies ownership and rights
2. Data Protection: Include when personal data may be part of confidential information
3. Security Measures: Include when specific security protocols for handling information are required
4. Non-Solicitation: Include when there's risk of employee poaching
5. Publicity: Include when there's need to restrict public announcements about the relationship
6. Force Majeure: Include when long-term relationship requires protection against unforeseen events
7. Assignment: Include when transfer of rights needs to be restricted
8. Costs: Include when specific cost allocation for compliance needs to be addressed
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of information covered by the NDA
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive confidential information
3. Schedule 3 - Security Protocols: Specific security measures for handling confidential information
4. Appendix A - Form of Acknowledgment: Template for additional parties to acknowledge NDA terms
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
