Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the contracting parties, including full legal names, commercial registration numbers, and authorized representatives
2. Background: Context of the agreement and brief description of the parties' business relationship and project objectives
3. Definitions: Detailed definitions of technical terms, project-specific terminology, and key concepts used throughout the agreement
4. Scope of Services: Detailed description of development services to be provided, including deliverables and technical requirements
5. Project Timeline: Development phases, milestones, and delivery schedules
6. Payment Terms: Fee structure, payment schedule, invoicing requirements, and currency specifications
7. Acceptance Testing: Procedures for testing deliverables, acceptance criteria, and rejection/revision process
8. Intellectual Property Rights: Ownership and licensing of developed materials, pre-existing IP, and third-party components
9. Confidentiality: Protection of confidential information, trade secrets, and project-related data
10. Data Protection and Security: Compliance with Saudi data protection laws and security requirements
11. Warranties and Representations: Service quality guarantees, compliance with laws, and technical standards
12. Liability and Indemnification: Limitation of liability, indemnification obligations, and risk allocation
13. Term and Termination: Agreement duration, renewal terms, and termination rights and procedures
14. Force Majeure: Events excusing performance and related procedures
15. Governing Law and Dispute Resolution: Saudi law application and dispute resolution mechanisms
16. General Provisions: Standard clauses including notices, amendments, and entire agreement provisions
1. Change Management: Procedures for handling change requests and scope modifications - include for complex projects with likely changes
2. Service Level Agreement: Specific performance metrics and service levels - include for ongoing service components
3. Hardware Requirements: Specifications for hardware needed - include if hardware is part of the development environment
4. Third-Party Components: Management of third-party software and services - include if solution involves third-party elements
5. Knowledge Transfer: Training and documentation requirements - include if client team needs training
6. Source Code Escrow: Source code deposit and release conditions - include for business-critical applications
7. Disaster Recovery: Recovery procedures and business continuity - include for critical systems
8. Insurance Requirements: Specific insurance coverage obligations - include for high-value or high-risk projects
9. Personnel Requirements: Key personnel commitments and qualifications - include if specific expertise is crucial
10. Compliance with Specific Regulations: Industry-specific regulatory requirements - include for regulated sectors
1. Schedule A - Technical Specifications: Detailed technical requirements, architecture, and performance specifications
2. Schedule B - Project Plan: Detailed project timeline, milestones, and resource allocation
3. Schedule C - Pricing and Payment Schedule: Detailed breakdown of fees, payment milestones, and payment terms
4. Schedule D - Service Levels: Performance metrics, response times, and service level commitments
5. Schedule E - Testing Procedures: Detailed acceptance testing procedures and criteria
6. Schedule F - Personnel: Key personnel, roles, and responsibilities
7. Schedule G - Security Requirements: Detailed security protocols and compliance requirements
8. Appendix 1 - Change Request Form: Standard form for requesting and documenting changes
9. Appendix 2 - Acceptance Certificate: Standard form for deliverable acceptance
10. Appendix 3 - Progress Report Template: Template for regular project status reporting
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
