Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the employer/principal and the personal assistant with full legal names and addresses
2. Background: Context of the PA role and the need for confidentiality
3. Definitions: Definitions of key terms including 'Confidential Information', 'Trade Secrets', 'Personal Data', and 'Permitted Purpose'
4. Scope of Confidentiality: Detailed description of what constitutes confidential information in the PA context
5. Confidentiality Obligations: Core obligations of the PA regarding maintaining confidentiality and permitted uses of information
6. Security Measures: Specific measures the PA must take to protect confidential information
7. Duration of Obligations: Period during which confidentiality obligations remain in force
8. Return of Confidential Information: Requirements for returning or destroying confidential information upon termination
9. Breach and Remedies: Consequences of breaching the agreement and available remedies
10. General Provisions: Standard contract clauses including governing law, jurisdiction, and entire agreement
1. Digital Security Protocols: Specific requirements for handling digital information, recommended when PA has access to digital systems
2. Third Party Disclosure: Rules for sharing information with authorized third parties, needed when PA must interact with other service providers
3. Social Media Policy: Guidelines for social media usage, important when PA handles social media accounts
4. International Travel: Special provisions for protecting information during international travel, needed for PAs who travel with principal
5. Family Members: Provisions regarding confidentiality about family members, essential when PA works with family matters
6. Intellectual Property: Provisions for handling IP-related information, needed when PA works with creative or technical projects
1. Schedule 1: Categories of Confidential Information: Detailed list of types of confidential information the PA will have access to
2. Schedule 2: Security Procedures: Specific procedures for handling different types of confidential information
3. Schedule 3: Authorized Contacts: List of people with whom confidential information can be shared
4. Appendix A: Acknowledgment Form: Form for PA to sign acknowledging receipt of confidential information
5. Appendix B: Information Return Checklist: Checklist for returning/destroying confidential information upon termination
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
