Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing and receiving parties, including full legal names, registration numbers, and addresses
2. Background: Context of the agreement, purpose of sharing confidential information, and nature of the business relationship
3. Definitions: Comprehensive definitions including 'Confidential Information', 'Representatives', 'Permitted Purpose', and other key terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Receiving Party: Core confidentiality obligations, standard of care, and security measures required
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees, advisors, or as required by law
7. Return or Destruction of Confidential Information: Requirements for handling confidential information upon request or termination
8. Duration and Survival: Perpetual nature of obligations and survival of terms
9. Breach and Remedies: Consequences of breach, including injunctive relief and other remedies
10. General Provisions: Standard clauses including governing law, jurisdiction, entire agreement, and amendments
1. Data Protection Compliance: Specific provisions addressing POPIA compliance, recommended when personal information is involved
2. Intellectual Property Rights: Additional provisions protecting IP rights, needed when proprietary technology or trade secrets are involved
3. Non-Solicitation: Restrictions on soliciting employees or customers, useful in business relationship contexts
4. Export Control: Compliance with export control laws, necessary when dealing with international parties or regulated information
5. Digital Security Measures: Specific requirements for electronic storage and transmission of confidential information, important for digital assets
6. Competitive Restrictions: Additional restrictions on competitive activities, useful in strategic business relationships
1. Schedule 1: Specified Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2: Authorized Representatives: List of authorized personnel who may access confidential information
3. Schedule 3: Security Protocols: Specific security measures and protocols required for handling confidential information
4. Appendix A: Notification Requirements: Contact details and procedures for required notifications under the agreement
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
