Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Software Evaluation Form
1. Parties: Identification of the software provider and the evaluating organization
2. Background: Context of the software evaluation and purpose of the agreement
3. Definitions: Key terms used throughout the document including technical terminology
4. Scope of Evaluation: Detailed description of what aspects of the software will be evaluated
5. Evaluation Period: Duration of the evaluation period and key milestone dates
6. Access and Installation: Terms regarding software access, installation requirements, and technical setup
7. Evaluation Process: Step-by-step process for conducting the evaluation
8. Confidentiality: Obligations regarding confidential information and data protection
9. Intellectual Property: Protection of IP rights and usage limitations during evaluation
10. Feedback and Reporting: Requirements for providing evaluation feedback and formal reports
11. Termination: Conditions for early termination and post-evaluation obligations
12. Liability and Warranties: Limitations of liability and warranty disclaimers
13. Governing Law: Specification of Danish law as governing law and jurisdiction
1. Security Requirements: Specific security measures required during evaluation - include when dealing with sensitive data or systems
2. User Access Management: Details of who can access the software and their permissions - include for multi-user evaluations
3. Payment Terms: Any fees associated with the evaluation - include if the evaluation is not free
4. Support Services: Technical support provisions during evaluation - include if provider offers support
5. Post-Evaluation Rights: Rights to continue using or purchasing the software - include if relevant to commercial arrangement
6. Data Processing Terms: Detailed data processing obligations - include when personal data processing is involved
7. Insurance: Insurance requirements - include for high-value or high-risk evaluations
1. Technical Specifications: Detailed technical requirements and specifications of the software
2. Evaluation Criteria: Specific criteria and metrics against which the software will be evaluated
3. Test Scenarios: Specific use cases and scenarios to be tested during evaluation
4. Security Requirements Checklist: Detailed security requirements and compliance checklist
5. Contact Details: Key contacts and escalation procedures for both parties
6. Data Processing Agreement: Detailed data processing terms if personal data is involved
7. Installation Guidelines: Technical instructions for software installation and setup
Authors
Authorized Users
Business Day
Confidential Information
Data Protection Laws
Documentation
Effective Date
Evaluation Environment
Evaluation Feedback
Evaluation Period
Evaluation Purpose
Evaluation Report
Intellectual Property Rights
Licensed Software
Minimum Requirements
Personal Data
Provider
Security Incident
Software
Source Code
Specifications
Test Data
Test Results
Testing Environment
Trade Secrets
User Access Credentials
Vulnerability
Working Hours
Access and Installation
Evaluation Process
Confidentiality
Data Protection
Intellectual Property
Security Requirements
Performance Standards
Feedback and Reporting
Support Services
Warranties and Disclaimers
Limitation of Liability
Term and Termination
Post-Evaluation Obligations
Use Restrictions
Audit Rights
Force Majeure
Assignment
Dispute Resolution
Governing Law
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.