Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Acceptable Use Agreement
"I need an Acceptable Use Agreement for my new educational technology platform launching in March 2025, which will be used by New Zealand schools and needs strong privacy protections for student data and specific content moderation rules for under-18 users."
1. Parties: Identifies the service provider and the user, including their legal status and contact details
2. Background: Brief context about the service and purpose of the agreement
3. Definitions: Defines key terms used throughout the agreement
4. Scope of Agreement: Outlines what services are covered by the agreement
5. User Obligations: Core acceptable use requirements and user responsibilities
6. Prohibited Activities: Specific actions and behaviors that are not permitted
7. Privacy and Data Protection: How user data is collected, stored, and used, complying with Privacy Act 2020
8. Security Requirements: Security measures users must comply with
9. Monitoring and Enforcement: How compliance is monitored and violations addressed
10. Consequences of Breach: Actions that may be taken in response to violations
11. Term and Termination: Duration of agreement and circumstances for termination
12. General Provisions: Standard legal clauses including governing law, jurisdiction, and amendments
1. Content Rights and Licensing: Required when users can upload or create content, addressing intellectual property rights
2. Third-Party Services: Needed when the service integrates with or relies on third-party platforms
3. Service Level Commitments: Include when specific service levels or availability guarantees are offered
4. API Usage Terms: Required when providing API access to users
5. Educational/Institutional Use: Specific terms for educational or institutional users
6. Commercial Use Restrictions: Additional terms for commercial users or restrictions on commercial use
7. Geographic Restrictions: Include when service access is restricted to specific regions
1. Technical Requirements: Detailed technical specifications and requirements for using the service
2. Acceptable Use Examples: Specific examples of acceptable and unacceptable use cases
3. Fee Schedule: If applicable, breakdown of fees and charges
4. Security Standards: Detailed security protocols and requirements
5. Data Processing Details: Specific information about data collection, processing, and storage methods
6. Incident Response Procedures: Detailed procedures for handling security incidents or breaches
Authors
Account
Administrator
Authorized User
Bandwidth
Business Day
Confidential Information
Content
Credentials
Data
Digital Service
Effective Date
Emergency Maintenance
End User
Harm
Intellectual Property Rights
Login Details
Malicious Code
Network
Personal Information
Platform
Privacy Policy
Prohibited Content
Protected Data
Security Breach
Security Requirements
Service
Service Provider
System
Terms of Service
Third Party Content
Unauthorized Access
User
User Content
User Data
User Interface
Virus
Website
User Registration
Account Security
Acceptable Use
Prohibited Activities
Data Protection
Privacy
User Content
Intellectual Property
Service Availability
System Security
Monitoring Rights
Usage Restrictions
Password Security
Third Party Access
Content Standards
Data Storage
Breach Notification
Service Suspension
Termination Rights
Liability
Indemnification
Force Majeure
Dispute Resolution
Governing Law
Amendment Rights
Notice Requirements
Assignment
Severability
Entire Agreement
Technology
E-commerce
Education
Healthcare
Financial Services
Professional Services
Media and Entertainment
Telecommunications
Cloud Services
Software Development
Digital Marketing
Online Gaming
Social Media
Legal
Information Technology
Compliance
Security
Product Development
Customer Support
Risk Management
Operations
Privacy
Digital Operations
Platform Management
Chief Technology Officer
Legal Counsel
Compliance Officer
IT Security Manager
Product Manager
System Administrator
Privacy Officer
Risk Manager
Digital Services Manager
Customer Success Manager
Information Security Officer
Operations Manager
User Experience Manager
Platform Administrator
Find the exact document you need
Email And Internet Usage Policy
A New Zealand-compliant workplace policy governing email and internet usage, aligned with local privacy and employment laws.
Acceptable Use Agreement
A New Zealand-compliant agreement defining acceptable use terms for digital services, including user obligations and compliance requirements.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.