Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification and details of all parties entering into the agreement
2. Background: Context of the agreement and relationship between the parties
3. Definitions: Detailed definitions of key terms, especially 'Confidential Information', 'Permitted Purpose', and other critical concepts
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations, including non-disclosure, non-use, and security measures
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees and professional advisors
7. Protection of Confidential Information: Specific measures required to protect confidential information
8. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination
9. Duration and Termination: Term of the agreement and survival of obligations
10. Breach and Remedies: Consequences of breach and available remedies
11. Governing Law and Jurisdiction: Specification of Nigerian law as governing law and jurisdiction for disputes
1. Non-Competition: Additional restrictions on competitive activities, used when there's specific concern about competition
2. Non-Solicitation: Restrictions on soliciting employees or customers, included when business relationships need protection
3. Data Protection Compliance: Specific provisions for compliance with NDPR 2019, included when personal data is involved
4. Intellectual Property Rights: Additional provisions protecting IP rights, used when IP is particularly relevant
5. Assignment and Succession: Rules about transferring rights under the agreement, included for complex commercial relationships
6. Force Majeure: Provisions for unforeseen circumstances, included in longer-term NDAs
7. Alternative Dispute Resolution: Mediation or arbitration provisions, included when parties prefer alternative dispute resolution
1. Schedule 1 - Specified Purpose: Detailed description of the permitted purpose for which confidential information may be used
2. Schedule 2 - Categories of Confidential Information: Specific listing of types or categories of confidential information covered
3. Schedule 3 - Authorized Representatives: List of individuals authorized to receive confidential information
4. Schedule 4 - Security Measures: Detailed security protocols and measures required for protecting confidential information
5. Appendix A - Form of Confidentiality Undertaking: Template confidentiality undertaking for employees or third parties who need access to information
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
