Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing party and receiving party, including full legal names and contact details
2. Background: Brief context explaining the purpose of sharing confidential information and the relationship between the parties
3. Definitions: Key terms including 'Confidential Information', 'Permitted Purpose', and other relevant definitions
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Confidentiality Obligations: Core obligations regarding the protection, non-disclosure, and permitted use of confidential information
6. Security Measures: Specific measures required to protect confidential information, aligned with POPIA requirements
7. Duration and Survival: Term of the agreement and survival of obligations after termination
8. Return or Destruction of Information: Requirements for handling confidential information upon termination or request
9. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
10. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Data Protection Compliance: Detailed POPIA compliance provisions, necessary when personal information as defined in POPIA is involved
2. Digital Security Measures: Specific provisions for digital information protection, required when confidential information is stored or transmitted electronically
3. International Transfer: Provisions governing cross-border transfer of information, needed when parties are in different countries
4. Publicity Restrictions: Additional restrictions on public statements or acknowledgments, useful for high-profile individuals
5. Non-Solicitation: Prevents solicitation of employees or clients, relevant when business relationships are involved
6. Monitoring and Audit Rights: Rights to monitor compliance, useful for high-risk or sensitive information
1. Schedule 1: Description of Confidential Information: Detailed list or categories of confidential information covered by the agreement
2. Schedule 2: Authorized Recipients: List of individuals authorized to access the confidential information, if applicable
3. Schedule 3: Security Protocols: Specific security measures and protocols required for protecting the confidential information
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
