Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the service provider and customer, including full legal names, commercial registration numbers, and authorized representatives
2. Background: Context of the agreement and brief description of the parties' business relationship
3. Definitions: Detailed definitions of technical terms, service-related concepts, and other key terms used throughout the agreement
4. Scope of Services: Detailed description of IT services to be provided, including core deliverables and service boundaries
5. Service Provider's Obligations: Comprehensive list of service provider's responsibilities, including service delivery, quality standards, and compliance requirements
6. Customer's Obligations: Customer's responsibilities, including access provision, cooperation requirements, and payment obligations
7. Service Levels: Specific performance metrics, measurement methods, and consequences of non-achievement
8. Fees and Payment Terms: Pricing structure, payment schedule, invoicing procedures, and late payment consequences
9. Data Protection and Security: Obligations regarding data handling, security measures, and compliance with Saudi Arabian data protection laws
10. Intellectual Property Rights: Ownership and usage rights of software, systems, and deliverables
11. Confidentiality: Protection of confidential information and trade secrets of both parties
12. Term and Termination: Duration of agreement, renewal terms, and termination circumstances and procedures
13. Liability and Indemnification: Limitation of liability, indemnification obligations, and insurance requirements
14. Force Majeure: Events excusing performance and procedures for handling force majeure situations
15. Governing Law and Dispute Resolution: Application of Saudi law and dispute resolution mechanisms, including Sharia compliance statement
16. General Provisions: Standard clauses including notices, amendments, assignment, and entire agreement provisions
1. Change Management: Procedures for requesting and implementing changes to services or specifications, used when services are likely to evolve
2. Disaster Recovery: Detailed procedures for service continuity in case of disasters, required for critical services
3. Third-Party Services: Terms governing subcontractors and third-party service providers, needed when external parties are involved
4. Training and Knowledge Transfer: Requirements for training customer personnel, important for complex system implementations
5. Transition Services: Procedures for service handover at the beginning and end of the agreement, crucial for complex service transitions
6. Local Content Requirements: Compliance with Saudi Arabia's local content requirements, necessary for government or semi-government contracts
7. Anti-corruption Compliance: Specific anti-corruption provisions, particularly important for international service providers
8. Software License Terms: Specific terms for software licensing when software is part of the services
1. Service Description Schedule: Detailed technical specifications of all services to be provided
2. Service Level Agreement (SLA): Detailed performance metrics, measurement methods, and remedies
3. Fee Schedule: Detailed breakdown of all fees, charges, and payment terms
4. Technical Requirements: Specific technical requirements, including hardware, software, and network specifications
5. Security Requirements: Detailed security protocols, compliance requirements, and procedures
6. Personnel Schedule: Key personnel, roles, qualifications, and replacement procedures
7. Data Processing Agreement: Detailed terms for handling personal and sensitive data in compliance with Saudi law
8. Business Continuity Plan: Detailed procedures for maintaining service continuity
9. Exit Management Plan: Procedures and requirements for service termination and transition
10. Approved Subcontractors: List of approved third-party service providers and their roles
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
