ºÚÁÏÊÓÆµ

Typical NDA Template for United States

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Typical NDA

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Typical NDA

"I need a Typical NDA to protect confidential information that will be shared with a software development contractor who will be working on our new AI product, starting from March 2025, with special emphasis on source code protection and data security measures."

Document background
The Typical NDA serves as a fundamental business document in the United States, essential for protecting proprietary information, trade secrets, and confidential business data. It's commonly used before business discussions, during partnership negotiations, or when engaging with employees and contractors. This agreement, governed by both federal and state laws, includes specific provisions for information handling, permitted uses, duration of confidentiality obligations, and consequences of breach. The document typically defines what constitutes confidential information, outlines security measures, and specifies return or destruction requirements for sensitive materials.
Suggested Sections

1. Parties: Identification of the disclosing and receiving parties

2. Background: Context and purpose of the NDA

3. Definitions: Key terms including Confidential Information, Trade Secrets, Permitted Purpose

4. Confidentiality Obligations: Core obligations regarding protection and non-disclosure

5. Permitted Use: Allowed uses of confidential information

6. Term and Termination: Duration of agreement and termination provisions

7. Return of Information: Requirements for returning or destroying confidential information

Optional Sections

1. Non-Solicitation: Prevents poaching of employees or clients, typically included when protecting business relationships is crucial

2. Non-Competition: Restricts competitive activities, included when permitted by state law and necessary for business protection

3. Export Control: Compliance with export regulations, required when international parties are involved

Suggested Schedules

1. Description of Confidential Information: Detailed list of specific confidential information covered

2. Authorized Representatives: List of individuals authorized to receive confidential information

3. Security Protocols: Specific security measures required for information protection

Authors

Alex Denne

Head of Growth (Open Source Law) @ ºÚÁÏÊÓÆµ | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Clauses































Industries

Federal Trade Secrets Laws: Primary federal legislation including the Defend Trade Secrets Act (DTSA) of 2016 and Economic Espionage Act of 1996, which provide federal protection for trade secrets and remedies for misappropriation

State Trade Secret Laws: State-level protections including the Uniform Trade Secrets Act (UTSA) and state-specific variations that govern trade secret protection at the state level

Employment Laws: Relevant employment regulations including state-specific laws on employee mobility, non-compete restrictions, whistleblower protections, and National Labor Relations Act considerations

Contract Law Fundamentals: Basic contract law requirements including state-specific contract formation rules, consideration requirements, and enforceability standards

Statute of Limitations: Time limitations for bringing legal actions, including state-specific periods for breach of contract claims and federal limitation periods

Industry-Specific Regulations: Sector-specific requirements such as HIPAA for healthcare, financial services regulations, and government contracting requirements

Special Considerations: Additional regulatory requirements including securities laws for public companies, intellectual property laws, and export control regulations for international parties

Remedies and Enforcement: Legal remedies available under state law, requirements for injunctive relief, and methods for calculating damages in case of breach

Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

No items found.

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

³Ò±ð²Ô¾±±ð’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.