Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and defines the parties to the agreement, including their legal names, addresses, and any defined terms for referring to them
2. Background: Sets out the context and purpose of the agreement, including the nature of the relationship between the parties
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information', 'Indemnified Parties', and other relevant terms
4. Confidentiality Obligations: Details the core obligations regarding the protection, use, and non-disclosure of confidential information
5. Permitted Disclosures: Specifies circumstances under which confidential information may be disclosed, including to employees, advisors, or as required by law
6. Security Measures: Outlines the required security measures and standards for protecting confidential information
7. Indemnification: Details the scope of indemnification, including covered losses and procedures for claiming indemnification
8. Return or Destruction of Confidential Information: Procedures for handling confidential information upon termination or request
9. Term and Termination: Specifies the duration of the agreement and circumstances for termination
10. General Provisions: Standard contractual provisions including governing law, jurisdiction, entire agreement, and amendments
1. Non-Competition: Restrictions on competitive activities, included when there's a risk of competitive use of confidential information
2. Non-Solicitation: Restrictions on soliciting employees or customers, included when protecting business relationships is crucial
3. Insurance Requirements: Specifies required insurance coverage to support indemnification obligations
4. Data Privacy Compliance: Specific obligations regarding personal data protection, included when personal data is involved
5. Export Control Compliance: Requirements for compliance with export control laws, included when dealing with controlled technical data
6. Audit Rights: Rights to audit compliance with confidentiality obligations, included for high-risk or regulated relationships
7. Alternative Dispute ReĂÜĚŇÖ±˛Ą: Procedures for resolving disputes through mediation or arbitration, included when preferred over litigation
1. Schedule 1 - Confidential Information: Detailed description or categories of information considered confidential under the agreement
2. Schedule 2 - Security Requirements: Specific technical and organizational security measures required for protecting confidential information
3. Schedule 3 - Authorized Recipients: List of individuals or roles authorized to access confidential information
4. Appendix A - Notice Requirements: Procedures and contact details for required notices under the agreement
5. Appendix B - Data Handling Procedures: Detailed procedures for handling, storing, and destroying confidential information
Find the exact document you need
Indemnity Confidentiality Agreement
A U.S. law-governed agreement combining confidentiality obligations with indemnification provisions to protect sensitive information and establish liability frameworks.
Owner Affidavit And Indemnity Agreement
A U.S. legal document containing property owner's sworn statements and indemnification provisions used in real estate transactions.
Indemnification And Hold Harmless Affidavit
A U.S. legal document combining a sworn statement with indemnification provisions to protect parties against liability and losses.
Affidavit Of Understanding And Indemnity And Hold Harmless Agreement
A U.S. legal document combining a sworn statement of understanding with indemnification and hold harmless provisions, requiring notarization.
Affidavit Of Lost Promissory Note And Indemnity Agreement
A U.S. legal document combining an affidavit of lost promissory note with indemnification provisions, governed by UCC Article 3.
Affidavit And Indemnification Agreement
A U.S. legal document combining sworn statements with indemnification provisions, requiring notarization and compliance with federal and state laws.
łŇ±đ˛Ôľ±±đ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; łŇ±đ˛Ôľ±±đ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
