Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Government Non Disclosure Agreement
1. Parties: Identification of the government entity and the receiving party, including their legal status and authority to enter into the agreement
2. Background: Context of the agreement, including the purpose of sharing confidential information and the relationship between the parties
3. Definitions: Detailed definitions of key terms, including 'Confidential Information', 'Government Information', 'Authorized Personnel', and 'Security Requirements'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement, including classified information categories
5. Obligations of Confidentiality: Core confidentiality obligations, including handling, storage, and protection of confidential information
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including legal requirements and government authorizations
7. Security Measures: Specific security protocols and measures required for handling government confidential information
8. Data Protection Compliance: Compliance requirements with Danish Data Protection Act and GDPR where applicable
9. Return or Destruction of Confidential Information: Procedures for returning or destroying confidential information upon request or termination
10. Term and Termination: Duration of the agreement and circumstances for termination
11. Breach and Consequences: Consequences of breach, including references to relevant sections of Danish Criminal Code
12. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction of Danish courts
1. International Transfer of Information: Required when confidential information may be transferred outside Denmark, addressing additional security and legal requirements
2. Specific Department Provisions: Additional provisions specific to certain government departments (e.g., defense, healthcare, law enforcement)
3. Audit Rights: Government's right to audit compliance with the NDA, included when handling highly sensitive information
4. Insurance Requirements: Specific insurance obligations, included when handling high-risk or valuable information
5. Subcontractor Provisions: Required when the receiving party may need to engage subcontractors
6. Publicity and Communications: Rules regarding public communications about the relationship, included for high-profile or sensitive projects
1. Schedule 1 - Categories of Confidential Information: Detailed listing and classification of different types of confidential information covered
2. Schedule 2 - Security Protocols: Detailed security requirements and procedures for handling confidential information
3. Schedule 3 - Authorized Personnel: List of authorized personnel and their security clearance levels
4. Schedule 4 - Data Processing Requirements: Specific requirements for processing personal data under Danish law
5. Appendix A - Information Handling Procedures: Step-by-step procedures for handling, storing, and disposing of confidential information
6. Appendix B - Incident Reporting Forms: Templates and procedures for reporting security incidents or breaches
Authors
Classified Information
Government Entity
Authorized Representative
Permitted Purpose
Security Requirements
Authorized Personnel
Government Data
Personal Data
Sensitive Personal Data
Security Breach
Disclosing Party
Receiving Party
Affiliate
Representatives
Professional Secrecy
Official Secrets
Security Clearance
Confidentiality Period
Data Protection Laws
Processing
Technical Data
Administrative Information
Classified Documents
Government Premises
Working Day
Force Majeure
Information Security Incident
Material Breach
Notice
Project
Public Records
Security Protocols
State Secret
Third Party
Trade Secret
Unauthorized Disclosure
Data Subject
Government Purpose
Intellectual Property Rights
Required Disclosure
Data Protection
Information Security
Permitted Disclosures
Government Rights
Security Clearance
Access Control
Information Classification
Return of Information
Destruction of Information
Term and Duration
Breach Notification
Regulatory Compliance
Audit Rights
Personnel Requirements
International Transfer
Dispute Resolution
Liability
Force Majeure
Governing Law
Public Records Compliance
Security Protocols
Emergency Disclosure
Breach Consequences
Professional Secrecy
Subcontracting
Survival
Assignment
Remedies
Severability
Entire Agreement
Notices
Amendments
Waiver
Third Party Rights
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.