Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Enterprise License Agreement
"I need an Enterprise License Agreement for a cloud-based CRM software deployment across our financial services company with 5,000 users, including specific GDPR compliance requirements and source code escrow provisions for business continuity."
1. Parties: Identification of the contracting parties including full legal names, registration details, and addresses
2. Background: Context of the agreement and brief description of the parties' business relationship
3. Definitions: Definitions of key terms used throughout the agreement, including Software, Licensed Users, Enterprise, Documentation
4. License Grant: Scope of the license, including type, territory, and any restrictions on use
5. License Restrictions: Specific prohibitions and limitations on the use of the software
6. Delivery and Implementation: Terms regarding software delivery, installation, and acceptance procedures
7. Enterprise User Management: Rules for managing user access, authentication, and license allocation within the enterprise
8. Fees and Payment: Commercial terms including license fees, payment schedule, and payment terms
9. Intellectual Property Rights: IP ownership, protection, and related warranties
10. Data Protection: GDPR compliance and data processing terms
11. Confidentiality: Protection of confidential information and trade secrets
12. Warranties: Software performance warranties and disclaimers
13. Liability and Indemnification: Limitation of liability and indemnification obligations
14. Term and Termination: Duration of agreement, renewal terms, and termination rights
15. Post-Termination: Obligations and rights after contract termination
16. General Provisions: Standard legal provisions including governing law, jurisdiction, entire agreement, and amendment procedures
1. Professional Services: Include when the vendor provides implementation, training, or consulting services
2. Service Levels: Include when specific performance metrics and service levels are required
3. Disaster Recovery: Include for business-critical software requiring specific recovery procedures
4. Security Requirements: Include when specific security standards or certifications are required
5. Audit Rights: Include when the licensor requires rights to audit compliance
6. Source Code Escrow: Include when source code escrow arrangements are required
7. Export Control: Include when software is subject to export control regulations
8. Third-Party Software: Include when the solution incorporates third-party components
9. Custom Development: Include when custom development or modifications are part of the agreement
10. Hardware Requirements: Include when specific hardware requirements are essential for software operation
1. Schedule 1 - Software Description: Detailed description of licensed software, modules, and functionality
2. Schedule 2 - Technical Requirements: Hardware, software, and network requirements for the software
3. Schedule 3 - Service Levels: Detailed service level agreements and performance metrics
4. Schedule 4 - Support and Maintenance: Support services, maintenance terms, and procedures
5. Schedule 5 - Fee Schedule: Detailed breakdown of license fees, payment schedules, and pricing terms
6. Schedule 6 - Implementation Plan: Project plan for software implementation and deployment
7. Schedule 7 - Security Requirements: Detailed security standards and compliance requirements
8. Schedule 8 - Data Processing Agreement: GDPR-compliant data processing terms and procedures
9. Appendix A - Authorized Users: Categories and numbers of authorized users
10. Appendix B - Approved Affiliates: List of enterprise affiliates authorized to use the software
Authors
Affiliate
Authorized Users
Business Day
Confidential Information
Configuration
Contract Year
Customer Data
Documentation
Effective Date
Enterprise
Error
Fees
Force Majeure
GDPR
Implementation Services
Intellectual Property Rights
License Key
Licensed Software
Maintenance Release
Major Release
Malicious Code
Modifications
Normal Business Hours
Personal Data
Processing
Professional Services
Security Breach
Service Levels
Software
Source Code
Specifications
Support Services
System Requirements
Term
Territory
Third-Party Software
Updates
Upgrades
User Acceptance Testing
User Documentation
Virus
Work Product
License Restrictions
Intellectual Property Rights
Data Protection
Confidentiality
Warranties
Indemnification
Limitation of Liability
Payment Terms
Service Levels
Support and Maintenance
Implementation
Acceptance Testing
User Management
Security Requirements
Audit Rights
Term and Termination
Force Majeure
Assignment
Governing Law
Dispute Resolution
Notices
Entire Agreement
Severability
Amendment
Non-Solicitation
Export Control
Insurance
Compliance with Laws
Third-Party Rights
Source Code Escrow
Business Continuity
Anti-Corruption
Competition Law Compliance
Information Technology
Financial Services
Healthcare
Manufacturing
Retail
Telecommunications
Professional Services
Education
Government
Energy
Transportation
Media and Entertainment
Insurance
Pharmaceuticals
Legal
Information Technology
Procurement
Information Security
Compliance
Finance
Risk Management
Software Asset Management
Vendor Management
Enterprise Architecture
Data Protection
Operations
Chief Information Officer
Chief Technology Officer
Chief Legal Officer
General Counsel
IT Director
Software Procurement Manager
Enterprise Architect
Legal Counsel
Procurement Director
Information Security Officer
Data Protection Officer
IT Contract Manager
Software Asset Manager
Vendor Management Director
Technology Procurement Specialist
Compliance Officer
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.