Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Enterprise License Agreement
"I need an Enterprise License Agreement for a cloud-based CRM software deployment across our financial services company's Australian operations, with specific provisions for data privacy compliance and integration with our existing systems, to be implemented by March 2025."
1. Parties: Identifies the contracting parties with full legal names and details
2. Background: Sets out the context and purpose of the agreement
3. Definitions: Defines key terms used throughout the agreement
4. License Grant: Specifies the scope, nature, and limitations of the license being granted
5. License Restrictions: Details prohibited uses and activities under the license
6. Intellectual Property Rights: Addresses ownership and protection of IP rights
7. Fees and Payment: Details the payment terms, fees, and invoicing procedures
8. Term and Termination: Specifies duration, renewal terms, and termination rights
9. Maintenance and Support: Outlines support services and maintenance obligations
10. Warranties: States warranties provided and disclaimers
11. Confidentiality: Governs the handling and protection of confidential information
12. Indemnification: Details mutual indemnification obligations
13. Limitation of Liability: Sets out liability caps and exclusions
14. Insurance: Specifies required insurance coverage
15. Dispute Resolution: Outlines process for resolving disputes
16. General Provisions: Contains standard boilerplate clauses
1. Data Protection and Privacy: Required when personal data processing is involved - addresses data handling, security requirements, and privacy compliance
2. Service Levels: Include when specific performance metrics and service levels are required
3. Professional Services: Required when implementation, training, or consulting services are included
4. Audit Rights: Include when regular compliance or usage audits are needed
5. Disaster Recovery: Required for critical enterprise systems requiring business continuity provisions
6. Hardware Provisions: Include when hardware is provided as part of the solution
7. Security Requirements: Required for solutions handling sensitive data or requiring specific security standards
8. Change Control: Include when formal processes for changes to services or software are needed
9. Export Control: Required when software or data may be subject to export regulations
1. Schedule 1 - Licensed Software: Detailed description of licensed software components and specifications
2. Schedule 2 - Service Level Agreement: Detailed service levels, metrics, and remedies
3. Schedule 3 - Support Services: Details of support and maintenance services
4. Schedule 4 - Fee Schedule: Detailed breakdown of all fees and payment terms
5. Schedule 5 - Technical Requirements: System requirements and technical specifications
6. Schedule 6 - Implementation Plan: Timeline and milestones for software implementation
7. Appendix A - Authorized Users: Definition and limitations of authorized users
8. Appendix B - Acceptable Use Policy: Detailed acceptable use terms and restrictions
9. Appendix C - Security Requirements: Detailed security standards and requirements
Authors
Affiliate
Authorized Users
Business Day
Commencement Date
Confidential Information
Configuration
Core Hours
Critical Error
Customer Data
Documentation
Effective Date
Enterprise
Error
Fees
Force Majeure Event
Harmful Code
Implementation Services
Initial Term
Intellectual Property Rights
License Metrics
Licensed Software
Maintenance Release
Major Release
Minor Release
Normal Business Hours
Parties
Personal Information
Professional Services
Related Body Corporate
Renewal Term
Response Time
Service Credits
Service Levels
Software
Source Code
Specifications
Support Hours
Support Services
System Requirements
Term
Territory
Third Party Software
Updates
Upgrades
User Acceptance Testing
User Documentation
Virus
Work Product
License Restrictions
Intellectual Property
Fees and Payment
Term and Termination
Maintenance and Support
Service Levels
Warranties
Indemnification
Limitation of Liability
Confidentiality
Data Protection
Privacy
Security
Audit Rights
Dispute Resolution
Force Majeure
Assignment
Subcontracting
Insurance
Compliance with Laws
Export Control
Anti-Bribery
Change Control
Notice
Governing Law
Entire Agreement
Severability
Variation
Waiver
Third Party Rights
Counterparts
Survival
Performance Obligations
Acceptance Testing
Implementation
Training
Documentation
Business Continuity
Disaster Recovery
Information Technology
Financial Services
Healthcare
Manufacturing
Retail
Professional Services
Government
Education
Telecommunications
Mining
Energy
Construction
Transportation
Media and Entertainment
Legal
Information Technology
Procurement
Finance
Compliance
Risk Management
Operations
Security
Vendor Management
Enterprise Architecture
Software Asset Management
Chief Information Officer
Chief Technology Officer
IT Director
Procurement Manager
Legal Counsel
Contract Manager
Software License Manager
IT Security Manager
Chief Financial Officer
Technology Procurement Specialist
Enterprise Architect
Vendor Management Director
Risk Management Officer
Compliance Officer
Operations Director
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.