Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Common Development And Distribution License
1. Parties: Identification of the licensor and potential licensees, including legal entities and individuals who may use or contribute to the software
2. Background: Context of the license, including the software's purpose and the intent to make it available under open source terms
3. Definitions: Detailed definitions of technical and legal terms used throughout the license, including 'Covered Software', 'Modifications', 'Contributor', etc.
4. Grant of License: Explicit grant of rights to use, modify, and distribute the software under specified conditions
5. Distribution Obligations: Requirements for distributing the original and modified versions of the software
6. Modifications: Terms governing how modifications to the software can be made and distributed
7. Development Obligations: Requirements for contributing to and developing the software
8. GDPR Compliance: Provisions ensuring compliance with EU data protection regulations
9. Intellectual Property Rights: Statement of IP rights and handling of patents and trademarks
10. Warranty Disclaimer: Limitations of warranty and liability under Danish law
11. Termination: Conditions under which the license may be terminated and consequences of termination
12. Governing Law: Specification of Danish law as governing law and jurisdiction
1. Commercial Distribution: Additional terms for commercial distribution of the software, used when commercial use is anticipated
2. Third-Party Components: Handling of third-party software components, used when the software incorporates external libraries
3. Export Controls: Compliance with export regulations, used when international distribution is expected
4. Service Level Commitments: Performance and maintenance standards, used when offering supported versions
5. Contributor Agreement: Additional terms for contributors, used in projects expecting significant external contributions
6. Security Requirements: Specific security obligations, used for software handling sensitive data
7. Compliance with Industry Standards: Additional compliance requirements, used for industry-specific applications
1. Schedule A - Software Description: Technical description of the covered software and its components
2. Schedule B - Required Notices: Text of required copyright and license notices
3. Schedule C - Compatible Licenses: List of licenses compatible with this CDDL
4. Schedule D - Contribution Guidelines: Technical and procedural requirements for contributions
5. Schedule E - API Documentation: Documentation of public APIs covered by the license
6. Appendix 1 - Source Code Availability: Information about where and how to access the source code
7. Appendix 2 - Build Instructions: Technical instructions for building the software
Authors
Applicable Law
Contributor
Contribution
Covered Software
Derivative Works
Distribute
Documentation
Effective Date
Electronic Form
End User
Initial Developer
Intellectual Property Rights
License
Modifications
Original Code
Patent Claims
Personal Data
Source Code
Executable Code
Software
Third Party Software
You (or Your)
Larger Work
Commercial Use
Contributor Version
Data Protection Laws
Development Process
Distribution Medium
External Deployment
Licensed Patents
Object Code
Open Source
Parties
Requirements
Secondary License
Submission Date
Technical Documentation
Territory
User Documentation
Distribution Rights
Intellectual Property
Development Rights
Contributor Obligations
Patent Rights
Trademark Usage
Warranty Disclaimer
Liability Limitation
Compliance Requirements
Data Protection
Source Code Access
Modification Rights
Distribution Requirements
Third Party Rights
Termination
Governing Law
Dispute Resolution
Notice Requirements
Documentation Requirements
Contribution Process
Commercial Distribution
Export Control
Compatibility Requirements
Security Obligations
Indemnification
Assignment
Severability
Force Majeure
Amendment Process
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.