Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party (seller), receiving party (potential buyer), and their legal representatives
2. Background: Context of the potential business sale and purpose of the NDA
3. Definitions: Detailed definitions including 'Confidential Information', 'Representatives', 'Permitted Purpose', and other key terms
4. Disclosure and Use of Confidential Information: Terms governing how confidential information can be shared and used
5. Obligations of the Receiving Party: Specific duties regarding protection, storage, and handling of confidential information
6. Security Measures: Required security protocols for protecting confidential information, including digital security measures
7. Duration of Confidentiality Obligations: Time period for which confidentiality obligations remain in force
8. Return or Destruction of Confidential Information: Procedures for handling confidential information after negotiations end
9. Prohibited Activities: Specific actions that are not permitted with the confidential information
10. Data Protection Compliance: Compliance requirements with POPIA and other relevant data protection laws
11. Breach and Remedies: Consequences of breaching the agreement and available legal remedies
12. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Non-Solicitation: Prevents poaching of employees or customers, included when there's significant risk of talent or client poaching
2. Non-Competition: Restricts competitive activities, used when detailed business information will be shared
3. Publicity and Announcements: Controls public statements about the potential transaction, included for sensitive or high-profile deals
4. Costs and Expenses: Allocation of costs related to maintaining confidentiality, included for complex transactions
5. Assignment and Subcontracting: Controls transfer of rights and obligations, included when multiple parties might be involved
6. Reverse Engineering Prohibition: Prevents recreation of business processes from confidential information, used for technical or process-heavy businesses
7. Monitoring and Audit Rights: Allows oversight of information handling, included for highly sensitive information
1. Schedule 1: Description of Confidential Information: Detailed list of types of confidential information covered by the agreement
2. Schedule 2: Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3: Security Protocols: Specific security measures required for handling different types of confidential information
4. Schedule 4: Permitted Purpose Details: Detailed description of how confidential information may be used
5. Appendix A: Data Processing Requirements: Specific requirements for compliance with POPIA and other data protection laws
6. Appendix B: Information Return/Destruction Certificate: Template certificate confirming return or destruction of confidential information
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
