Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Enterprise License Agreement
"I need an Enterprise License Agreement for a cloud-based CRM software deployment across our banking group's European operations, with particular focus on Swiss data protection requirements and multi-entity access rights for our 5,000 users."
1. Parties: Identification of the contracting parties, including full legal names, addresses, and registration details
2. Background: Context of the agreement, including brief description of the software and business purpose
3. Definitions: Detailed definitions of key terms used throughout the agreement
4. License Grant: Scope of license, permitted uses, and license restrictions
5. Intellectual Property Rights: Ownership of IP, protection measures, and third-party rights
6. License Fees and Payment Terms: Pricing, payment schedule, late payment consequences, and taxes
7. Term and Termination: Duration of agreement, renewal terms, termination rights and consequences
8. Licensee Obligations: Customer responsibilities, usage restrictions, and compliance requirements
9. Support and Maintenance: Standard support services, maintenance terms, and service levels
10. Warranties: Software warranties, compliance with specifications, and warranty disclaimers
11. Liability and Indemnification: Limitation of liability, indemnification obligations, and exclusions
12. Confidentiality: Protection of confidential information and trade secrets
13. General Provisions: Standard legal terms including governing law, jurisdiction, assignment, and notices
1. Professional Services: Terms for implementation, configuration, and training services if provided
2. Service Level Agreement: Detailed performance metrics and remedies for cloud-based solutions
3. Data Processing Agreement: Required when personal data processing is involved, ensuring FADP compliance
4. Hardware Terms: Include when specific hardware is required or provided with the software
5. Source Code Escrow: Terms for source code deposit and release conditions if agreed
6. Disaster Recovery: Business continuity and disaster recovery requirements for critical systems
7. Export Control: Necessary for software subject to export control regulations
8. Change Control: Procedures for managing changes to software or services scope
1. Schedule 1 - Licensed Software: Detailed description of licensed software components and specifications
2. Schedule 2 - Fee Schedule: Detailed breakdown of license fees, payment milestones, and pricing terms
3. Schedule 3 - Support Services: Detailed support and maintenance service levels and procedures
4. Schedule 4 - Technical Requirements: System requirements and technical specifications
5. Schedule 5 - Service Level Agreement: Detailed performance metrics, measurement, and remedies
6. Schedule 6 - Data Processing Terms: Detailed data protection and processing requirements
7. Schedule 7 - Implementation Plan: Project plan and milestones for software implementation if applicable
8. Appendix A - Authorized Users: Definition and categories of authorized users and access rights
9. Appendix B - Approved Affiliates: List of customer affiliates authorized to use the software
Authors
Authorized Users
Business Day
Confidential Information
Documentation
Effective Date
Error
Fees
Force Majeure Event
Intellectual Property Rights
Licensed Software
Maintenance Services
Modifications
Personal Data
Professional Services
Service Levels
Software Updates
Source Code
Specifications
Support Services
System Requirements
Term
Territory
Third-Party Software
User Acceptance Testing
Virus
Work Product
Authorized Devices
Backup Copy
Completion Date
Configuration
Critical Error
Customer Data
Data Protection Laws
Designated Contact
Disaster Recovery Plan
Enhancement
Enterprise-Wide License
Error Correction
Escrow Agent
Implementation Services
License Key
License Metrics
Major Release
Minor Release
Named User
Object Code
Patch
Permitted Purpose
Response Time
Service Credits
Site
Software Interface
Standard Business Hours
Technical Support
Usage Data
User Documentation
Warranty Period
License Restrictions
License Metrics
Intellectual Property Rights
Fees and Payment
Delivery and Acceptance
Implementation
Support and Maintenance
Service Levels
Warranties
Liability Limitation
Indemnification
Confidentiality
Data Protection
Security Requirements
Audit Rights
Term and Termination
Force Majeure
Assignment
Subcontracting
Dispute Resolution
Governing Law
Insurance
Compliance with Laws
Export Control
Anti-Corruption
Change Control
Business Continuity
Source Code Escrow
Notice
Entire Agreement
Amendment
Severability
Waiver
Third Party Rights
Usage Reporting
Documentation
Training
Performance Standards
Disaster Recovery
Exit Management
Financial Services
Healthcare
Pharmaceuticals
Manufacturing
Technology
Telecommunications
Insurance
Retail
Energy
Professional Services
Transportation
Education
Government
Chemical Industry
Construction
Legal
Information Technology
Procurement
Finance
Information Security
Risk Management
Compliance
Vendor Management
Enterprise Architecture
Operations
Software Asset Management
Chief Information Officer
Chief Technology Officer
IT Director
Procurement Manager
Legal Counsel
Contract Manager
Software Asset Manager
Information Security Officer
Enterprise Architect
IT Operations Manager
Vendor Management Director
Chief Financial Officer
Technology Procurement Specialist
Compliance Officer
Risk Manager
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.