Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing and receiving parties, including registered addresses and company numbers
2. Background: Context of the agreement, including the purpose of sharing confidential information and the nature of the software-related disclosure
3. Definitions: Detailed definitions including 'Confidential Information', 'Software', 'Source Code', 'Documentation', 'Intellectual Property Rights', and other relevant terms
4. Scope of Confidential Information: Specific description of what constitutes confidential information in the software context, including code, algorithms, architecture, and documentation
5. Obligations of Confidentiality: Core confidentiality obligations, including use restrictions, security measures, and standard of care
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees and professional advisors
7. Security Measures: Specific security protocols for handling software-related confidential information
8. Return or Destruction of Information: Obligations regarding the return or destruction of confidential information upon termination
9. Duration and Survival: Term of the agreement and surviving obligations
10. Breach and Remedies: Consequences of breach and available remedies, including injunctive relief
11. General Provisions: Standard contractual provisions including governing law, jurisdiction, entire agreement, and variation
1. Source Code Protection: Additional provisions specifically for source code protection, use when source code access is involved
2. Third Party Access: Provisions governing access by third-party contractors or service providers, include when third-party involvement is anticipated
3. Cloud Storage Provisions: Specific provisions for cloud storage and transmission of confidential information, include when cloud services are used
4. Data Privacy Compliance: Specific provisions relating to personal data protection, include when personal data is involved
5. Export Control: Provisions regarding export control regulations, include for international software deployments
6. Reverse Engineering Prohibition: Specific provisions prohibiting reverse engineering of software, include for proprietary software protection
7. Competing Projects: Restrictions on involvement in competing projects, include when competitive concerns exist
8. Audit Rights: Rights to audit compliance with the NDA, include for high-security requirements
1. Schedule 1 - Description of Confidential Information: Detailed description of the software and related confidential information covered
2. Schedule 2 - Authorized Representatives: List of authorized representatives who may access the confidential information
3. Schedule 3 - Security Protocols: Detailed security measures and protocols for handling the confidential information
4. Schedule 4 - Approved Subcontractors: List of approved third parties who may access the confidential information
5. Appendix A - Form of Confidentiality Undertaking: Template confidentiality undertaking for employees or contractors
6. Appendix B - Data Handling Procedures: Specific procedures for handling, storing, and transmitting confidential information
Find the document you need
Master Software Agreement
A Hong Kong law-governed framework agreement for software licensing and services that establishes standard terms for software procurement and implementation.
Software Development Partnership Agreement
A Hong Kong law-governed agreement establishing terms and conditions for a software development partnership between collaborating parties.
Custom Software Development Agreement
A Hong Kong law-governed agreement for custom software development, defining the terms between developer and client.
Software Non Disclosure Agreement
A Hong Kong law-governed agreement protecting confidential information in software-related business relationships.
Software Development Contract
A Hong Kong law-governed agreement setting out terms and conditions for software development services, including project specifications, deliverables, and IP rights.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
