Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the contracting parties including their legal names, addresses, and company details
2. Background: Context of the agreement and brief description of the parties' business relationship
3. Definitions and Interpretation: Detailed definitions of terms used throughout the agreement and rules for interpretation
4. Term and Renewal: Duration of the agreement and conditions for renewal
5. Services Overview: General description of services covered by the MSA and process for adding specific services through SOWs
6. Service Level Requirements: Core service levels, availability requirements, and performance standards
7. Ordering Process: Process for requesting and implementing new services or changes to existing services
8. Fees and Payment Terms: Pricing structure, payment terms, invoicing procedures, and late payment consequences
9. Customer Obligations: Customer's responsibilities and requirements for enabling service delivery
10. Provider Obligations: Provider's core responsibilities and service delivery commitments
11. Data Protection and Security: Requirements for handling customer data, security measures, and privacy compliance
12. Intellectual Property Rights: Ownership and licensing of IP, including pre-existing IP and newly created materials
13. Confidentiality: Protection of confidential information and trade secrets
14. Warranties and Representations: Standard warranties regarding services, compliance with laws, and authority to contract
15. Liability and Indemnification: Limitations of liability and indemnification obligations
16. Insurance: Required insurance coverage and minimum limits
17. Termination: Grounds for termination, termination process, and consequences
18. Dispute Resolution: Process for resolving disputes, including escalation procedures
19. General Provisions: Standard boilerplate clauses including notices, assignment, and governing law
1. Hardware Requirements: Include when solution includes hardware components or specific customer infrastructure requirements
2. Professional Services: Include when provider will offer implementation, training, or consulting services
3. Change Management: Include for complex implementations requiring formal change control processes
4. Disaster Recovery: Include for business-critical software requiring specific recovery commitments
5. Source Code Escrow: Include when customer requires source code protection through escrow arrangement
6. International Data Transfer: Include when services involve cross-border data transfers
7. Service Credits: Include when parties agree to financial remedies for service level failures
8. Audit Rights: Include when customer requires specific audit or compliance verification rights
9. Competition Restrictions: Include when parties agree to non-compete or customer exclusivity provisions
1. Schedule 1 - Service Descriptions: Detailed description of core services covered by the MSA
2. Schedule 2 - Service Level Agreement: Detailed service levels, measurement methods, and remedies
3. Schedule 3 - Fee Schedule: Detailed pricing, rate cards, and payment terms
4. Schedule 4 - Security Requirements: Specific security standards, protocols, and compliance requirements
5. Schedule 5 - Technical Requirements: Technical specifications and requirements for service delivery
6. Schedule 6 - Support Services: Support level definitions, response times, and escalation procedures
7. Schedule 7 - Data Processing Agreement: Detailed terms for personal data processing and protection
8. Schedule 8 - Business Continuity Plan: Disaster recovery and business continuity procedures
9. Appendix A - Form of Statement of Work: Template for creating project-specific statements of work
10. Appendix B - Change Request Form: Standard form for requesting and documenting changes to services
Find the document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
