Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Confidentiality Agreement For Visitors
1. Parties: Identification of the company (host) and the visitor, including full legal names and addresses
2. Background: Brief context explaining the purpose of the visit and need for confidentiality
3. Definitions: Clear definitions of key terms, especially 'Confidential Information', 'Visit', and 'Permitted Purpose'
4. Scope of Confidentiality: Detailed description of what information is considered confidential and how it may be identified
5. Confidentiality Obligations: Core obligations regarding non-disclosure, non-use, and protection of confidential information
6. Security Measures: Specific measures the visitor must follow while on premises (e.g., no photography, restricted areas, escort requirements)
7. Duration of Obligations: Period for which confidentiality obligations remain in force
8. Return of Confidential Information: Requirements for handling any confidential information received during the visit
9. Data Protection: GDPR-compliant provisions regarding handling of personal data
10. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for disputes
1. Permitted Disclosures: Section describing circumstances under which confidential information may be disclosed (e.g., to regulatory authorities), used when visitor may need to make legitimate disclosures
2. Information Security Requirements: Detailed IT and physical security requirements, included when visitor will have access to sensitive systems or areas
3. Group Company Provisions: Provisions extending obligations to visitor's group companies, used when visitor represents a corporate entity
4. Photographs and Recordings: Specific provisions about photography and recording restrictions, used for highly sensitive facilities
5. Emergency Contacts: Contact information section for security or confidentiality breaches, used in high-security environments
1. Visitor Details Form: Form capturing visitor's personal information and visit details for record-keeping and security purposes
2. Specific Areas/Information Covered: List of specific areas, departments, or types of information the visitor will have access to
3. Security Protocols: Detailed security procedures and requirements specific to the visit or facility
Authors
Visit
Visitor
Permitted Purpose
Company
Company Premises
Authorized Representative
Trade Secrets
Personal Data
Security Requirements
Host
Restricted Areas
Working Day
Group Company
Confidentiality Period
Security Breach
Permitted Disclosures
Visit Duration
Escort
Access Hours
Data Protection Laws
GDPR
Business Hours
Protected Information
Visitor Badge
Security Protocol
Designated Areas
Emergency Contact
Visit Log
Affiliate
Data Protection
Security
Access Control
Duration
Permitted Use
Return of Information
Non-Disclosure
Visitor Obligations
Security Breach
Physical Security
Photography and Recording
Compliance
Enforcement
Liability
Governing Law
Jurisdiction
Emergency Procedures
Health and Safety
Intellectual Property
Force Majeure
Third Party Rights
Interpretation
Severability
Entire Agreement
Assignment
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.