Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Software Asset Purchase Agreement
1. Parties: Identifies and provides full legal details of the parties entering into the agreement
2. Background: Provides context for the agreement and outlines the parties' intentions
3. Definitions: Defines key terms used throughout the agreement
4. Subject Matter and Scope: Describes the software assets being purchased and the scope of the purchase
5. Purchase Price and Payment Terms: Details the purchase price, payment schedule, and payment methods
6. Delivery and Implementation: Specifies delivery timeframes, acceptance testing procedures, and implementation requirements
7. Transfer of Rights: Outlines the intellectual property rights being transferred and any restrictions
8. Warranties and Representations: Details the warranties provided regarding the software's functionality, performance, and ownership
9. Support and Maintenance: Describes any ongoing support and maintenance obligations
10. Confidentiality: Sets out obligations regarding confidential information
11. Liability and Indemnification: Defines the liability limits and indemnification obligations of both parties
12. Term and Termination: Specifies the duration of the agreement and termination conditions
13. Governing Law and Jurisdiction: Specifies Danish law as governing law and sets jurisdiction for disputes
14. General Provisions: Includes standard boilerplate clauses such as force majeure, severability, and entire agreement
1. Source Code Escrow: Include when source code access is required for security or business continuity
2. Data Protection: Required if personal data processing is involved in the software operation
3. Third-Party Software: Include when the software contains or depends on third-party components
4. Training: Include when training services are part of the purchase agreement
5. Migration Services: Required when data migration from existing systems is needed
6. Security Requirements: Include for software handling sensitive data or critical operations
7. Customization: Include when software modifications are part of the purchase
8. Audit Rights: Include when compliance monitoring is required
9. Insurance: Include for high-value or business-critical software
1. Software Specification: Detailed technical specifications of the software being purchased
2. Acceptance Testing Criteria: Specific criteria and procedures for acceptance testing
3. Price Breakdown: Detailed breakdown of the purchase price components
4. Service Level Agreement: Performance metrics and service levels for the software
5. Implementation Plan: Detailed timeline and milestones for software implementation
6. Support and Maintenance Terms: Detailed terms of support and maintenance services
7. Third-Party Licenses: Copies or summaries of relevant third-party software licenses
8. Data Processing Agreement: Required under GDPR if personal data is processed
9. Security Requirements: Detailed security specifications and requirements
Authors
Acceptance Tests
Affiliate
Agreement
Background IP
Business Day
Confidential Information
Custom Software
Data Protection Laws
Defect
Deliverables
Documentation
Effective Date
Environmental Information
Escrow Agent
Force Majeure Event
GDPR
Implementation Plan
Installation Site
Intellectual Property Rights
License
Maintenance Services
Material Breach
Milestone
Object Code
Payment Schedule
Personal Data
Purchase Price
Related Agreements
Security Requirements
Service Levels
Software
Software Assets
Source Code
Specifications
Standard Software
Support Services
System Requirements
Technical Requirements
Term
Third Party Software
Updates
Upgrades
User
Virus
Warranties
Definitions
Purchase and Sale
Transfer of Rights
Payment Terms
Delivery
Implementation
Acceptance Testing
Warranties
Representations
Title and Risk
Intellectual Property
License Grant
Source Code
Support and Maintenance
Service Levels
Documentation
Training
Confidentiality
Data Protection
Security
Audit Rights
Performance Standards
Change Control
Force Majeure
Liability
Indemnification
Insurance
Term and Duration
Termination
Exit Management
Assignment
Subcontracting
Notice
Dispute Resolution
Governing Law
Jurisdiction
Entire Agreement
Severability
Waiver
Amendment
Third Party Rights
Counterparts
Force Majeure
Survival
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.