Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the disclosing party and receiving party, including full legal names, registration numbers, and addresses
2. Background: Context of the agreement, purpose of sharing confidential information, and the nature of the business relationship
3. Definitions: Detailed definitions including 'Confidential Information', 'Product', 'Authorized Purpose', 'Representatives', and other key terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in relation to the product
5. Confidentiality Obligations: Core obligations regarding the protection, non-disclosure, and restricted use of confidential information
6. Security Measures: Required security measures for protecting confidential information, including physical, electronic, and procedural safeguards
7. Authorized Disclosures: Circumstances under which confidential information may be disclosed, including to employees, advisors, or as required by law
8. Term and Termination: Duration of the agreement and confidentiality obligations, including post-termination obligations
9. Return or Destruction of Confidential Information: Procedures for returning or destroying confidential information upon termination or request
10. Breach and Remedies: Consequences of breach, including remedies, injunctive relief, and damages
11. General Provisions: Standard clauses including governing law, jurisdiction, entire agreement, and amendments
1. Intellectual Property Rights: Specific provisions regarding IP rights in the product and related confidential information, used when IP protection is particularly crucial
2. Data Protection Compliance: Specific POPIA compliance provisions, required when personal information is included in the confidential information
3. Export Control: Provisions regarding international transfer of confidential information, needed for cross-border arrangements
4. Reverse Engineering Prohibition: Specific prohibition on reverse engineering the product, important for technical products
5. Competitive Activities: Restrictions on competitive activities, used when there's a risk of competitive misuse
6. Insurance Requirements: Obligations to maintain specific insurance coverage, relevant for high-value or high-risk products
7. Audit Rights: Rights to audit compliance with confidentiality obligations, useful for highly sensitive information
1. Schedule 1: Description of Product: Detailed description of the product(s) to which the confidential information relates
2. Schedule 2: Authorized Purpose: Detailed description of the specific purposes for which confidential information may be used
3. Schedule 3: Security Protocols: Specific security measures and protocols required for protecting the confidential information
4. Schedule 4: Authorized Representatives: List of authorized representatives who may access the confidential information
5. Appendix A: Data Handling Procedures: Detailed procedures for handling, storing, and transmitting confidential information
6. Appendix B: Incident Response Plan: Procedures for responding to potential breaches or unauthorized disclosures
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
