Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing and receiving parties, including registration details for companies
2. Background: Context of the development project and purpose of sharing confidential information
3. Definitions: Definitions of key terms including Confidential Information, Development Project, Intellectual Property, and other relevant terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the development context
5. Obligations of Confidentiality: Core confidentiality obligations and permitted uses of confidential information
6. Protection Measures: Security measures required to protect confidential information
7. Intellectual Property Rights: Protection of existing IP and any IP created during the development process
8. Term and Survival: Duration of the agreement and surviving obligations
9. Return or Destruction of Confidential Information: Obligations regarding confidential information upon termination
10. Breach and Remedies: Consequences of breach and available remedies
11. General Provisions: Standard clauses including notices, governing law, jurisdiction, and entire agreement
1. Third Party Disclosure: Include when confidential information may need to be shared with contractors or subcontractors
2. Source Code Protection: Include for software development projects involving source code access
3. Data Protection Compliance: Include when personal information processing is involved, addressing POPIA requirements
4. Non-Solicitation: Include to prevent poaching of development team members
5. Escrow Arrangements: Include when source code or critical development materials need escrow protection
6. Export Control: Include when development involves internationally restricted technologies
7. Open Source Software: Include when development project involves open source components
8. Cloud Services: Include when development involves cloud-based services or storage
1. Schedule A - Specified Confidential Information: Detailed list of specific confidential information covered
2. Schedule B - Authorized Personnel: List of individuals authorized to access confidential information
3. Schedule C - Security Protocols: Specific security measures and protocols to be followed
4. Schedule D - Project Scope: Description of the development project scope and context
5. Schedule E - Third Party Recipients: List of approved third parties who may receive confidential information
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
