Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing and receiving parties, including registered addresses and company details
2. Background: Context of the agreement, relationship between parties, and purpose of sharing confidential information
3. Definitions: Definitions of key terms including 'Confidential Information', 'Representatives', 'Permitted Purpose', and 'Losses'
4. Confidentiality Obligations: Core obligations regarding the protection and non-disclosure of confidential information
5. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to representatives and as required by law
6. Security Measures: Specific measures required to protect confidential information
7. Indemnification: Specific indemnification obligations, including scope of covered losses and process for claiming
8. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
9. Term and Survival: Duration of the agreement and which provisions survive termination
10. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Additional provisions clarifying ownership and rights in confidential information, particularly relevant when IP-sensitive information is involved
2. Data Protection: Specific provisions regarding personal data protection, required when confidential information includes personal data
3. Non-Solicitation: Restrictions on soliciting employees or customers, relevant when parties have access to sensitive relationship information
4. Insurance: Requirements for insurance coverage related to indemnification obligations, relevant for high-value or high-risk information sharing
5. Competition Law Compliance: Specific provisions ensuring compliance with competition laws, relevant when parties are competitors
6. Force Majeure: Provisions addressing circumstances beyond parties' control, particularly relevant for long-term NDAs
1. Schedule 1 - Specified Confidential Information: Detailed list or categories of information considered confidential under the agreement
2. Schedule 2 - Authorized Representatives: List of individuals or roles authorized to receive confidential information
3. Schedule 3 - Security Protocols: Detailed security measures and protocols required for protecting confidential information
4. Schedule 4 - Indemnification Procedures: Detailed procedures for making and handling indemnification claims
5. Appendix A - Form of Confidentiality Undertaking: Template confidentiality agreement for representatives or third parties who need access to confidential information
Find the document you need
General NDA
Dutch law-governed non-disclosure agreement for protecting confidential information in business relationships.
Confidentiality Non Disclosure Agreement
Dutch law-governed NDA for protecting confidential information exchange between parties, incorporating Dutch Civil Code requirements and EU regulations.
Indemnity NDA
Dutch law-governed confidentiality agreement with indemnification provisions protecting against unauthorized disclosure or use of confidential information.
NDA For Software Development
Dutch law-governed NDA specifically designed for software development projects, protecting technical information and intellectual property.
Confidentiality Agreement Document
A Dutch law-governed agreement establishing confidentiality obligations and information protection requirements between parties.
Simple NDA
A Dutch law-governed non-disclosure agreement for protecting confidential information in business relationships.
Non Disclosure Contract
Dutch law-governed Non-Disclosure Agreement for protecting confidential information in business relationships, compliant with Dutch Civil Code and Trade Secrets Act.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
