Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Proprietary Software License Agreement
"I need a Proprietary Software License Agreement under New Zealand law for enterprise-level accounting software that will be deployed across multiple corporate locations, with specific provisions for data protection and source code escrow arrangements."
1. Parties: Identifies and provides full legal details of the licensor and licensee
2. Background: Explains the context of the agreement and the parties' intentions
3. Definitions: Defines key terms used throughout the agreement
4. License Grant: Specifies the scope, nature, and limitations of the software license
5. License Restrictions: Details prohibited activities and usage limitations
6. Intellectual Property Rights: Establishes ownership of IP and protection of rights
7. Payment Terms: Specifies license fees, payment schedule, and related financial terms
8. Support and Maintenance: Outlines support services, updates, and maintenance provisions
9. Warranties and Representations: States warranties provided and disclaimers
10. Confidentiality: Governs the handling and protection of confidential information
11. Term and Termination: Specifies duration, renewal, and termination conditions
12. Liability and Indemnification: Addresses limitation of liability and indemnification obligations
13. General Provisions: Contains standard legal provisions including governing law, notices, and assignment
1. Data Protection and Privacy: Required when the software processes personal data or when compliance with privacy laws is necessary
2. Third-Party Software: Needed when the licensed software incorporates third-party components
3. Export Controls: Required for software subject to export regulations or international use
4. Source Code Escrow: Optional provision for source code protection and access under specific conditions
5. Professional Services: Include when additional implementation or training services are provided
6. Service Level Agreement: Required when specific performance levels or uptime guarantees are provided
7. Audit Rights: Include when licensor requires rights to audit licensee's use of the software
8. Insurance: Include when specific insurance coverage is required from either party
1. Schedule 1 - Software Description: Detailed description of the licensed software, including versions and components
2. Schedule 2 - License Fees: Detailed breakdown of all fees, payment terms, and pricing structures
3. Schedule 3 - Technical Requirements: Specification of minimum system requirements and technical specifications
4. Schedule 4 - Support Services: Detailed description of support and maintenance services, including SLAs if applicable
5. Schedule 5 - Authorized Users: Definition and limitations of authorized users and usage parameters
6. Appendix A - Acceptable Use Policy: Detailed policies regarding acceptable use of the software
7. Appendix B - Security Requirements: Security standards and requirements for software usage
Authors
Authorized Users
Business Day
Confidential Information
Documentation
Effective Date
Error
Fees
Intellectual Property Rights
License
License Term
Licensed Software
Maintenance Release
Major Release
Minor Release
Normal Business Hours
Open Source Software
Personal Data
Privacy Laws
Proprietary Rights
Software
Source Code
Specifications
Support Services
System Requirements
Technical Requirements
Term
Territory
Third-Party Software
Updates
Upgrades
User Manual
Working Hours
Work Product
Security Breach
Service Level Agreement
Subscription Period
Background IP
Derivative Works
Development Tools
Escrow Agent
Force Majeure Event
Implementation Services
Installation Site
License Key
Maintenance Window
Permitted Purpose
Related Company
Response Time
Software Module
Support Request
Virus
Vulnerability
License Restrictions
Intellectual Property
Payment
Support and Maintenance
Service Levels
Warranties
Liability
Indemnification
Confidentiality
Term and Termination
Force Majeure
Assignment
Governing Law
Dispute Resolution
Data Protection
Security
Audit Rights
Export Control
Insurance
Notices
Amendment
Severability
Entire Agreement
Third Party Rights
Compliance with Laws
Anti-Bribery
Performance
Implementation
Training
Documentation
Acceptance Testing
Source Code Escrow
Business Continuity
Disaster Recovery
Technology
Financial Services
Healthcare
Retail
Manufacturing
Professional Services
Education
Government
Telecommunications
Media and Entertainment
Insurance
Real Estate
Construction
Energy
Transportation and Logistics
Legal
Information Technology
Procurement
Compliance
Risk Management
Commercial Operations
Vendor Management
Information Security
Software Development
Contract Administration
Chief Technology Officer
Legal Counsel
IT Director
Software Licensing Manager
Procurement Manager
Contract Administrator
Information Security Officer
Risk Manager
Commercial Director
Chief Information Officer
Compliance Officer
Software Asset Manager
Vendor Management Director
Legal Operations Manager
Technology Procurement Specialist
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.