Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Secret Agreement
1. Parties: Identification of all parties to the agreement, including their legal names, registration numbers, and addresses
2. Background: Context of the agreement and the relationship between the parties
3. Definitions: Detailed definitions of key terms, especially 'Confidential Information', 'Authorized Personnel', and 'Security Protocols'
4. Scope of Confidential Information: Precise description of what information is covered by the agreement
5. Confidentiality Obligations: Core obligations regarding handling, protection, and non-disclosure of confidential information
6. Permitted Use: Specific purposes for which the confidential information may be used
7. Security Measures: Required security protocols and measures for protecting confidential information
8. Duration and Survival: Term of the agreement and which obligations survive termination
9. Return or Destruction: Requirements for returning or destroying confidential information
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for disputes
1. Third Party Disclosure: Rules for sharing information with third parties, used when third-party access may be necessary
2. Intellectual Property Rights: Protection of IP rights related to confidential information, included when IP is involved
3. Employee and Contractor Obligations: Specific requirements for employees and contractors, needed when they will have access to information
4. Data Protection Compliance: GDPR and Danish Data Protection Act compliance, required when personal data is involved
5. Force Majeure: Provisions for extraordinary circumstances, included for long-term agreements
6. Insurance Requirements: Specific insurance obligations, included for high-value confidential information
7. Audit Rights: Rights to audit compliance with security measures, included for sensitive information
8. Alternative Dispute Resolution: Mediation or arbitration procedures, included when parties prefer alternatives to court proceedings
1. Schedule A - Confidential Information: Detailed list and description of specific confidential information covered
2. Schedule B - Security Protocols: Detailed technical and organizational security measures required
3. Schedule C - Authorized Personnel: List of individuals authorized to access the confidential information
4. Schedule D - Data Processing Requirements: Specific requirements for handling personal data if applicable
5. Schedule E - Breach Notification Procedures: Detailed procedures for reporting and handling security breaches
6. Appendix 1 - Contact Information: Key contacts for notices, breach reporting, and general communication
7. Appendix 2 - Declaration Forms: Templates for confidentiality acknowledgments by authorized personnel
Authors
Trade Secret
Disclosing Party
Receiving Party
Authorized Personnel
Authorized Purpose
Security Protocols
Permitted Use
Affiliate
Business Day
Confidentiality Period
Effective Date
Personal Data
Processing
Representatives
Security Breach
Third Party
Working Hours
Intellectual Property Rights
Proprietary Information
Data Controller
Data Processor
Derived Information
Force Majeure Event
Notice
Security Measures
Unauthorized Disclosure
Group Company
Restricted Access
Survival Period
Non-Disclosure
Data Protection
Security Measures
Access Rights
Use Restrictions
Return of Information
Destruction of Information
Breach Notification
Remedies
Indemnification
Term and Termination
Survival
Force Majeure
Assignment
Third Party Rights
Notice Requirements
Governing Law
Jurisdiction
Dispute Resolution
Audit Rights
Warranties
Intellectual Property
Severability
Entire Agreement
Amendment
Waiver
Counterparts
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.