Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party (typically the company) and receiving party (the supplier), including full legal names, registration details, and addresses
2. Background: Context of the relationship between parties and purpose of sharing confidential information
3. Definitions: Key terms including 'Confidential Information', 'Permitted Purpose', 'Permitted Recipients', 'Trade Secrets', and 'Affiliate'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information, including explicit inclusions and exclusions
5. Obligations of Confidentiality: Core confidentiality obligations, standards of care, and security measures required
6. Permitted Disclosures: Circumstances under which confidential information may be shared with Permitted Recipients and associated obligations
7. Term and Survival: Duration of the agreement and which obligations survive termination
8. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
9. Breach and Remedies: Consequences of breach, including remedies and enforcement rights
10. General Provisions: Standard clauses including governing law, jurisdiction, entire agreement, and amendments
1. Data Protection Compliance: Required when confidential information includes personal data, addressing GDPR requirements and data processing obligations
2. Intellectual Property Rights: Include when confidential information contains or relates to IP rights, clarifying ownership and usage rights
3. Export Control: Necessary when confidential information may be subject to export control regulations
4. Non-Solicitation: Optional restrictions on soliciting employees or customers, common in supplier relationships
5. Audit Rights: Include for high-sensitivity information or regulated industries, allowing verification of compliance
6. Insurance Requirements: Required for high-value or high-risk confidential information
7. Force Majeure: Include when long-term confidentiality obligations might be affected by extraordinary circumstances
1. Schedule 1 - Description of Permitted Purpose: Detailed description of the specific purposes for which confidential information may be used
2. Schedule 2 - Security Measures: Technical and organizational measures required for protecting confidential information
3. Schedule 3 - Permitted Recipients: List of authorized individuals or categories of individuals who may access the confidential information
4. Appendix A - Forms: Standard forms including confidentiality undertakings for Permitted Recipients and destruction certificates
Find the document you need
Non Disclosure Agreement For Suppliers
Dutch law-governed Non-Disclosure Agreement for protecting confidential information shared with suppliers and their associated parties.
Agreement Between Supplier And Buyer
Dutch law-governed agreement establishing terms and conditions between a supplier and buyer for the supply of goods or services.
Vendor Supplier Agreement
Dutch law-governed agreement establishing terms and conditions between a business and its supplier for goods/services provision.
Agreement Between Customer And Supplier
Dutch law-governed agreement establishing terms and conditions between a customer and supplier for commercial goods/services provision.
Master Vendor Agreement
A Dutch law-governed framework agreement establishing terms and conditions for ongoing vendor-customer relationships, including ordering, delivery, and payment terms.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
