Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies the government agency and the receiving party, including their legal capacities and addresses
2. Background: Explains the context of the agreement, including the nature of the relationship between the parties and the purpose of sharing confidential information
3. Definitions: Defines key terms including 'Confidential Information', 'Government Information', 'Classified Information', and other relevant terms specific to Philippine government context
4. Scope of Confidential Information: Details what constitutes confidential information, including government classifications (Top Secret, Secret, Confidential, Restricted)
5. Obligations of Receiving Party: Specifies the duties and responsibilities in handling confidential information, including security measures and protocols
6. Permitted Disclosures: Outlines circumstances under which confidential information may be disclosed, including legal requirements and government authorizations
7. Security Measures: Details specific security protocols required for handling government information
8. Duration of Confidentiality: Specifies the period during which the confidentiality obligations remain in effect
9. Return or Destruction of Information: Procedures for returning or destroying confidential information upon request or termination
10. Breach and Consequences: Details what constitutes a breach and the resulting penalties, including reference to relevant Philippine laws
11. Governing Law and Jurisdiction: Specifies Philippine law as governing law and establishes jurisdiction for disputes
1. Data Privacy Compliance: Additional section when personal data is involved, ensuring compliance with the Data Privacy Act of 2012
2. International Transfer Restrictions: Required when there's possibility of information being transferred outside the Philippines
3. Digital Information Handling: Special provisions for electronic data and cybersecurity measures when digital information is involved
4. Third Party Disclosure Protocols: Required when contractors or consultants may need access to information
5. National Security Provisions: Additional provisions when information relates to national security matters
6. Audit Rights: Optional section granting government agency rights to audit compliance
7. Insurance Requirements: Required when handling highly sensitive information that requires specific insurance coverage
1. Schedule A - Categories of Confidential Information: Detailed list of types and classifications of confidential information covered
2. Schedule B - Security Protocols: Specific security measures and procedures to be followed
3. Schedule C - Authorized Personnel: List of individuals authorized to access the confidential information
4. Schedule D - Information Handling Procedures: Detailed procedures for handling different types of classified information
5. Appendix 1 - Contact Details: Contact information for key personnel and emergency contacts
6. Appendix 2 - Incident Reporting Forms: Standard forms for reporting security incidents or breaches
7. Appendix 3 - Compliance Checklist: Checklist for ensuring compliance with security measures
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
