Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the contracting parties with full legal names, addresses, and registration details as per UAE requirements
2. Background: Context of the agreement and business relationship between the parties
3. Definitions: Comprehensive list of defined terms used throughout the agreement
4. Scope of Services: General framework for services to be provided under the agreement
5. Term and Renewal: Duration of the agreement and renewal mechanisms
6. Service Standards: Quality standards, KPIs, and performance requirements
7. Ordering Process: Procedure for requesting and confirming specific services
8. Fees and Payment: Pricing structure, payment terms, and invoicing requirements
9. Obligations of Service Provider: Key responsibilities and commitments of the service provider
10. Customer Obligations: Key responsibilities and commitments of the customer
11. Intellectual Property Rights: Ownership and usage rights of IP created or used during service provision
12. Confidentiality: Protection and handling of confidential information
13. Data Protection: Data handling and privacy requirements
14. Liability and Indemnification: Allocation of risks and responsibilities between parties
15. Force Majeure: Provisions for unforeseen circumstances preventing performance
16. Termination: Grounds and process for ending the agreement
17. Governing Law and Jurisdiction: UAE law as governing law and jurisdiction provisions
18. General Provisions: Standard boilerplate clauses including notices, amendments, and assignment
1. Compliance with Shariah: Specific provisions ensuring compliance with Islamic law principles, used when parties require explicit Shariah compliance
2. Insurance: Specific insurance requirements, used when services involve significant operational risks
3. Security Requirements: IT security and physical security requirements, used for technology or facility-related services
4. Business Continuity: Disaster recovery and business continuity requirements, used for critical services
5. Personnel and Subcontracting: Rules for service provider personnel and use of subcontractors, used when services involve on-site work or significant personnel components
6. Environmental Compliance: Environmental protection requirements, used for services with environmental impact
7. Import/Export Compliance: Trade compliance provisions, used for cross-border services or goods
8. Anti-corruption: Specific anti-corruption provisions, used for high-value contracts or government-related services
9. Change Control: Formal process for managing changes to services, used for complex or technical services
10. Service Credits: Financial consequences for service level failures, used when specific performance metrics are critical
1. Schedule 1 - Service Descriptions: Detailed descriptions of specific services to be provided
2. Schedule 2 - Service Levels: Detailed performance metrics and measurement methods
3. Schedule 3 - Charges: Detailed pricing, rate cards, and payment terms
4. Schedule 4 - Customer Materials: List of materials, equipment, or access to be provided by customer
5. Schedule 5 - Key Personnel: Identification of key service provider personnel and roles
6. Schedule 6 - Approved Subcontractors: List of pre-approved subcontractors and their roles
7. Schedule 7 - Security Requirements: Detailed security protocols and requirements
8. Schedule 8 - Change Control Procedure: Detailed process for managing changes to services
9. Schedule 9 - Exit Plan: Procedures for service transition upon termination
10. Appendix A - Form of Work Order: Template for ordering specific services under the MSA
11. Appendix B - Report Templates: Standard formats for required service reports
12. Appendix C - Contact Details: Key contact information for both parties
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
