Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of all parties to the agreement, including registration numbers and addresses
2. Background: Context of the project and purpose of the NDA
3. Definitions: Definitions of key terms including 'Confidential Information', 'Project', 'Authorized Purpose', and 'Representatives'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information specific to the project
5. Obligations of Confidentiality: Core confidentiality obligations, including use restrictions and security measures
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees and advisors
7. Duration of Obligations: Period for which confidentiality obligations remain in force
8. Return or Destruction of Confidential Information: Procedures for handling confidential information after project completion or termination
9. Breach and Remedies: Consequences of breach and available remedies
10. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Data Protection Compliance: Specific provisions addressing POPIA compliance, used when personal information will be shared
2. Intellectual Property Rights: Additional provisions protecting IP rights, used when project involves significant IP
3. Non-Solicitation: Prevents poaching of employees, used when parties will have significant exposure to each other's staff
4. Publicity and Announcements: Controls over public statements about the project, used for high-profile projects
5. Competition Law Compliance: Specific provisions ensuring compliance with competition law, used when parties are competitors
6. Force Majeure: Provisions for unforeseen circumstances affecting project delivery, used for longer-term projects
1. Schedule 1 - Project Description: Detailed description of the project scope and context
2. Schedule 2 - Authorized Personnel: List of individuals authorized to access confidential information
3. Schedule 3 - Security Protocols: Specific security measures for handling confidential information
4. Schedule 4 - Information Classification: Categories and classification of different types of confidential information
5. Appendix A - Contact Details: Contact information for key personnel and notices
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
