Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of all partnership members who are party to the NDA
2. Background: Context of the partnership and purpose of the NDA
3. Definitions: Key terms used in the agreement, including detailed definition of 'Confidential Information'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under this agreement
5. Obligations of Confidentiality: Core confidentiality obligations and permitted uses of confidential information
6. Security Measures: Required procedures for handling and protecting confidential information
7. Exceptions to Confidentiality: Circumstances where disclosure is permitted (e.g., legal requirements, public domain information)
8. Duration of Obligations: Time period for which confidentiality obligations remain in force
9. Return or Destruction of Information: Requirements for handling confidential information upon termination or request
10. Breach and Remedies: Consequences of breaching the agreement and available remedies
11. Governing Law and Jurisdiction: Specification of Pakistani law and relevant jurisdiction
12. General Provisions: Standard boilerplate clauses including severability, amendments, and notices
1. Intellectual Property Rights: Additional provisions specifically protecting IP rights when the partnership involves creation or use of intellectual property
2. Data Protection Compliance: Specific provisions for compliance with data protection laws when personal data is involved
3. Third Party Disclosure: Provisions governing disclosure to third parties such as employees, advisors, or contractors
4. Non-Solicitation: Restrictions on soliciting employees or clients, if relevant to the partnership
5. Digital Security Measures: Specific provisions for protecting electronic data and digital communications
6. Dispute Resolution: Alternative dispute resolution procedures such as mediation or arbitration
7. Insurance Requirements: Obligations to maintain specific insurance coverage for confidential information breaches
1. Schedule 1 - Specific Confidential Information: Detailed list of specific documents, information, or data deemed confidential
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Detailed security procedures and requirements for handling confidential information
4. Schedule 4 - Approved Third Party Recipients: Pre-approved third parties who may receive confidential information
5. Appendix A - Form of Confidentiality Undertaking: Template confidentiality undertaking for third parties
6. Appendix B - Data Breach Notification Procedure: Step-by-step procedure for reporting and handling confidentiality breaches
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
