Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing and receiving parties, including registered addresses and company details
2. Background: Context of the agreement, relationship between parties, and purpose of sharing confidential information
3. Definitions: Detailed definitions including 'Confidential Information', 'Representatives', 'Permitted Purpose', and other key terms
4. Confidentiality Obligations: Core obligations regarding non-disclosure, non-use, and protection of confidential information
5. Permitted Disclosures: Circumstances under which confidential information may be shared with representatives or as required by law
6. Information Security Measures: Required standards and procedures for protecting confidential information
7. Return or Destruction of Information: Obligations regarding handling of confidential information upon request or termination
8. Duration and Survival: Establishment of perpetual obligations and survival of terms
9. Remedies: Rights and remedies in case of breach, including injunctive relief
10. General Provisions: Standard clauses including governing law, jurisdiction, entire agreement, and amendments
1. Intellectual Property Rights: Section clarifying ownership and protection of IP rights when confidential information includes IP - used when sharing technical information or trade secrets
2. Data Protection Compliance: Specific obligations regarding personal data protection - required when confidential information includes personal data
3. Non-Solicitation: Restrictions on soliciting employees or customers - relevant when parties are competitors or in similar industries
4. Export Control: Compliance with export control laws - needed when information may be subject to international transfer restrictions
5. Corporate Authority: Warranties regarding authority to enter agreement - important for complex corporate structures
6. Competitive Activities: Restrictions on competitive activities - relevant when parties are in same industry
1. Schedule 1 - Description of Confidential Information: Detailed categorization and description of confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals or roles authorized to receive confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures required for information protection
4. Appendix A - Form of Confidentiality Undertaking: Template undertaking for representatives who will access confidential information
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
