Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Confidentiality And Intellectual Property Agreement
1. Parties: Identification and details of the contracting parties
2. Background: Context of the agreement, relationship between parties, and purpose of entering into the agreement
3. Definitions: Definitions of key terms including 'Confidential Information', 'Intellectual Property Rights', 'Trade Secrets', and other relevant terms
4. Scope of Agreement: Overall scope and territory of the agreement's application
5. Confidentiality Obligations: Detailed obligations regarding confidential information, including use restrictions, security measures, and permitted disclosures
6. Intellectual Property Rights: Ownership, assignment, and/or licensing of IP rights, including existing IP and newly created IP
7. Protection Measures: Specific measures required to protect confidential information and IP rights
8. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
9. Term and Termination: Duration of the agreement and circumstances for termination
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard provisions including notices, amendments, severability, and entire agreement
1. Employee and Contractor Obligations: Used when the agreement covers obligations of employees or contractors to assign IP rights and maintain confidentiality
2. Third Party Rights: Include when third parties may have rights or obligations under the agreement
3. Non-Competition: Optional restrictions on competitive activities, subject to Danish law limitations
4. Data Protection: Include when confidential information includes personal data subject to GDPR
5. Export Control: Required when the agreement involves international transfer of technology or technical data
6. Source Code Protection: Include for software-related agreements with specific source code confidentiality requirements
7. Publicity and Announcements: Include when parties need to agree on public communications about their relationship
1. Schedule 1 - Specified Confidential Information: Detailed list or categories of information designated as confidential
2. Schedule 2 - Existing Intellectual Property: Inventory of pre-existing IP rights owned by each party
3. Schedule 3 - Approved Recipients: List of individuals or entities authorized to receive confidential information
4. Schedule 4 - Security Measures: Specific technical and organizational measures required for protecting confidential information
5. Schedule 5 - Required Notices and Contact Points: Contact details for notices and designated representatives for confidentiality matters
Authors
Trade Secrets
Intellectual Property Rights
Background IP
Foreground IP
Developed IP
Derivative Works
Disclosing Party
Receiving Party
Permitted Purpose
Permitted Recipients
Authorized Representatives
Affiliated Companies
Agreement Period
Effective Date
Confidentiality Period
Licensed Rights
Technical Information
Business Information
Proprietary Information
Know-How
Trade Marks
Patents
Copyrights
Design Rights
Database Rights
Personal Data
Representatives
Security Requirements
Restricted Information
Technical Documentation
Improvements
Work Product
Source Code
Specifications
Inventions
Business Day
Force Majeure Event
Intellectual Property Assignment
Territory
Intellectual Property Rights
Assignment of Rights
License Grant
Protection Measures
Non-Disclosure
Data Protection
Trade Secrets
Use Restrictions
Return of Information
Term and Duration
Termination
Representations and Warranties
Indemnification
Liability
Force Majeure
Governing Law
Dispute Resolution
Assignment and Transfer
Third Party Rights
Notices
Entire Agreement
Severability
Amendments
Waiver
Costs
Counterparts
Survival
Security Requirements
Breach Notification
Remedies
Non-Competition
Publicity
Compliance with Laws
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.