Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party (typically the company) and receiving party (the supplier), including full legal names, registration numbers, and registered addresses
2. Background: Context of the relationship between the parties and purpose of sharing confidential information
3. Definitions: Detailed definitions of key terms, especially 'Confidential Information', 'Authorized Purpose', 'Authorized Representatives', and 'Trade Secrets'
4. Interpretation: Rules for interpreting the agreement, including principles of interpretation under South African law
5. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
6. Obligations of Confidentiality: Core confidentiality obligations, including use restrictions, security measures, and standard of care
7. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees and professional advisors
8. Data Protection: Specific provisions relating to personal information under POPIA
9. Security Measures: Required security measures for protecting confidential information
10. Return or Destruction of Confidential Information: Obligations regarding the return or destruction of confidential information upon termination or request
11. Duration and Survival: Term of the agreement and surviving obligations
12. Breach and Remedies: Consequences of breach and available remedies, including injunctive relief
13. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Additional provisions protecting intellectual property rights when the confidential information includes IP - particularly relevant for technology suppliers
2. Cross-Border Transfers: Specific provisions for international suppliers, addressing cross-border data transfers under POPIA
3. Competitive Activities: Non-compete provisions where relevant and permissible under Competition Act
4. Audit Rights: Right to audit supplier's compliance with confidentiality obligations - relevant for high-risk or regulated industries
5. Insurance Requirements: Obligations to maintain specific insurance coverage for data breaches - relevant for suppliers handling sensitive information
6. Force Majeure: Provisions for handling confidential information during force majeure events
7. Assignment and Subcontracting: Additional controls when supplier may need to subcontract or assign rights/obligations
1. Schedule 1: Description of Confidential Information: Detailed list or categories of confidential information covered by the agreement
2. Schedule 2: Authorized Representatives: List of authorized representatives from both parties who may access confidential information
3. Schedule 3: Security Requirements: Specific technical and organizational security measures required
4. Schedule 4: Approved Subcontractors: If relevant, list of pre-approved subcontractors who may access confidential information
5. Appendix A: Data Processing Terms: Detailed terms for processing personal information under POPIA, if applicable
6. Appendix B: Information Security Standards: Detailed information security standards and protocols to be followed
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
