Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Technology NDA
1. Parties: Identification of the disclosing and receiving parties, including full legal names, company registration numbers (CVR), and registered addresses
2. Background: Context of the agreement, including the purpose of sharing confidential information and the general nature of the contemplated business relationship
3. Definitions: Clear definitions of key terms, especially 'Confidential Information', 'Trade Secrets', 'Technical Data', and 'Permitted Purpose'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information, including technical data, trade secrets, and other proprietary information
5. Confidentiality Obligations: Core obligations regarding the protection, non-disclosure, and restricted use of confidential information
6. Security Measures: Required technical and organizational measures for protecting confidential information
7. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees and professional advisors
8. Term and Termination: Duration of the agreement and confidentiality obligations, including survival of obligations post-termination
9. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
10. Breach and Remedies: Consequences of breach, including injunctive relief and compensation rights
11. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for dispute resolution
1. Data Protection Compliance: Specific section addressing GDPR compliance when personal data is involved in the confidential information
2. Source Code Protection: Additional provisions specifically for protecting software source code and related technical documentation
3. Export Control: Provisions regarding compliance with export control regulations when technology transfer may be involved
4. Reverse Engineering Prohibition: Specific provisions prohibiting reverse engineering of any technical information or products
5. Non-Solicitation: Provisions preventing parties from soliciting each other's employees or clients
6. Competing Projects: Provisions addressing involvement in competing projects or technologies
7. Escrow Arrangements: Provisions for placing certain technical information in escrow if relevant
8. Audit Rights: Rights to audit compliance with confidentiality obligations
9. Insurance Requirements: Obligations to maintain specific insurance coverage for potential breaches
1. Schedule 1 - Description of Technical Information: Detailed description of the specific technical information covered by the NDA
2. Schedule 2 - Authorized Representatives: List of authorized personnel who may access the confidential information
3. Schedule 3 - Security Protocols: Specific technical and organizational security measures required
4. Schedule 4 - Data Processing Terms: GDPR-compliant data processing terms if personal data is involved
5. Appendix A - Acknowledgment Form: Form for employees or subcontractors to acknowledge NDA obligations
Authors
Technical Data
Trade Secrets
Permitted Purpose
Authorized Representatives
Affiliate
Business Day
Disclosing Party
Receiving Party
Technical Documentation
Source Code
Object Code
Intellectual Property Rights
Technical Specifications
Development Environment
API Documentation
Security Protocols
Technical Know-How
Personal Data
Testing Environment
Software
Hardware
Technical Infrastructure
Cloud Services
System Architecture
Technical Standards
Derivative Works
Technical Requirements
Data Protection Laws
Confidentiality Period
Technical Personnel
Security Breach
Technical Improvements
Proprietary Information
Technology Stack
Data Protection
Intellectual Property
Security Measures
Access Rights
Non-Disclosure
Return of Information
Permitted Use
Technical Safeguards
Term and Termination
Breach Notification
Remedies
Governing Law
Jurisdiction
Indemnification
Representations and Warranties
Assignment
Severability
Force Majeure
Non-Solicitation
Export Control
Reverse Engineering
Audit Rights
Notice Requirements
Entire Agreement
Amendment
Survival
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.