Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides details of all parties entering into the NDA, including their legal names, addresses, and company registration numbers if applicable
2. Background: Explains the context of the project and why the parties are entering into an NDA
3. Definitions: Defines key terms used throughout the agreement, including 'Confidential Information', 'Project', 'Authorized Recipients', and other relevant terms
4. Scope of Confidential Information: Clearly defines what information is considered confidential under the agreement, specifically in relation to the project
5. Obligations of Confidentiality: Details the receiving party's obligations regarding the protection and non-disclosure of confidential information
6. Permitted Disclosures: Specifies circumstances under which confidential information may be disclosed and to whom
7. Term and Survival: Specifies the duration of the agreement and which obligations survive termination
8. Return or Destruction of Confidential Information: Requirements for handling confidential information after the project ends or upon request
9. Breach and Remedies: Outlines consequences of breach and available remedies
10. Governing Law and Jurisdiction: Specifies Philippine law as governing law and defines jurisdiction for dispute resolution
1. Project Specific Requirements: Include when there are specific project protocols or requirements for handling confidential information
2. Data Privacy Compliance: Include when personal data will be shared as part of the project, ensuring compliance with the Data Privacy Act
3. Intellectual Property Rights: Include when the project involves creation or sharing of intellectual property
4. Security Protocols: Include when specific security measures or protocols must be followed for the project
5. Third Party Disclosure: Include when project execution requires sharing information with third party contractors or consultants
6. Export Control: Include when the project involves international data transfers or technology exports
7. Non-Solicitation: Include when there's a risk of employee poaching during the project
8. Publicity and Announcements: Include when the project's existence itself needs to be kept confidential
1. Schedule 1 - Project Description: Detailed description of the project scope and objectives
2. Schedule 2 - Authorized Recipients: List of individuals or roles authorized to access confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures for handling confidential information
4. Schedule 4 - Information Classification Guide: Guidelines for classifying different types of confidential information
5. Appendix A - Contact Details: Key contact persons for notices and confidential information management
6. Appendix B - Document Marking Requirements: Requirements for marking and identifying confidential documents
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
