Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Confidentiality Agreement
1. Parties: Identification of the parties entering into the agreement, including their legal names, registration numbers, and addresses
2. Background: Context of the agreement, relationship between the parties, and purpose of sharing confidential information
3. Definitions: Detailed definitions of key terms including 'Confidential Information', 'Personal Data', 'Data Protection Laws', 'Security Breach', and other relevant terms
4. Scope and Purpose: Detailed description of what information is covered by the agreement and permitted purposes for its use
5. Confidentiality Obligations: Core obligations regarding the protection, non-disclosure, and permitted uses of confidential information
6. Data Protection Compliance: Specific obligations relating to GDPR and Danish Data Protection Act compliance
7. Security Measures: Required technical and organizational measures for protecting confidential information
8. Staff and Third Party Access: Rules regarding employee access, third-party disclosure, and ensuring compliance by all parties with access
9. Breach Notification: Procedures and timeframes for reporting and handling security or confidentiality breaches
10. Return or Destruction: Requirements for returning or destroying confidential information upon agreement termination or request
11. Term and Termination: Duration of the agreement and conditions for termination
12. Liability and Indemnification: Consequences of breach and indemnification obligations
13. General Provisions: Standard clauses including governing law, jurisdiction, entire agreement, and amendments
1. Data Transfer Mechanisms: Required when confidential information will be transferred outside the EEA, specifying appropriate transfer mechanisms
2. Audit Rights: Include when one party requires the right to audit the other's compliance with security and confidentiality obligations
3. Specific Industry Requirements: Include when the agreement covers regulated industries with additional compliance requirements
4. Intellectual Property Rights: Include when confidential information includes IP that requires specific protection measures
5. Competition Law Compliance: Include when parties are competitors or when information sharing could raise competition law concerns
6. Insurance Requirements: Include when specific insurance coverage is required for data protection or cyber security
7. Business Continuity: Include when continuous access to confidential information is critical for business operations
1. Schedule 1 - Categories of Confidential Information: Detailed listing and classification of different types of confidential information covered
2. Schedule 2 - Security Requirements: Specific technical and organizational security measures required
3. Schedule 3 - Authorized Personnel: List of authorized personnel or roles permitted to access confidential information
4. Schedule 4 - Data Processing Details: If personal data is involved, detailed information about processing activities as required by GDPR Article 28
5. Schedule 5 - Breach Response Plan: Detailed procedures for handling and reporting security breaches
6. Appendix A - Contact Points: List of key contacts for various purposes including breach notification and regular communication
Authors
Personal Data
Special Categories of Personal Data
Processing
Data Controller
Data Processor
Data Subject
Authorized Recipients
Permitted Purpose
Security Breach
Data Protection Laws
Technical and Organizational Measures
Representatives
Supervisory Authority
Third Party
Trade Secrets
Affiliate
Business Day
Disclosing Party
Receiving Party
Effective Date
Security Requirements
Confidentiality Period
Data Protection Officer
Force Majeure Event
Intellectual Property Rights
Agreement
Personnel
Professional Advisers
Services
Standard Contractual Clauses
Subprocessor
Transfer Mechanism
Working Hours
Data Protection
Information Security
Access Rights
Use Restrictions
Disclosure Controls
Return or Destruction
Data Transfer
Breach Notification
Audit Rights
Liability
Indemnification
Term and Termination
Survival
Force Majeure
Assignment
Notices
Amendments
Severability
Entire Agreement
Third Party Rights
Governing Law
Jurisdiction
Dispute Resolution
Regulatory Compliance
Personnel Obligations
Security Measures
Intellectual Property
Remedies
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.