Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing and receiving parties, including full legal names, addresses, and registration details as required under Qatar law
2. Background: Context of the agreement and the relationship between the parties, including the purpose of sharing confidential information
3. Definitions: Clear definitions of key terms, especially 'Confidential Information', 'Permitted Purpose', and 'Representatives'
4. Confidentiality Obligations: Core obligations regarding the protection and non-disclosure of confidential information
5. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to representatives and as required by law
6. Security Measures: Specific measures required to protect confidential information
7. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
8. Duration and Survival: Term of the agreement and which provisions survive termination
9. Breach and Remedies: Consequences of breach and available remedies, including injunctive relief
10. Governing Law and Jurisdiction: Specification of Qatar law as governing law and jurisdiction of Qatar courts
1. Non-Competition: Additional provisions restricting competitive activities, used when confidential information could provide competitive advantage
2. Non-Solicitation: Restrictions on soliciting employees or customers, included when business relationships need protection
3. Data Protection Compliance: Specific provisions for compliance with Qatar's data protection laws, required when personal data is involved
4. Assignment and Succession: Rules about transferring rights under the agreement, included for longer-term or complex relationships
5. Language Precedence: Required when the agreement is in both Arabic and English, specifying which version prevails
6. Representatives' Obligations: Detailed provisions regarding the obligations of representatives who receive confidential information, used in complex business relationships
7. Intellectual Property Rights: Additional provisions protecting IP rights, used when confidential information includes IP
1. Schedule 1 - Description of Confidential Information: Detailed listing or categorization of the confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals or roles authorized to receive confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols required for protecting confidential information
4. Appendix A - Form of Acknowledgment: Template for representatives to acknowledge their confidentiality obligations
5. Appendix B - Return/Destruction Certificate: Template certificate confirming return or destruction of confidential information
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
