Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing and receiving parties, including registration/ID numbers and addresses
2. Background: Context of the agreement and purpose for sharing confidential information
3. Definitions: Key terms including 'Confidential Information', 'Personal Information', 'Authorized Purpose', and other relevant definitions
4. Interpretation: Rules for interpreting the agreement, including general interpretation principles
5. Scope of Confidentiality: Detailed description of what constitutes confidential information under the agreement
6. Obligations of Confidentiality: Core confidentiality obligations, including storage, handling, and protection measures
7. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees and professional advisors
8. Data Protection: Specific provisions relating to POPIA compliance and personal information protection
9. Security Measures: Required security measures for protecting confidential information
10. Return or Destruction: Obligations regarding return or destruction of confidential information
11. Duration and Survival: Indefinite nature of obligations and which provisions survive termination
12. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
13. General Provisions: Standard contractual provisions including governing law, jurisdiction, and notices
1. Intellectual Property: Required when confidential information includes IP rights or when new IP might be created
2. Electronic Communications: Include when parties will primarily exchange confidential information electronically
3. Competition Law Compliance: Required when parties are competitors or information sharing could affect market competition
4. Export Control: Include when confidential information may be subject to export control regulations
5. Group Company Rights: Include when either party needs to share information with group companies
6. Subcontractors: Required when parties may need to disclose to subcontractors
7. Force Majeure: Include when specific events might affect ability to protect information
8. Insurance: Include when parties require specific insurance coverage for information protection
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Authorized Personnel: List of personnel authorized to access confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols to be followed
4. Schedule 4 - Approved Subcontractors: List of approved subcontractors if relevant
5. Appendix A - Data Processing Terms: Detailed POPIA compliance terms if personal information is involved
6. Appendix B - Information Security Requirements: Technical and organizational security requirements
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
