Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Technology Sharing Agreement
1. Parties: Identification and details of the parties entering into the agreement
2. Background: Context of the agreement and the parties' intentions
3. Definitions: Detailed definitions of technical and legal terms used throughout the agreement
4. Scope of Agreement: Detailed description of the technology being shared and the purpose of sharing
5. Grant of Rights: Specific rights being granted, including usage, modification, and sublicensing rights
6. Technology Transfer Process: Procedures and timelines for the actual transfer of technology
7. Intellectual Property Rights: Ownership and protection of IP rights, including improvements and derivatives
8. Confidentiality Obligations: Provisions for protecting confidential information and trade secrets
9. Payment Terms: Financial terms including licensing fees, royalties, and payment schedules
10. Warranties and Representations: Warranties regarding ownership, non-infringement, and technology functionality
11. Liability and Indemnification: Allocation of risks and responsibilities between parties
12. Term and Termination: Duration of agreement and circumstances for termination
13. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for disputes
14. General Provisions: Standard clauses including force majeure, assignment, and amendments
1. Joint Development Rights: Used when parties will collaborate to further develop the technology
2. Training and Support: Include when technical training or ongoing support is part of the agreement
3. Quality Control: Required when specific quality standards must be maintained in technology implementation
4. Export Control: Necessary when technology may be subject to export control regulations
5. Data Protection: Required when technology involves processing of personal data
6. Competition Compliance: Include when agreement might raise competition law concerns
7. Source Code Escrow: Used when software source code needs to be held in escrow
8. Audit Rights: Include when one party needs rights to audit the other's use of technology
1. Schedule A - Technical Specifications: Detailed technical description of the shared technology
2. Schedule B - Implementation Plan: Timeline and milestones for technology transfer and implementation
3. Schedule C - Service Levels: Performance metrics and standards for the technology
4. Schedule D - Fee Schedule: Detailed breakdown of all fees, royalties, and payment terms
5. Schedule E - Security Requirements: Security protocols and requirements for technology handling
6. Schedule F - Support Services: Details of technical support and maintenance services
7. Appendix 1 - Contact Details: Key contacts for technical, commercial, and legal matters
8. Appendix 2 - Approved Sublicensees: List of pre-approved sublicensees if applicable
Authors
Applicable Laws
Background IP
Business Day
Commencement Date
Confidential Information
Derivatives
Documentation
Effective Date
Foreground IP
Force Majeure Event
Improvements
Intellectual Property Rights
Know-How
Licensed Technology
Modifications
Patent Rights
Purpose
Recipient
Related Parties
Shared Technology
Source Code
Specifications
Technical Information
Technology Package
Technology Provider
Term
Territory
Third Party
Trade Secrets
Updates
Use Rights
Working Hours
Implementation Period
Acceptance Tests
Support Services
Maintenance Services
Technical Data
Authorized Users
Commercial Purpose
Deliverables
Development Rights
License Fee
Permitted Purpose
Quality Standards
Regulatory Requirements
Security Requirements
Service Levels
Technical Support
Technology Transfer Process
Interpretation
Grant of Rights
Technology Transfer
Intellectual Property
Confidentiality
Payment Terms
Warranties
Indemnification
Liability Limitation
Term and Termination
Force Majeure
Assignment
Dispute Resolution
Governing Law
Data Protection
Competition Compliance
Technical Implementation
Quality Control
Support and Maintenance
Training
Documentation
Audit Rights
Export Control
Security Requirements
Performance Standards
Improvement Rights
Non-Competition
Escrow
Insurance
Notices
Entire Agreement
Severability
Waiver
Amendment
Third Party Rights
Compliance with Laws
Representation and Authority
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.