Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
NDA Tech Company
"I need an NDA Tech Company agreement for my Australian AI startup to use with potential investors and development partners, with extra protection for our machine learning algorithms and training data sets. The agreement needs to be ready by January 2025 when we start our Series A funding round."
1. Parties: Identification of the disclosing and receiving parties, including ACN/ABN and registered addresses
2. Background: Context of the agreement, purpose of sharing confidential information, and nature of the business relationship
3. Definitions: Detailed definitions including 'Confidential Information', 'Intellectual Property Rights', 'Technical Data', 'Trade Secrets', and other key terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information, including technical specifications, source code, algorithms, customer data, etc.
5. Obligations of Receiving Party: Core confidentiality obligations, security measures, and permitted uses of confidential information
6. Security Requirements: Specific measures required to protect confidential information, including digital security protocols
7. Term and Survival: Duration of the agreement and obligations that continue after termination
8. Return or Destruction of Confidential Information: Requirements for handling confidential information upon termination or request
9. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
10. General Provisions: Standard provisions including governing law, jurisdiction, and entire agreement
1. Third Party Disclosure: Include when the receiving party may need to share information with contractors, advisors, or affiliated companies
2. Data Privacy Compliance: Include when personal data may be part of the confidential information
3. Source Code Protection: Include for software companies when source code access is involved
4. Cloud Storage and Transfer: Include when confidential information will be stored or transferred using cloud services
5. Reverse Engineering Prohibition: Include for hardware or software products
6. Export Control: Include when dealing with international data transfers or regulated technology
7. Non-Solicitation: Include to prevent poaching of employees or clients
8. Competing Projects: Include when parties may be working on similar technologies
1. Schedule 1 - Specified Confidential Information: Detailed list of specific confidential information covered
2. Schedule 2 - Authorized Personnel: List of individuals authorized to access confidential information
3. Schedule 3 - Security Protocols: Detailed technical security requirements and procedures
4. Schedule 4 - Approved Subcontractors: List of approved third parties who may access information
5. Appendix A - Data Handling Procedures: Specific procedures for handling different types of confidential data
6. Appendix B - Incident Response Plan: Procedures for handling potential data breaches or unauthorized disclosures
Authors
Permitted Purpose
Disclosing Party
Receiving Party
Representatives
Technical Data
Source Code
Intellectual Property Rights
Trade Secrets
Proprietary Information
Personal Information
Security Requirements
Authorized Personnel
Digital Assets
Technical Specifications
Development Tools
Associated Documentation
Derivative Works
Cloud Services
Data Protection Laws
Security Breach
Confidential Materials
Technical Knowledge
Business Information
API Documentation
System Architecture
Access Credentials
Authorized Devices
Secure Environment
Data Storage Systems
Transmission Methods
Related Bodies Corporate
Subsequent Disclosure
Excluded Information
Commercial Information
Test Data
Compliance Requirements
Security Protocols
Incident Response
Permitted Recipients
Permitted Use
Information Security
Data Protection
Intellectual Property
Return of Information
Term and Termination
Non-Disclosure
Breach and Remedies
Technical Safeguards
Access Control
Third Party Disclosure
Non-Circumvention
Digital Security
Cloud Storage
Data Transfer
Source Code Protection
Reverse Engineering
Regulatory Compliance
Liability
Indemnification
Dispute Resolution
Governing Law
Force Majeure
Severability
Assignment
Entire Agreement
Survival
Notices
Amendments
Information Technology
Software Development
Artificial Intelligence
Cybersecurity
Cloud Computing
Data Analytics
Fintech
Telecommunications
Digital Healthcare
Internet of Things
Blockchain
E-commerce
Gaming and Entertainment
Enterprise Software
Legal
Information Technology
Research and Development
Product Development
Information Security
Executive Leadership
Human Resources
Business Development
Procurement
Compliance
Innovation
Chief Technology Officer
Chief Executive Officer
Legal Counsel
Information Security Manager
Software Development Manager
Project Manager
Business Development Director
Research and Development Lead
Product Manager
Systems Architect
Technical Lead
Procurement Manager
Innovation Director
Data Protection Officer
Compliance Manager
HR Director
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.