Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies the employer company and the IT employee who are entering into the agreement
2. Background: Explains the context of the agreement and the nature of the employment relationship
3. Definitions: Defines key terms including 'Confidential Information', 'Trade Secrets', 'Intellectual Property', 'Systems', and 'Security Protocols'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the IT context, including source code, databases, system architectures, security measures, and client data
5. Employee Obligations: Core confidentiality obligations including data handling, security protocols, and prohibited activities
6. Security Measures: Specific security protocols and measures the employee must follow when handling confidential information
7. Intellectual Property Rights: Provisions regarding ownership and protection of IP created or accessed during employment
8. Duration of Obligations: Specifies how long the confidentiality obligations remain in force during and after employment
9. Return of Confidential Information: Requirements for returning or destroying confidential information upon employment termination
10. Breach and Consequences: Details the consequences of breaching the agreement and available remedies
11. Governing Law and Jurisdiction: Specifies Nigerian law as governing law and sets jurisdiction for disputes
1. Remote Work Provisions: Additional security and confidentiality measures specific to remote working arrangements
2. Third Party Disclosure: Procedures for handling authorized disclosures to third parties when required for work
3. Personal Device Usage: Rules regarding use of personal devices for work purposes and associated security requirements
4. International Data Transfer: Provisions for handling international data transfers if the employee works with overseas clients or systems
5. Non-Competition: Restrictions on working with competitors during and after employment
6. Monitoring and Audit: Company's rights to monitor system usage and conduct security audits
7. Training Requirements: Obligations to complete security and confidentiality training programs
1. Schedule 1 - Specified Confidential Information: Detailed list of specific types of confidential information the employee will have access to
2. Schedule 2 - Security Protocols: Detailed technical security procedures and requirements
3. Schedule 3 - Approved Software and Systems: List of approved software, systems, and tools for handling confidential information
4. Appendix A - Acknowledgment Form: Form for employee to acknowledge receipt and understanding of the agreement
5. Appendix B - Exit Checklist: Checklist for ensuring all confidential information is returned upon employment termination
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
