Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing party (typically the software company) and receiving party (developer/contractor), including full legal names and addresses
2. Background: Context of the agreement, stating the software development project purpose and need for confidentiality
3. Definitions: Key terms including 'Confidential Information', 'Software', 'Source Code', 'Technical Documentation', 'Intellectual Property Rights', and 'Trade Secrets'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in software development context, including code, algorithms, designs, and technical specifications
5. Obligations of Confidentiality: Core confidentiality obligations, including use restrictions, security measures, and standard of care
6. Permitted Disclosures: Circumstances under which confidential information can be shared with employees, subcontractors, or other authorized parties
7. Security Measures: Specific technical and organizational measures required to protect confidential information, including digital security protocols
8. Term and Survival: Duration of the agreement and surviving obligations after termination
9. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon project completion or termination
10. Breach and Remedies: Consequences of breach and available remedies, including injunctive relief
11. General Provisions: Standard contractual provisions including governing law, jurisdiction, and entire agreement
1. Non-Compete Clause: Optional restriction on competing activities, used when the developer may gain significant competitive insights
2. Non-Solicitation: Optional restriction on soliciting employees or clients, relevant for longer-term development projects
3. Intellectual Property Rights: Detailed section on IP ownership and rights, needed when development involves creation of new IP
4. Data Protection Compliance: Additional provisions for compliance with data protection laws, required if personal data is involved
5. Source Code Protection: Specific provisions for source code protection, needed for projects involving access to core software
6. Audit Rights: Right to audit compliance with security measures, useful for high-security projects
1. Schedule A - Description of Project: Detailed description of the software development project scope and context
2. Schedule B - Security Protocols: Specific technical and organizational security measures required
3. Schedule C - Authorized Personnel: List of individuals authorized to access confidential information
4. Appendix 1 - Data Handling Procedures: Detailed procedures for handling, storing, and disposing of confidential information
5. Appendix 2 - Form of Confidentiality Agreement for Employees: Template for confidentiality agreements to be signed by employees/contractors
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
