Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Binding Confidentiality Agreement
"I need a Binding Confidentiality Agreement for my technology startup to protect our proprietary software code and development plans when sharing them with potential investors from January 2025, with specific provisions for source code protection and data security protocols."
1. Parties: Identifies and provides full details of all parties entering into the agreement
2. Background: Explains the context and purpose of the agreement, including the relationship between the parties
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information'
4. Scope of Confidential Information: Clearly specifies what information is covered by the agreement
5. Obligations of Confidentiality: Details the core obligations to maintain confidentiality and permitted uses of the information
6. Security Measures: Specifies required measures to protect confidential information
7. Term and Survival: Specifies how long the agreement lasts and which obligations survive termination
8. Return or Destruction of Information: Procedures for handling confidential information after the agreement ends
9. Breach and Remedies: Consequences of breaching the agreement and available remedies
10. General Provisions: Standard legal provisions including governing law, jurisdiction, and entire agreement
1. Third Party Disclosure: Include when confidential information may need to be shared with third parties like contractors or advisors
2. Intellectual Property Rights: Include when confidential information includes IP that needs specific protection
3. Data Privacy Compliance: Include when confidential information includes personal data subject to privacy laws
4. Export Control: Include when information may be subject to international transfer restrictions
5. Competitive Activity Restrictions: Include when parties need to agree on non-compete or non-solicitation provisions
6. Force Majeure: Include when parties want to address circumstances beyond their control affecting confidentiality obligations
7. Insurance Requirements: Include when parties must maintain specific insurance coverage for confidential information
8. Auditing Rights: Include when one party requires rights to audit the other's compliance with confidentiality obligations
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of information covered by the agreement
2. Schedule 2 - Authorized Personnel: List of individuals authorized to access the confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures required for protecting the information
4. Schedule 4 - Approved Third Party Recipients: List of approved third parties who may receive the confidential information
5. Appendix A - Information Handling Procedures: Detailed procedures for handling, storing, and transmitting confidential information
6. Appendix B - Incident Response Plan: Procedures to follow in case of unauthorized disclosure or security breach
Authors
Disclosing Party
Receiving Party
Authorized Purpose
Authorized Recipients
Business Day
Commencement Date
Confidentiality Obligations
Permitted Disclosure
Representatives
Security Measures
Term
Trade Secrets
Intellectual Property Rights
Personal Information
Proprietary Information
Related Body Corporate
Confidential Materials
Excluded Information
Force Majeure Event
Notice
Services
Unauthorized Disclosure
Data Breach
Permitted Use
Non-Disclosure
Information Security
Data Protection
Term and Termination
Return of Information
Permitted Use
Third Party Disclosure
Breach and Remedies
Intellectual Property
Governing Law
Dispute Resolution
Indemnification
Assignment
Survival
Force Majeure
Notices
Severability
Entire Agreement
Amendment
Counterparts
Privacy Compliance
Non-Solicitation
Non-Competition
Jurisdiction
Technology
Healthcare
Financial Services
Manufacturing
Professional Services
Research and Development
Biotechnology
Real Estate
Energy
Telecommunications
Education
Retail
Media and Entertainment
Construction
Legal Services
Legal
Human Resources
Executive Leadership
Business Development
Research and Development
Information Technology
Finance
Operations
Procurement
Corporate Strategy
Intellectual Property
Mergers and Acquisitions
Innovation
Product Development
Information Security
Chief Executive Officer
Legal Counsel
Business Development Manager
Human Resources Director
Project Manager
Research Scientist
Investment Analyst
Chief Technology Officer
Procurement Manager
Operations Director
Strategic Partnership Manager
Chief Financial Officer
Consultant
Product Development Manager
Intellectual Property Manager
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.