Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Perpetual Software License
"I need a Perpetual Software License Agreement for enterprise-level cybersecurity software to be deployed across our Qatar-based banking operations, with specific provisions for data protection compliance and source code escrow arrangements."
1. Parties: Identification of licensor and licensee with full legal names and registered addresses
2. Background: Context of the agreement, brief description of the software, and parties' intentions
3. Definitions: Detailed definitions of technical terms, software components, and key concepts used throughout the agreement
4. License Grant: Scope of the perpetual license, permitted uses, and territory restrictions
5. License Fees: Payment terms, including one-time license fee and any recurring maintenance fees
6. Intellectual Property Rights: Assertion of licensor's IP rights and limitations on licensee's usage
7. Licensee Obligations: Responsibilities of the licensee including usage restrictions and security requirements
8. Technical Support and Maintenance: Terms for ongoing support and software updates
9. Warranties and Representations: Software performance guarantees and compliance with Qatar laws
10. Limitation of Liability: Scope of liability limitations permitted under Qatar law
11. Term and Termination: Duration of perpetual license and circumstances for termination
12. Confidentiality: Protection of confidential information and trade secrets
13. Governing Law and Jurisdiction: Application of Qatar law and dispute resolution procedures
1. Data Protection: Required if software processes personal data, ensuring compliance with Qatar's Data Protection Law
2. Third-Party Software: Include when the software incorporates third-party components or dependencies
3. Export Controls: Necessary for software subject to international export restrictions
4. Source Code Escrow: Optional protection for licensee through source code escrow arrangements
5. Training and Implementation: Include if licensor provides installation and training services
6. Disaster Recovery: Required for business-critical software implementations
7. Assignment and Sublicensing: Include if transfer or sublicensing rights are to be granted
8. Insurance: Include for high-value or business-critical software licenses
1. Software Description: Detailed technical specifications and functionality of the licensed software
2. License Fees Schedule: Breakdown of license fees, payment terms, and any recurring charges
3. Technical Requirements: Hardware and system requirements for software operation
4. Service Level Agreement: Performance metrics and support response times
5. Maintenance Services: Scope of maintenance services and update procedures
6. Authorized Users: Definition and limitations of authorized user categories
7. Security Requirements: Specific security protocols and requirements for software usage
8. Implementation Plan: Timeline and milestones for software deployment if applicable
Authors
Authorized Users
Business Day
Confidential Information
Documentation
Effective Date
Intellectual Property Rights
License Fee
Licensed Software
Maintenance Services
Major Release
Minor Release
Normal Business Hours
Operating Environment
Permitted Purpose
Personnel
Related Persons
Security Requirements
Software Modifications
Source Code
Specifications
Support Services
System Requirements
Technical Requirements
Territory
Third Party Software
Updates
Upgrades
User Manual
Virus
Warranty Period
Work Product
Working Hours
Designated Site
Error
Critical Error
Implementation Services
Installation Date
Maintenance Fees
Response Time
Service Levels
Software Platform
Support Request
Training Materials
User Access
Version
Payment
Intellectual Property
Confidentiality
Data Protection
Warranties
Limitation of Liability
Indemnification
Term and Termination
Force Majeure
Assignment
Technical Support
Maintenance Services
Installation
Training
Acceptance Testing
Security Requirements
Access Rights
Usage Restrictions
Audit Rights
Export Control
Source Code Escrow
Service Levels
Dispute Resolution
Governing Law
Entire Agreement
Amendment
Severability
Notices
Non-Solicitation
Insurance
Compliance with Laws
Third-Party Rights
Business Continuity
Software Updates
Information Technology
Banking and Financial Services
Healthcare
Education
Government and Public Sector
Oil and Gas
Manufacturing
Retail
Professional Services
Telecommunications
Construction
Real Estate
Legal
Information Technology
Procurement
Compliance
Finance
Risk Management
Commercial Operations
Information Security
Technical Operations
Vendor Management
Chief Technology Officer
Legal Counsel
IT Director
Procurement Manager
Software Licensing Manager
Compliance Officer
Contract Manager
Information Security Officer
Technical Operations Manager
Risk Manager
Chief Information Officer
Business Development Manager
Commercial Director
Chief Financial Officer
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.