Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the employer and employee, including full legal names and details
2. Background: Context of the agreement, employment relationship, and need for confidentiality
3. Definitions: Detailed definitions including 'Confidential Information', 'Trade Secrets', 'Intellectual Property', and other key terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the employment context
5. Confidentiality Obligations: Core obligations regarding non-disclosure, protection, and handling of confidential information
6. Data Protection Compliance: Specific obligations relating to POPIA compliance and personal information protection
7. Security Measures: Required practices and procedures for protecting confidential information
8. Duration of Obligations: Timeframe for confidentiality obligations during and after employment
9. Return of Confidential Information: Obligations regarding return or destruction of confidential information upon employment termination
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Additional section when employee may create or work with IP during employment
2. Non-Competition: Optional restraint of trade provisions where necessary for business protection
3. Third Party Information: Additional provisions when employee handles confidential information of clients or business partners
4. International Data Transfers: Required when confidential information may be transferred across borders
5. Monitoring and Compliance: Additional section for specific monitoring or compliance requirements in sensitive positions
6. Specific Industry Requirements: Industry-specific confidentiality requirements (e.g., financial services, healthcare)
1. Schedule 1: Categories of Confidential Information: Detailed list of specific types of confidential information relevant to the role
2. Schedule 2: Security Protocols: Specific security measures and procedures to be followed
3. Schedule 3: Approved Third Party Recipients: List of authorized third parties who may receive confidential information
4. Appendix A: Acknowledgment Form: Form for employee to sign acknowledging receipt and understanding of confidential information
5. Appendix B: Exit Procedures: Procedures for handling confidential information upon employment termination
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
