Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Software License Subscription
"I need a Software License Subscription agreement for our cloud-based accounting software that will be sold to enterprise customers in Germany, with specific provisions for GDPR compliance and data center location requirements."
1. Parties: Identification of contracting parties with full legal names and addresses
2. Background: Context of the agreement and brief description of the software solution
3. Definitions: Defined terms used throughout the agreement
4. License Grant: Scope, nature, and limitations of the software license
5. Subscription Terms: Duration, renewal, and subscription-specific provisions
6. Fees and Payment: Pricing, payment terms, and invoicing procedures
7. Service Levels: Performance standards, availability, and support commitments
8. User Access and Authentication: Rules for user management and access control
9. Data Protection and Security: GDPR compliance and data security measures
10. Intellectual Property Rights: IP ownership, protection, and related warranties
11. Confidentiality: Protection of confidential information and trade secrets
12. Warranties and Disclaimers: Software warranties and limitation of liability
13. Term and Termination: Contract duration, termination rights, and consequences
14. General Provisions: Standard legal clauses including governing law and jurisdiction
1. Professional Services: Include when implementation or consulting services are part of the agreement
2. Third-Party Software: Include when the solution incorporates third-party software components
3. High-Availability Requirements: Include for mission-critical applications requiring specific uptime guarantees
4. Disaster Recovery: Include when specific disaster recovery procedures are required
5. Export Control: Include when software is subject to export regulations
6. Source Code Escrow: Include when source code escrow arrangements are required
7. Custom Development: Include when custom development services are part of the subscription
8. Training Services: Include when training services are part of the subscription package
1. Schedule 1 - Software Description: Detailed description of the software, modules, and functionality
2. Schedule 2 - Service Level Agreement: Detailed service levels, metrics, and remedies
3. Schedule 3 - Support Services: Support terms, processes, and response times
4. Schedule 4 - Fee Schedule: Detailed pricing, payment terms, and calculation methods
5. Schedule 5 - Technical Requirements: Hardware and software requirements for using the solution
6. Schedule 6 - Data Processing Agreement: GDPR-compliant data processing terms and details
7. Schedule 7 - Security Requirements: Security standards, protocols, and compliance requirements
8. Appendix A - Authorized Users: User categories and access rights definition
9. Appendix B - Acceptable Use Policy: Rules and restrictions for using the software
Authors
Agreement
Authorized Users
Business Day
Confidential Information
Customer Data
Documentation
Effective Date
Fees
Force Majeure Event
GDPR
Initial Term
Intellectual Property Rights
License Key
Maintenance Services
Malicious Code
Personal Data
Professional Services
Renewal Term
Service Credits
Service Levels
Software
Subscription Period
Subscription Services
Support Hours
Support Services
System Requirements
Term
Territory
Third-Party Software
Updates
Upgrades
User Credentials
Working Hours
Data Processing Agreement
Emergency Maintenance
Help Desk
Installation Site
Licensed Capacity
Major Release
Minor Release
Patch
Planned Maintenance
Response Time
Resolution Time
Service Level Failure
Severity Level
Source Code
Specifications
Subscription Fee
Technical Contact
Usage Data
Virus
Subscription Term
Payment
Service Levels
Support Services
User Access
Data Protection
Data Security
Confidentiality
Intellectual Property
Warranties
Limitation of Liability
Indemnification
Force Majeure
Term and Termination
Assignment
Audit Rights
Documentation
Training
Implementation
Maintenance
Updates and Upgrades
Performance Standards
Usage Restrictions
Acceptable Use
Disaster Recovery
Business Continuity
Export Control
Source Code Escrow
Third-Party Software
Compliance with Laws
Notice
Dispute Resolution
Governing Law
Severability
Entire Agreement
Amendment
Waiver
No Partnership
Subcontracting
Insurance
Survival
Information Technology
Financial Services
Healthcare
Manufacturing
Retail
Professional Services
Education
Telecommunications
Transportation
Energy
Insurance
Real Estate
Media and Entertainment
Public Sector
Legal
Information Technology
Procurement
Information Security
Risk & Compliance
Vendor Management
Enterprise Architecture
Operations
Finance
Data Protection
Chief Technology Officer
Chief Information Officer
Legal Counsel
IT Director
Procurement Manager
Software License Manager
Information Security Officer
Data Protection Officer
Contract Manager
Technology Procurement Specialist
Vendor Management Lead
Enterprise Architect
IT Operations Manager
Risk & Compliance Manager
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.