Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Electronic Confidentiality Agreement
"I need an Electronic Confidentiality Agreement to protect sensitive software development information shared with an offshore development team, with specific provisions for cloud-based collaboration tools and requirements for two-factor authentication."
1. Parties: Identification of the disclosing and receiving parties
2. Background: Context and purpose of the agreement
3. Definitions: Key terms including Confidential Information, Permitted Purpose, Electronic Records
4. Confidentiality Obligations: Core obligations regarding protection and non-disclosure of confidential information
5. Permitted Uses: Allowed uses of confidential information and scope of permitted access
6. Electronic Communications: Provisions regarding electronic delivery, signatures, and communications
7. Term and Termination: Duration of the agreement and termination provisions
8. Return of Information: Requirements for returning or destroying confidential information
9. General Provisions: Standard contract terms including governing law, jurisdiction, and entire agreement
1. Security Measures: Specific technical requirements for protecting electronic data and information systems
2. International Transfer: Provisions for cross-border data transfers and compliance with international regulations
3. Regulatory Compliance: Industry-specific compliance requirements for regulated sectors
4. Data Protection: Specific provisions for handling personal data and compliance with data protection laws
1. Schedule 1 - Description of Confidential Information: Detailed list and categories of information covered by the agreement
2. Schedule 2 - Authorized Recipients: List of individuals or roles authorized to access the confidential information
3. Schedule 3 - Security Protocol: Technical specifications and requirements for handling electronic information
4. Schedule 4 - Electronic Signature Requirements: Specific requirements and procedures for electronic execution of the agreement
Authors
Disclosing Party
Receiving Party
Authorized Representatives
Electronic Records
Electronic Signature
Permitted Purpose
Security Requirements
Authentication Method
Trade Secrets
Proprietary Information
Digital Platform
Access Credentials
Effective Date
Term
Electronic Storage System
Breach Notification
System Requirements
Data Protection Standards
Authorized Recipients
Confidentiality Period
Electronic Transmission
Digital Access
Security Protocols
Verification Process
Data Protection
Electronic Signatures
Authentication
Access Control
Security Measures
Non-Disclosure
Permitted Use
Return of Information
Term and Termination
Breach Notification
Remedies
Indemnification
Electronic Records
System Requirements
Verification
Governing Law
Jurisdiction
Assignment
Force Majeure
Severability
Entire Agreement
Third Party Rights
Notices
Amendments
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.