Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Non Solicitation Agreement
1. Parties: Identification of the contracting parties, including full legal names and addresses
2. Background: Context of the agreement, including the business relationship between the parties and reason for the non-solicitation provisions
3. Definitions: Key terms used in the agreement, including 'Restricted Business', 'Customers', 'Employees', and 'Solicitation'
4. Scope of Non-Solicitation: Detailed description of prohibited solicitation activities, including customer, employee, and supplier non-solicitation obligations
5. Duration: Time period for which the non-solicitation obligations remain in effect, ensuring compliance with Danish law limitations
6. Geographic Area: Geographical scope of the restrictions
7. Consideration: Compensation or consideration provided in exchange for the non-solicitation obligations, as required under Danish law
8. Exceptions: Permitted activities that do not constitute violation of the agreement
9. Confidentiality: Obligations regarding the confidential information that may be involved in the restricted activities
10. Remedies: Consequences of breach and available remedies, including any liquidated damages
11. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for dispute resolution
12. General Provisions: Standard contractual provisions including severability, entire agreement, and amendments
1. Garden Leave: Provisions for paid leave during notice period, used when agreement is part of employment termination
2. Post-Employment Obligations: Additional obligations following employment termination, included when agreement is part of employment contract
3. Customer Notice: Procedures for handling customer communications during transition, used in customer-facing role situations
4. Training and Trade Secrets: Additional provisions protecting specialized training or trade secrets, included when significant proprietary knowledge is involved
5. Group Company Provisions: Extended provisions covering affiliated companies, used when multiple related entities need protection
6. Monitoring and Compliance: Specific procedures for monitoring compliance, included in high-risk situations
1. Schedule 1 - Restricted Customers: List of specific customers covered by the non-solicitation provisions
2. Schedule 2 - Restricted Employees: Categories or list of employees covered by non-solicitation provisions
3. Schedule 3 - Compensation Schedule: Details of any compensation provided in connection with the restrictions
4. Schedule 4 - Restricted Business Activities: Detailed description of specific business activities covered by the agreement
5. Appendix A - Acknowledgment Form: Form for acknowledging receipt and understanding of the agreement
6. Appendix B - Exit Interview Procedures: Procedures for conducting exit interviews and reviewing obligations
Authors
Business Day
Confidential Information
Customer
Effective Date
Group Company
Key Employee
Non-Solicitation Period
Prohibited Activities
Protected Business
Protected Customer
Protected Employee
Protected Supplier
Restricted Business
Restricted Period
Restricted Territory
Services
Solicitation
Supplier
Territory
Trade Secrets
Termination Date
Business Relationship
Material Contact
Competitive Business
Direct Solicitation
Indirect Solicitation
Professional Services
Non-Solicitation of Employees
Non-Solicitation of Suppliers
Confidentiality
Duration and Term
Geographic Scope
Consideration and Compensation
Exceptions and Permitted Activities
Remedies and Damages
Enforcement
Severability
Assignment
Governing Law
Jurisdiction
Entire Agreement
Amendment
Notices
Interpretation
Waiver
Independent Contractor
Force Majeure
Counterparts
Acknowledgment
Representations and Warranties
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.