Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
IT Subcontractor Agreement
"I need an IT Subcontractor Agreement for a Saudi-based software development project where we'll be engaging a specialized cybersecurity firm to provide penetration testing and security auditing services for a 12-month period starting March 2025, with strict data protection requirements and potential access to government systems."
1. Parties: Identification of the main contractor and subcontractor, including full legal names, registration numbers, and addresses
2. Background: Context of the agreement, relationship to main contract, and project overview
3. Definitions: Definitions of key terms used throughout the agreement
4. Scope of Services: Detailed description of IT services to be provided, deliverables, and performance standards
5. Term and Timelines: Duration of the agreement, key milestones, and delivery schedules
6. Payment Terms: Fees, payment schedule, invoicing requirements, and currency specifications
7. Subcontractor Obligations: Key responsibilities, service levels, reporting requirements, and compliance obligations
8. Main Contractor Obligations: Support, access, and resources to be provided by the main contractor
9. Data Protection and Security: Compliance with Saudi data protection laws, security protocols, and confidentiality requirements
10. Intellectual Property Rights: Ownership and licensing of IP, including pre-existing IP and newly created works
11. Confidentiality: Protection of confidential information and trade secrets
12. Warranties and Representations: Standard and specific warranties regarding services, compliance, and capabilities
13. Liability and Indemnification: Liability limitations, indemnification obligations, and insurance requirements
14. Termination: Termination rights, procedures, and consequences
15. Governing Law and Dispute Resolution: Saudi law application and dispute resolution procedures
16. General Provisions: Standard boilerplate clauses including notices, amendments, and entire agreement
1. Foreign Worker Compliance: Required when subcontractor employs non-Saudi nationals, addressing visa requirements and Saudization rules
2. Export Control: Required when services involve cross-border technology transfer or data movement
3. Source Code Escrow: Optional section for critical software development projects requiring source code protection
4. Business Continuity: Required for critical IT services requiring disaster recovery and business continuity planning
5. Knowledge Transfer: Optional section for projects requiring transition of knowledge to main contractor's team
6. Non-Competition: Optional restrictions on subcontractor's ability to work with competitors
7. Performance Bonds: Required for high-value contracts or government-related projects
8. Islamic Finance Compliance: Required when payment structures need to comply with Islamic finance principles
1. Schedule 1 - Services Description: Detailed technical specifications and scope of IT services
2. Schedule 2 - Service Levels: Specific performance metrics, KPIs, and measurement criteria
3. Schedule 3 - Pricing and Payment: Detailed fee structure, rates, and payment milestones
4. Schedule 4 - Project Timeline: Detailed project schedule, milestones, and deliverable dates
5. Schedule 5 - Security Requirements: Specific security protocols, standards, and compliance requirements
6. Schedule 6 - Personnel: Key personnel, qualifications, and replacement procedures
7. Schedule 7 - Technical Requirements: Hardware, software, and infrastructure specifications
8. Appendix A - Required Forms: Standard forms for reporting, change requests, and acceptance
9. Appendix B - Compliance Certificates: Copies of required certifications and compliance documents
Authors
Acceptance Criteria
Applicable Laws
Approved Personnel
Background IP
Business Day
Change Control Procedure
Confidential Information
Contract Period
Critical Service Levels
Cyber Security Requirements
Data Protection Laws
Deliverables
Documentation
End Client
Force Majeure Event
Foreground IP
Good Industry Practice
Implementation Plan
Intellectual Property Rights
Key Personnel
Main Contract
Main Contractor
Main Contractor Materials
Milestone
Personal Data
Project
Project Manager
Quality Standards
Related Agreements
Reports
Saudi Business Hours
Security Requirements
Service Credits
Service Levels
Services
Site
Source Code
Specifications
Subcontractor
Subcontractor Materials
System
Technical Requirements
Term
Third Party Materials
Time for Completion
Updates
Work Product
Interpretation
Definitions
Service Provision
Term Duration
Payment Terms
Service Levels
Performance Standards
Acceptance Testing
Change Control
Personnel Requirements
Contractor Obligations
Client Obligations
Intellectual Property
Data Protection
Cyber Security
Confidentiality
Non-Competition
Non-Solicitation
Warranties
Indemnification
Limitation of Liability
Insurance
Force Majeure
Termination
Exit Management
Assignment and Subcontracting
Dispute Resolution
Governing Law
Notices
Entire Agreement
Severability
Third Party Rights
Compliance with Laws
Anti-Corruption
Audit Rights
Business Continuity
Documentation
Training
Quality Assurance
Risk Management
Reporting Requirements
Security Clearance
Access Rights
Knowledge Transfer
Environmental Compliance
Islamic Finance Compliance
Information Technology
Software Development
Cloud Services
Cybersecurity
Digital Transformation
Telecommunications
Financial Services Technology
Healthcare Technology
E-commerce
Government & Public Sector IT
Oil & Gas Technology
Manufacturing Technology
Educational Technology
Legal
Procurement
Information Technology
Vendor Management
Compliance
Risk Management
Operations
Project Management Office
Information Security
Technical Architecture
Service Delivery
Contract Administration
IT Project Manager
Procurement Manager
Legal Counsel
Contract Manager
Chief Technology Officer
IT Operations Director
Vendor Management Specialist
Compliance Officer
Technical Program Manager
Information Security Manager
Software Development Manager
Solutions Architect
Chief Information Officer
Risk Manager
IT Service Delivery Manager
Find the exact document you need
IT Subcontractor Agreement
A Saudi Arabian law-governed agreement establishing terms for IT subcontractor services, including technical specifications, compliance requirements, and performance standards.
Subcontractor To Subcontractor Agreement
A Saudi Arabian law-governed agreement between two subcontractors for delegating contracted work, ensuring compliance with local regulations and Shariah principles.
Hold Harmless Agreement For Contractors
A Saudi Arabia-compliant Hold Harmless Agreement protecting clients from potential claims and losses arising from contractor work, aligned with local laws and Sharia principles.
Independent Contractor Subcontractor Agreement
A Saudi Arabian law-governed agreement establishing terms and conditions between a main contractor and independent subcontractor, ensuring regulatory compliance and clear business relationship parameters.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.