Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the cloud service provider and customer, including registration details required under UAE law
2. Background: Context of the agreement and brief description of the cloud services being provided
3. Definitions: Detailed definitions of technical terms, service components, and legal terms used throughout the agreement
4. Services Description: Detailed description of the cloud services, including technical specifications and service parameters
5. Service Levels: Specific service level commitments, measurement metrics, and remedies for failure to meet SLAs
6. Customer Obligations: Customer responsibilities, acceptable use policies, and compliance requirements
7. Fees and Payment: Pricing, payment terms, invoicing procedures, and late payment consequences
8. Data Protection and Privacy: Compliance with UAE data protection laws, data handling procedures, and privacy safeguards
9. Security Requirements: Security measures, protocols, and compliance with UAE cybersecurity regulations
10. Intellectual Property Rights: IP ownership, licenses, and usage rights for the service and customer data
11. Confidentiality: Protection of confidential information and trade secrets
12. Liability and Indemnification: Limitation of liability, indemnification obligations, and risk allocation
13. Term and Termination: Contract duration, renewal terms, and termination rights and procedures
14. Force Majeure: Events excusing performance, including specific provisions relevant to cloud services
15. Governing Law and Jurisdiction: UAE law as governing law and jurisdiction provisions
16. General Provisions: Standard boilerplate clauses adapted to UAE law requirements
1. Data Localization Requirements: Required if dealing with government entities or specific sectors requiring data to be stored within UAE
2. Disaster Recovery: Detailed disaster recovery procedures, required for enterprise or critical service agreements
3. Professional Services: Include when additional implementation, training, or consulting services are provided
4. Change Management: Required for enterprise agreements where formal change processes are needed
5. Service Credits: Include when specific financial remedies are offered for service level failures
6. Compliance with Sector-Specific Regulations: Required when serving regulated industries like healthcare or financial services
7. Insurance Requirements: Include for enterprise agreements or when required by customer policy
8. Audit Rights: Include for enterprise customers or when handling sensitive data
9. Exit Management: Required for complex implementations requiring detailed transition assistance
1. Service Description Schedule: Detailed technical specifications and service descriptions
2. Service Level Agreement: Detailed SLA metrics, measurement methods, and remedies
3. Pricing Schedule: Detailed pricing, payment terms, and calculation methodologies
4. Security Standards and Procedures: Detailed security protocols, certifications, and compliance measures
5. Data Processing Agreement: Detailed data handling procedures and compliance with UAE data protection laws
6. Acceptable Use Policy: Detailed rules and restrictions for service usage
7. Support Services Schedule: Support level descriptions, response times, and escalation procedures
8. Business Continuity Plan: Detailed disaster recovery and business continuity procedures
9. Technical Requirements: Customer infrastructure and technical requirements for service use
10. Exit Management Plan: Detailed procedures for service termination and transition
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
