Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full legal details of all parties entering into the agreement
2. Background: Explains the context and purpose of the agreement, including the nature of the business relationship
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information'
4. Scope of Confidential Information: Clearly outlines what information is considered confidential under the agreement
5. Obligations of Confidentiality: Details the core obligations to maintain confidentiality and permitted uses of the information
6. Security Measures: Specifies required measures to protect confidential information
7. Term and Survival: Specifies how long the agreement remains in effect and which obligations survive termination
8. Return or Destruction of Information: Requirements for handling confidential information upon termination or request
9. Breach and Remedies: Outlines consequences of breach and available remedies
10. General Provisions: Standard contract clauses including governing law, jurisdiction, and entire agreement
1. Permitted Disclosures: Specifies circumstances where disclosure is allowed (e.g., to professional advisors, with court orders). Include when parties need flexibility in sharing information
2. Non-Competition: Restricts competitive activities. Include when sharing sensitive business information that could create competitive risks
3. Non-Solicitation: Prevents poaching of employees or clients. Include when parties have access to personnel or customer information
4. Intellectual Property Rights: Clarifies ownership and rights regarding any IP disclosed. Include when sharing technical or creative information
5. Data Protection Compliance: Specific obligations regarding personal data handling. Include when personal data might be shared
6. Representatives and Warranties: Additional promises about information accuracy or authority. Include for complex or high-value arrangements
7. Insurance Requirements: Specifies required insurance coverage. Include for high-risk information sharing
8. Dispute Resolution: Details specific dispute resolution procedures. Include when parties want to specify mediation or arbitration
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures required
4. Schedule 4 - Approved Third Party Recipients: Pre-approved third parties who may receive the confidential information
5. Appendix A - Information Handling Procedures: Detailed procedures for handling, storing, and disposing of confidential information
6. Appendix B - Breach Notification Procedures: Step-by-step procedures for reporting and handling potential breaches
Find the exact document you need
Confidentiality Non Disclosure Agreement Form
Australian-law governed NDA template for protecting confidential information in business relationships, compliant with Australian federal and state regulations.
Business Confidentiality Agreement Form
An Australian-law governed confidentiality agreement protecting sensitive business information shared between parties.
Mutual Non Disclosure Agreement Form
An Australian law-governed Mutual Non-Disclosure Agreement establishing reciprocal confidentiality obligations between parties exchanging sensitive information.
Non Disclosure Letter
An Australian-law governed formal letter establishing confidentiality obligations between parties, serving as a streamlined alternative to a full non-disclosure agreement.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
