Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party and receiving party, including complete legal names, addresses, and business registration details
2. Background: Context of the agreement, purpose of sharing confidential information, and nature of the business relationship
3. Definitions: Detailed definitions including 'Confidential Information', 'Digital Communications', 'Electronic Documents', 'Authorized Recipients', and other key terms
4. Scope of Confidential Information: Specific description of what constitutes confidential information in both physical and digital formats
5. Digital Security Obligations: Specific requirements for handling digital information, including encryption, access controls, and secure storage
6. Permitted Use and Disclosure: Conditions under which confidential information may be used or disclosed, including digital sharing protocols
7. Term and Termination: Duration of the agreement and procedures for termination
8. Return or Destruction of Confidential Information: Procedures for returning or destroying confidential information, including digital data deletion requirements
9. Electronic Execution and Communications: Provisions for electronic signatures and digital communications in compliance with Philippine E-Commerce Act
10. Governing Law and Jurisdiction: Specification of Philippine law as governing law and jurisdiction for disputes
1. Third Party Disclosure: Include when confidential information may need to be shared with third parties such as contractors or advisors
2. International Data Transfer: Include when parties operate across multiple jurisdictions and data may be transferred internationally
3. Specific Industry Compliance: Include when the agreement relates to regulated industries with specific compliance requirements
4. Source Code Protection: Include when software source code or technical specifications are part of the confidential information
5. Data Privacy Compliance: Include detailed data privacy provisions when personal data is involved, ensuring compliance with the Data Privacy Act
6. Audit Rights: Include when the disclosing party requires rights to audit the receiving party's compliance with security measures
1. Schedule 1 - Description of Confidential Information: Detailed list of specific confidential information covered by the agreement
2. Schedule 2 - Authorized Recipients: List of individuals or roles authorized to access the confidential information
3. Schedule 3 - Security Protocols: Technical specifications for handling digital information, including required security measures
4. Schedule 4 - Data Deletion Certificate: Template certificate for confirming deletion of digital confidential information
5. Appendix A - Digital Communication Protocols: Specific procedures and requirements for digital communications between parties
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
