Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
SOW For Software Development
1. Parties: Identification of contracting parties including legal names, registration numbers, and addresses
2. Background: Context of the agreement and relationship between parties
3. Definitions: Key terms used throughout the SOW
4. Scope of Services: Detailed description of software development services to be provided
5. Project Timeline: Key milestones, delivery dates, and project phases
6. Acceptance Criteria: Specific criteria for accepting deliverables and testing requirements
7. Change Management: Process for handling change requests and scope modifications
8. Price and Payment Terms: Pricing structure, payment schedule, and invoicing details
9. Intellectual Property Rights: Ownership and licensing of developed software and materials
10. Confidentiality: Protection of confidential information and trade secrets
11. Data Protection: GDPR compliance and data handling requirements
12. Warranties: Technical and professional warranties for the delivered software
13. Liability and Indemnification: Limitation of liability and indemnification obligations
14. Term and Termination: Duration of the SOW and termination conditions
15. Governing Law and Jurisdiction: Confirmation of Danish law application and dispute resolution
1. Source Code Escrow: Terms for source code escrow arrangements, used when client requires security of access to source code
2. Service Levels: Specific performance metrics and service levels, used for ongoing maintenance or operation phases
3. Security Requirements: Specific security standards and compliance requirements, used for high-security projects
4. Third-Party Components: Management of third-party software and licenses, used when project involves significant third-party components
5. Personnel Requirements: Specific staffing requirements and qualifications, used when key personnel are critical
6. Business Continuity: Disaster recovery and business continuity requirements, used for business-critical applications
7. Knowledge Transfer: Requirements for training and knowledge transfer, used when client team needs to maintain the software
8. Post-Delivery Support: Terms for support after delivery, used when immediate post-delivery support is needed
1. Technical Specifications: Detailed technical requirements and specifications for the software
2. Project Plan: Detailed project timeline, resources, and deliverables schedule
3. Pricing Schedule: Detailed breakdown of costs, rates, and payment milestones
4. Testing and Acceptance Procedures: Detailed testing protocols and acceptance criteria
5. Service Level Agreement: Detailed performance metrics and service level requirements
6. Security Requirements Specification: Detailed security standards and compliance requirements
7. Data Processing Agreement: GDPR-compliant data processing terms and requirements
8. Personnel and Resources: Details of key personnel, roles, and responsibilities
9. Third-Party Licenses: List and terms of third-party software licenses
10. Change Request Template: Standard template for submitting and processing change requests
Authors
Acceptance Tests
Affiliate
Agile Methodology
Background IP
Business Days
Change Request
Client Materials
Confidential Information
Data Protection Laws
Defect
Deliverables
Developer Tools
Development Environment
Documentation
Effective Date
Final Acceptance
Force Majeure
Foreground IP
Go-Live Date
Good Industry Practice
Intellectual Property Rights
Key Personnel
Milestone
Open Source Software
Personal Data
Project Manager
Project Plan
Services
Software
Source Code
Specifications
Sprint
Statement of Work
Technical Requirements
Test Environment
Third-Party Materials
Time Schedule
UAT (User Acceptance Testing)
Updates
Warranty Period
Project Management
Deliverables
Acceptance Testing
Change Control
Payment Terms
Intellectual Property Rights
Data Protection
Confidentiality
Warranties
Service Levels
Personnel
Client Obligations
Documentation
Quality Assurance
Source Code
Third Party Materials
Testing
Implementation
Knowledge Transfer
Security Requirements
Audit Rights
Risk Management
Liability
Insurance
Force Majeure
Term and Termination
Exit Management
Dispute Resolution
Governing Law
Assignment
Subcontracting
Notices
Entire Agreement
Severability
Variation
Waiver
Third Party Rights
Counterparts
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.