Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party (typically the company) and receiving party (the vendor), including full legal names and registration details
2. Background: Context of the relationship between parties and purpose of sharing confidential information
3. Definitions: Definitions of key terms including 'Confidential Information', 'Authorized Purpose', 'Authorized Personnel', and other relevant terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Confidentiality Obligations: Core obligations regarding the protection and non-disclosure of confidential information
6. Permitted Use and Disclosure: Specific circumstances under which confidential information may be used or disclosed
7. Security Measures: Required security measures for protecting confidential information
8. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination
9. Term and Termination: Duration of the agreement and termination provisions
10. Breach and Remedies: Consequences of breach and available remedies
11. Governing Law and Jurisdiction: Specification of Malaysian law as governing law and jurisdiction for disputes
1. Intellectual Property Rights: Clarification of IP ownership and rights when confidential information includes IP - used when dealing with technical or creative vendors
2. Data Protection Compliance: Specific obligations regarding personal data protection under PDPA - used when confidential information includes personal data
3. Audit Rights: Right to audit vendor's compliance with confidentiality obligations - used for high-risk or regulated industries
4. Insurance Requirements: Vendor's obligation to maintain specific insurance coverage - used for high-value or high-risk relationships
5. Subcontractors: Provisions regarding subcontractor use and corresponding confidentiality obligations - used when vendor may need to engage subcontractors
6. Force Majeure: Provisions for handling confidential information during force majeure events - used in long-term or critical vendor relationships
7. Anti-Bribery and Corruption: Specific provisions regarding anti-corruption compliance - used when dealing with government-linked entities or in regulated industries
1. Schedule 1 - Specified Confidential Information: Detailed list or categories of confidential information covered by the agreement
2. Schedule 2 - Authorized Personnel: List of vendor personnel authorized to access confidential information
3. Schedule 3 - Security Requirements: Specific technical and organizational security measures required
4. Schedule 4 - Approved Subcontractors: List of pre-approved subcontractors (if applicable)
5. Appendix A - Form of Confidentiality Undertaking: Template confidentiality undertaking for vendor personnel to sign
6. Appendix B - Information Return/Destruction Certificate: Template certificate for confirming return or destruction of confidential information
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
