Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full details of all parties to the agreement
2. Background: Explains the context and purpose of the agreement, including the nature of the relationship between the parties
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information'
4. Confidentiality Obligations: Core obligations regarding the protection, use, and non-disclosure of confidential information
5. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees, advisors, or as required by law
6. Security Measures: Required steps to maintain the security and confidentiality of the information
7. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
8. Term and Termination: Duration of the agreement and circumstances for termination
9. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Used when confidential information includes IP that needs specific protection
2. Non-Solicitation: Include when there's a risk of poaching employees or clients
3. Non-Competition: Used in cases where the recipient might compete with the discloser
4. Privacy Compliance: Include when personal information is involved, ensuring compliance with Privacy Act 1988
5. Data Protection: Used when dealing with digital information or requiring specific security protocols
6. Publicity and Announcements: Include when controlling public statements about the relationship is important
7. Assignment and Novation: Used when transfer of rights needs to be specifically addressed
8. Mutual Obligations: Include when both parties will be sharing confidential information
1. Schedule 1 - Confidential Information: Detailed description of the confidential information covered by the agreement
2. Schedule 2 - Authorized Recipients: List of individuals or roles authorized to receive the confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols required for protecting the information
4. Schedule 4 - Permitted Purpose: Detailed description of the permitted use of the confidential information
5. Appendix A - Notice Details: Contact details and method of service for notices under the agreement
Find the document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
