Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Confidentiality Agreement Policy
1. Parties: Identification of the organization implementing the policy and scope of application (employees, contractors, etc.)
2. Background: Context of the policy, its purpose, and general principles of confidentiality
3. Definitions: Clear definitions of 'Confidential Information', 'Trade Secrets', 'Personal Data', and other key terms
4. Scope of Confidential Information: Detailed categorization of what constitutes confidential information within the organization
5. General Obligations: Basic confidentiality obligations and expected behavior of all covered individuals
6. Security Measures: Required procedures and measures for protecting confidential information
7. Data Protection Compliance: Specific requirements related to GDPR and Danish Data Protection Act compliance
8. Breach Reporting: Procedures for reporting suspected or actual confidentiality breaches
9. Duration of Obligations: Timeframe for confidentiality obligations and post-employment/engagement obligations
10. Enforcement and Consequences: Consequences of policy violations and enforcement measures
1. International Transfer of Information: Include when the organization operates internationally or shares data across borders
2. Industry-Specific Requirements: Add for organizations in regulated industries (e.g., healthcare, financial services)
3. Social Media and External Communications: Include for organizations with significant public presence or social media activity
4. Remote Working Provisions: Add for organizations with remote or hybrid working arrangements
5. Third Party Disclosure Procedures: Include when regular sharing with authorized third parties is necessary
6. Return of Confidential Materials: Add for organizations handling physical confidential materials
1. Schedule 1 - Information Classification Guide: Detailed guide for classifying different types of confidential information
2. Schedule 2 - Security Procedures: Specific technical and organizational security measures
3. Schedule 3 - Breach Response Plan: Detailed procedures for handling confidentiality breaches
4. Schedule 4 - Acknowledgment Form: Template for employees/contractors to acknowledge policy receipt and understanding
5. Appendix A - Approved Third Party Recipients: List of pre-approved third parties for information sharing
6. Appendix B - Document Marking Guidelines: Guidelines for marking and handling different levels of confidential documents
Authors
Trade Secrets
Personal Data
Processing
Data Controller
Data Processor
Company
Authorized Personnel
Security Breach
Confidentiality Breach
Information Security
Sensitive Business Information
Intellectual Property
Professional Secrets
Technical Information
Commercial Information
Business Partner
Affiliated Companies
Protected Information
Classified Information
Data Subject
Technical Measures
Organizational Measures
Unauthorized Access
Authorized Disclosure
Information Classification Levels
Confidentiality Period
Third Party
Security Incident
Material Breach
Non-Public Information
Proprietary Information
Business Records
Permitted Purpose
Receiving Party
Disclosing Party
Information Systems
Secure Storage
Data Protection Laws
Responsible Person
Data Protection
Information Security
Access Control
Non-Disclosure
Breach Notification
Enforcement
Duration and Survival
Return of Information
Monitoring and Audit
Third Party Disclosure
Security Measures
Training and Awareness
Classification of Information
Reporting Requirements
Compliance
Document Marking
Storage and Handling
Intellectual Property
Remedies
Employee Obligations
International Transfer
Record Keeping
Termination
Amendments
Severability
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.