Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification and details of the disclosing party and receiving party
2. Background: Context of the agreement and purpose for sharing confidential information
3. Definitions: Definitions of key terms including 'Confidential Information', 'Representatives', 'Permitted Purpose'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations and permitted uses of confidential information
6. Security Measures: Required measures to protect and secure confidential information
7. Permitted Disclosures: Circumstances under which confidential information may be disclosed
8. Return or Destruction: Requirements for returning or destroying confidential information
9. Duration and Survival: Term of the agreement and surviving obligations
10. Breach and Remedies: Consequences of breach and available remedies
11. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and notices
1. Data Protection Compliance: Specific provisions addressing POPIA compliance, used when personal information is involved
2. Intellectual Property Rights: Provisions clarifying IP ownership and rights, used when confidential information includes IP
3. Non-Solicitation: Prevents poaching of employees/clients, used in business-to-business contexts
4. Publicity and Announcements: Controls over public statements about the relationship, used in high-profile or sensitive situations
5. Special Industry Requirements: Industry-specific confidentiality requirements, used for regulated industries
6. Export Control: Provisions for international data transfers, used when cross-border sharing is contemplated
1. Description of Confidential Information: Detailed list or categories of confidential information covered
2. Authorized Representatives: List of individuals authorized to receive/handle confidential information
3. Security Protocols: Specific security measures and protocols to be followed
4. Permitted Purpose Details: Detailed description of the permitted use of confidential information
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
