Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the contracting parties with their complete legal names, addresses, and registration details
2. Background: Context of the agreement and brief description of the parties' business relationship
3. Definitions: Detailed definitions of terms used throughout the agreement
4. Scope of Services: General framework for services to be provided under the agreement
5. Service Orders: Process for requesting, approving, and implementing specific services
6. Term and Termination: Duration of the agreement, renewal terms, and termination provisions
7. Payment Terms: Pricing structure, payment schedules, invoicing procedures, and related financial terms
8. Service Provider Obligations: Key responsibilities and commitments of the service provider
9. Client Obligations: Key responsibilities and commitments of the client
10. Intellectual Property Rights: Ownership and licensing of pre-existing and newly created IP
11. Confidentiality: Protection and handling of confidential information
12. Data Protection: Compliance with Philippine Data Privacy Act and data handling procedures
13. Warranties and Representations: Standard warranties regarding services, authority to contract, and compliance
14. Limitation of Liability: Limitations and caps on liability of both parties
15. Indemnification: Mutual indemnification obligations and procedures
16. Force Majeure: Provisions for unforeseen circumstances and their handling
17. Dispute Resolution: Process for resolving disputes, including jurisdiction and venue
18. General Provisions: Standard boilerplate clauses including notices, assignment, and amendment procedures
1. Personnel Requirements: Used when services involve deployment of personnel, including qualifications, replacement procedures, and conduct requirements
2. Service Levels: Include when specific performance metrics and standards need to be maintained
3. Security Requirements: Added when services involve access to sensitive systems or information
4. Business Continuity: Required for critical services needing disaster recovery and business continuity plans
5. Regulatory Compliance: Include for regulated industries or services subject to specific regulatory requirements
6. Insurance Requirements: Added when specific insurance coverage needs to be maintained
7. Transition Services: Include when complex service transition or exit management is required
8. Environmental Compliance: Used when services have environmental impact or sustainability requirements
9. Anti-Corruption Compliance: Added for high-value contracts or government-related services
1. Schedule A - Service Descriptions: Detailed descriptions of all services covered under the agreement
2. Schedule B - Pricing and Payment Terms: Detailed pricing structures, rates, and payment terms
3. Schedule C - Service Levels: Specific performance metrics, measurement methods, and remedies
4. Schedule D - Key Personnel: List of key personnel and their roles (if applicable)
5. Schedule E - Technical Requirements: Technical specifications and requirements for service delivery
6. Schedule F - Security Requirements: Detailed security protocols and requirements
7. Schedule G - Approved Subcontractors: List of approved subcontractors and their roles
8. Schedule H - Form of Service Order: Template for individual service orders
9. Appendix 1 - Change Control Procedure: Process for managing changes to services or agreement terms
10. Appendix 2 - Escalation Procedure: Process for escalating issues and disputes
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
