England and Wales
Free to use
🌐 Website Terms and Conditions
Website Terms and Conditions set out the terms on which the service is provided to the user, including predominanltly how the user's data is collected, used and shared.use this template for free
Use this agreement when bringing an advisor on board to formalize variables such as job role and responsibilities, duration of contract and compensation. The agreement also sets forth certain key terms such as confidentiality and intellectual property.
This template is to be used the next time your company needs to set out terms with an individual (i.e. not to be used for agreements involving a personal service company as defined within IR35). It sets out the terms on which a contractor provides services to a client company, and is perfect for freelance software developers, marketing consultants, designers, PR/HR/recruitment consultants.
This Founder IP Assignment is intended to be used to assign IP rights created by a founder for the company to the company itself. It will often be required to assign IP created by the founder prior to the founder entering into a formal services agreement with the company, which would otherwise continue to subsist in the founder. This Founder IP Assignment is drafted broadly and is not appropriate for more general IP assignments (see IP Assignment Templates).
This is a senior employment agreement template that we at Genie AI have used to hire 20+ employees. The agreement is structured so that all the key commercial terms that would change per employee are kept at the bottom in a table in the schedule, to make it easy to use on an ongoing basis. Since this is a senior employment contract, it contains a significant amount of provisions for restrictive covenants, such as non-solicitation (enticing away of customers, business or employees after the employee has left) and non-compete clauses. There is also provision to make reference to an incentive scheme such as an EMI option scheme, however it is recommended to keep this in a separate agreement, in order to avoid a binding promise and avoid variations to the incentive scheme resulting in variations to the terms of employment. Apart from that this is a fairly simple agreement that is easy to use and repeat for many employees.
This Intern Agreement Letter is a binding legal contract, written as a simple letter to be more readable and amenable to an intern. The intern is treated as a contractor, not a full time employee. The letter contains the main provisions to hire an intern, such as salary and payment, holidays, who the manager will be and the work the intern will undertake.
Use this agreement to set out the terms under which software may be accessed by a customer during a trial.
Following a trial, use a SaaS (Software as a Service) agreement to provide for the secure delivery of services to the user's terminal on a pay-per-use basis over a network, from processors hosted remotely by the SaaS provider.
Cookies are small text files that are stored on your computer or device by websites that you visit. This document contains details of individual cookies, what type of cookie they are, their purpose and duration, which are the key details required to include inside a Cookies Policy. Please note that in addition to providing users with comprehensive information about the cookies, consent will need to be obtained from users to place the cookies (subject to limited exemptions around strictly necessary cookies). Website operators will also need to consider the privacy related implications of the subsequent data processing and account for this in the relevant privacy notice.
This Employment Contract Questionnaire can be used by a company to tailor standard form employment contracts to their business requirements for each employee. It contains the key terms that should normally be included in an employment contract, such as inclusion of company policies like employee handbook and privacy notices, payment terms, holiday policy, incapacity, termination, gardening leave, grievance and more.
Also known as a cloud security policy or cloud governance policy, this cloud computing policy template covers all external cloud services, e.g. cloud-based email, document storage, Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), etc. Personal accounts are excluded.
Cloud computing offers a number of advantages including low costs, high performance and quick delivery of services. However, without adequate controls, it also exposes individuals and organisations to online threats such as data loss or theft, unauthorised access to corporate networks, and so on.
You can remain committed to enabling your employees to do their jobs as efficiently as possible through the use of technology. This template is intended to establish a process employees can use cloud services as required without jeopardising your organisation's data and computing resources.
This policy applies to all employees of your organisation, with no exceptions.
This template should be used where both parties are disclosing confidential information to one another. This is a typical arrangement to enter into at the beginning of a sales process to allow for discussions around business requirements before entering into the main agreement. The mutual nature of the NDA creates a more balanced position than one-way NDAs. It is assumed the confidential information being shared is not personal data (which would require a data sharing agreement).
A consultancy agreement between a company and a consultant. The client shall engage the consultant and the consultant shall provide the services on the terms of this agreement.This consultancy agreement can be used when hiring a contractor or consultant. It contains the usual terms around term, termination, payment and fees, expenses, confidential information and data protection. The agreement also handles intellectual property to ensure that IP of the work is transferred to the company paying for the consultant, how notices should be provided and whether the contract can be varied.
This Policy contains important rules covering the acceptable use of your organisation’s email, mobile, instant messaging, web browser and other online communication facilities. Your organisation provides facilities at its own expense and for its own business purposes, and it is the responsibility of all employees to make sure that any use of the internet follows your organisation’s standards of business and personal conduct.
Employees must ensure that they never use online facilities in a manner that could compromise your organisation or its employees in any way.
Every member of staff is responsible for ensuring that this Policy is complied with.
Laptops are especially vulnerable to physical damage, loss or theft, either for resale or for the information they contain. The impacts of breaches include not just the replacement value of the hardware but also the value of any data on them, or accessible information through them. Information is a vital asset. The Organisation depends very heavily on our computer systems to provide complete and accurate business information when and where we need it. The impacts of unauthorised access to or modification of important and/or sensitive data can far outweigh the cost of the equipment itself.
This agreement can be used to record the terms of collaboration of a post-graduate studentship between a university and a student. It determines the funding and conduct of the studentship in addition to the specifics surrounding the project to be undertaken by the student.
Use this agreement when an individual researcher undertakes to provide consultancy services to a Sponsor. The researcher assigns IP in the work they do as a consultant to the Sponsor in return for payments made by the Sponsor.
Note: In order to be assign those rights, the researcher must own them, which normally means they must not have developed them during the course of their employment by the university; if they have been developed in the course of his employment, those rights will usually belong to the university.
This template can be used where a controller appoints a processor to perform services that will result in the processor processing personal data. It is important to ensure you have accurately identified the roles of each party in respect of the personal data being processed. The controller is the entity determining the purpose and means of processing personal data and the processor (the “Provider”) is the entity which processes the personal data on behalf of the controller. This template should not be used for controller to controller data sharing arrangements. This template is a controller friendly version.
This template should only be used where one party is disclosing confidential information to the other party. This agreement should not be used if both parties are disclosing confidential information (see mutual NDA). It is assumed the confidential information being shared is not personal data (which would require a data sharing agreement).
In order to ensure business continuity in the event of information on your systems being destroyed or corrupted, it is vital that your following systems are backed up regularly and reliably. In addition, it may be advisable to make and keep hard copies of certain information for future reference or confirmation. This template will help you to log these processes, and revisit and improve them on a regular basis.
Use this agreement when bringing an advisor on board to formalise variables such as job role and responsibilities, duration of contract and compensation. The agreement also sets forth certain key terms such as confidentiality and intellectual property.
This IP assignment is intended to be used where a company (the assignor) wishes to assign intellectual property rights in works it has created to the assignee. Amendments would be required if the Assignor is an individual. See also separate IP Assignment (Founders) template for initial founder IP assignments. This assignment can be in reference to a previous agreement, for example a consultancy or contractor agreement, whereby you subsequently want to assign the IP of the work. This document is executed as a deed to ensure it is legally binding.
This sort of agreement might be used when a company has agreed to allow an academic, institution or industrial partner to use certain materials in connection with a research project.
This agreement in particular provides for the University owning the IP in the Results, but assigning the IP in any Improvements to the Company. It follows the scheme of Lambert Model Agreement 1, with the Company being granted a non-exclusive right to use the Results. (Unlike Lambert Model Agreement 1, the Results are defined in this form of Materials Transfer Agreement as the results arising from the use of the Materials (and not the results of the collaborative research project as a whole).
The University and the Company might, depending on the circumstances, follow the scheme of Lambert Model Agreement 2 or 3, giving the Company the opportunity to negotiate an exclusive licence or an assignment of the IP in specific Results, or Lambert Model Agreement 4 or 5, giving the Company ownership of the IP in the Results.
This sort of agreement might be used if a company has agreed to allow a academic, institutional, or industrial partner to use equipment in connection with a research project. This particular agreement is written as if a university will be taking delivery of the equipment to enable a principle investigator to use in relation to a research project.
Use this Clean Desk and Clear Screen Policy template and remove the need to have a separate Clean Desk Policy and Clear Screen Policy. The clean desk policy will encourage employees in your organisation to reduce the threat of a security incident and of information loss. Further, a cleared screen helps to ensure that confidential information is not viewed on employee devices by unauthorised persons while away from their desk.