Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the employer company and the IT employee
2. Background: Context of the agreement, nature of employment, and reason for confidentiality requirements
3. Definitions: Detailed definitions of Confidential Information, Trade Secrets, Intellectual Property, Source Code, and other key terms specific to IT sector
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the IT context, including code, algorithms, databases, client information, etc.
5. Employee Obligations: Core confidentiality obligations, including data protection, system security, and handling of sensitive information
6. Security Protocols: Specific procedures for handling confidential information, including digital security measures
7. Intellectual Property Rights: Provisions regarding ownership and protection of IP created during employment
8. Term and Survival: Duration of confidentiality obligations during and after employment
9. Return of Confidential Information: Procedures for returning or destroying confidential information upon employment termination
10. Breach and Remedies: Consequences of breaching the agreement, including legal remedies and damages
11. Governing Law and Jurisdiction: Specification of Pakistani law as governing law and relevant jurisdiction
1. Non-Competition: Optional restrictions on working with competitors, used when employee has access to highly sensitive competitive information
2. Third Party Information: Specific provisions for handling client or vendor confidential information, used when employee works with external stakeholders
3. Remote Work Provisions: Special confidentiality requirements for remote working arrangements
4. International Data Transfer: Provisions for handling data across borders, used when company operates internationally
5. Social Media Policy: Guidelines for social media usage and confidentiality, used when employee has social media responsibilities
6. Personal Device Usage: Rules for using personal devices for work, used when company has BYOD policy
1. Schedule 1 - Specified Confidential Information: Detailed list of specific types of confidential information relevant to the employee's role
2. Schedule 2 - Security Protocols: Detailed technical security procedures and requirements
3. Schedule 3 - Approved Software and Tools: List of approved software, development tools, and platforms
4. Appendix A - Acknowledgment Form: Form for employee to sign acknowledging receipt and understanding of the agreement
5. Appendix B - Exit Checklist: Checklist for ensuring all confidential information is returned upon employment termination
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
