Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the employer and employee/contractor, including full legal names and details
2. Background: Context of the agreement, employment relationship, and need for confidentiality
3. Definitions: Detailed definitions of terms including 'Confidential Information', 'Trade Secrets', 'Intellectual Property', and other key terms
4. Scope of Confidential Information: Comprehensive description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations, including non-disclosure, non-use, and security measures
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including legal requirements and authorized business purposes
7. Duration of Obligations: Period during which confidentiality obligations remain in force, including post-employment obligations
8. Return of Confidential Information: Requirements for returning or destroying confidential information upon termination or request
9. Breach and Remedies: Consequences of breach and available remedies, including injunctive relief
10. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Additional provisions specifically protecting IP rights, recommended when the employee will be involved in creative or technical work
2. Non-Competition: Restrictions on competitive activities, only to be included if reasonable and necessary for business protection
3. Non-Solicitation: Provisions preventing solicitation of employees or clients, optional based on employee role
4. Data Privacy Compliance: Specific POPIA compliance provisions, recommended for roles involving personal information processing
5. Third Party Information: Provisions regarding confidential information belonging to third parties, relevant when employee will handle client or partner information
6. Information Security Protocols: Specific security measures and protocols, recommended for technical or senior roles
7. Monitoring and Reporting: Procedures for monitoring compliance and reporting breaches, suitable for high-security environments
1. Schedule A - Categories of Confidential Information: Detailed list of specific types of confidential information covered
2. Schedule B - Authorized Recipients: List of persons or roles authorized to receive specific categories of confidential information
3. Schedule C - Security Procedures: Detailed security protocols and procedures for handling confidential information
4. Schedule D - Return/Destruction Certificate: Template certificate confirming return or destruction of confidential information
5. Appendix 1 - Acknowledgment Form: Form for employee to acknowledge receipt and understanding of the NDA
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
