Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party (seller) and receiving party (potential buyer), including full legal names and registration details
2. Background: Context of the potential business sale and purpose of sharing confidential information
3. Definitions: Detailed definitions of key terms, especially 'Confidential Information', 'Authorized Purpose', and 'Representatives'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the context of the business sale
5. Obligations of Confidentiality: Core confidentiality obligations, including use restrictions and security measures
6. Permitted Disclosures: Circumstances under which confidential information may be shared with representatives or as required by law
7. Term and Survival: Duration of confidentiality obligations and provisions that survive termination
8. Return or Destruction of Confidential Information: Requirements for handling confidential information after discussions end
9. Remedies: Legal remedies available in case of breach, including injunctive relief
10. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Non-Solicitation: Prevents poaching of employees or customers, relevant when detailed business information is shared
2. Exclusivity Period: Period during which the seller won't negotiate with other potential buyers, used in serious negotiations
3. Data Protection Compliance: Specific POPIA compliance provisions, necessary when personal information is involved
4. Anti-Trust Compliance: Required when sharing competitively sensitive information
5. Public Announcements: Controls over public statements about the potential transaction, important for listed companies
6. Non-Circumvention: Prevents direct approach to customers/suppliers, relevant for businesses with valuable relationships
7. Costs: Allocation of costs related to confidentiality measures, relevant for complex situations
1. Schedule 1 - Description of Confidential Information: Detailed list of specific types of confidential information to be disclosed
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific security measures required for handling different types of confidential information
4. Schedule 4 - Disclosure Process: Step-by-step process for requesting and providing access to confidential information
5. Appendix A - Form of Representative Undertaking: Template confidentiality undertaking for representatives to sign
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
