Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Confidentiality Non Disclosure Agreement
"I need a Confidentiality Non Disclosure Agreement for my Hong Kong technology startup to use with potential investors and venture capital firms, with specific provisions for protecting our AI algorithms and software source code."
1. Parties: Identification of the disclosing and receiving parties, including full legal names and addresses
2. Background: Context of the agreement and purpose for sharing confidential information
3. Definitions: Defines key terms including 'Confidential Information', 'Representatives', 'Permitted Purpose', and other relevant terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Confidentiality Obligations: Core obligations regarding the protection and non-disclosure of confidential information
6. Permitted Use and Disclosure: Specified circumstances under which confidential information may be used or disclosed
7. Security Measures: Required measures to protect and safeguard confidential information
8. Return or Destruction of Confidential Information: Obligations regarding the handling of confidential information upon termination or request
9. Duration and Termination: Term of the agreement and survival of obligations
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Personal Data Protection: Additional provisions when confidential information includes personal data subject to the PDPO
2. Non-Solicitation: Restrictions on soliciting employees or customers, used when business relationships are involved
3. Non-Competition: Restrictions on competitive activities, included when sharing sensitive business information
4. Intellectual Property Rights: Provisions clarifying ownership and rights in any IP disclosed or created
5. Export Control: Compliance with export control laws, used when information may be subject to international transfer restrictions
6. Group Company Rights: Extensions of rights to affiliated companies, used for corporate group structures
7. Residual Knowledge: Provisions addressing use of non-confidential general knowledge retained by recipients
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals or roles authorized to receive confidential information
3. Schedule 3 - Permitted Purpose: Detailed description of the specific purpose(s) for which confidential information may be used
4. Schedule 4 - Security Protocols: Specific security measures and protocols required for protecting confidential information
5. Appendix A - Form of Acknowledgment: Template for representatives to acknowledge confidentiality obligations
Authors
Permitted Purpose
Affiliate
Representatives
Disclosing Party
Receiving Party
Group Companies
Confidential Materials
Personal Data
Trade Secrets
Intellectual Property Rights
Proprietary Information
Business Day
Designated Representatives
Effective Date
Term
Authorised Disclosure
Security Requirements
Residual Information
Excluded Information
Related Persons
Controlled Persons
Permitted Recipients
Professional Advisers
Governmental Authority
Confidentiality Obligations
Data Protection Laws
Hong Kong
Notice
Working Hours
Definitions
Confidentiality Obligations
Permitted Use
Non-Disclosure
Security Measures
Return or Destruction of Information
Term and Survival
Breach and Remedies
Injunctive Relief
Data Protection
Intellectual Property
Non-Solicitation
Assignment
Third Party Rights
Force Majeure
Severability
Entire Agreement
Variation
Waiver
Notices
Governing Law
Jurisdiction
Counterparts
Costs
Further Assurance
Technology and Software
Financial Services
Manufacturing
Healthcare and Pharmaceuticals
Professional Services
Real Estate and Construction
Retail and Consumer Goods
Education and Research
Energy and Utilities
Media and Entertainment
Telecommunications
Biotechnology
E-commerce
Logistics and Supply Chain
Consulting Services
Legal
Human Resources
Business Development
Research and Development
Executive Leadership
Procurement
Information Technology
Finance
Operations
Compliance
Corporate Development
Innovation
Intellectual Property
Strategic Planning
Chief Executive Officer
Chief Legal Officer
General Counsel
Legal Counsel
Compliance Officer
Business Development Manager
Human Resources Director
Project Manager
Research and Development Director
Chief Technology Officer
Chief Financial Officer
Investment Manager
Operations Manager
Procurement Manager
Contract Administrator
Innovation Director
Strategic Partnership Manager
Intellectual Property Manager
Find the exact document you need
Irrevocable Unconfirmed Letter Of Credit
A Hong Kong law-governed banking instrument providing an issuing bank's irrevocable commitment to pay the beneficiary upon presentation of compliant documents.
Infosec Audit Policy
A Hong Kong-compliant policy document establishing requirements and procedures for information security audits, aligned with PDPO and local regulations.
Confidentiality Non Disclosure Agreement
A Hong Kong law-governed confidentiality agreement protecting sensitive information shared between parties during business relationships and negotiations.
Online Sales Contract
Hong Kong-governed agreement establishing terms and conditions for online sales, including e-commerce operations and consumer protection provisions.
Personal Release And Consent Form
A Hong Kong law-governed document obtaining explicit consent and release for specific activities or data processing, compliant with PDPO and local regulations.
Client Risk Assessment Form
A regulatory-compliant risk assessment form for evaluating client profiles in Hong Kong's financial services sector, meeting HKMA and SFC requirements.
Synthetic Letter Of Credit
A Hong Kong law-governed document establishing the terms and conditions for a Synthetic Letter of Credit, combining traditional LC mechanics with synthetic elements.
Security Incident Management Audit Program
A Hong Kong-compliant framework for auditing security incident management processes, aligned with PDPO and HKMA requirements.
Information Security Agreement
A Hong Kong law-governed agreement establishing information security and data protection requirements between contracting parties, ensuring compliance with PDPO and related regulations.
Ceiling Leakage Complaint Letter
A formal complaint letter under Hong Kong law addressing ceiling leakage issues and requesting remedial action from responsible parties.
Multi Employer Agreement
A Hong Kong law-governed agreement establishing the framework for multiple employers to coordinate their employment practices and shared workforce arrangements.
Security Contract Termination Letter
A Hong Kong law-governed letter formally terminating a security services contract, addressing notice periods, settlements, and transition arrangements.
Security Agreement Form
A Hong Kong law-governed agreement creating security interests over assets, establishing terms for security creation, maintenance, and enforcement.
Information Security Audit Policy
A policy document outlining information security audit requirements and procedures for organizations in Hong Kong, aligned with PDPO and local regulations.
Data Room Confidentiality Agreement
A Hong Kong law-governed agreement regulating access to and confidentiality of information shared through a data room facility during corporate transactions or due diligence processes.
Pharmaceutical License Agreement
A Hong Kong-governed agreement for licensing pharmaceutical products or technology, establishing terms for intellectual property rights, regulatory compliance, and commercial arrangements.
Security Loan Agreement
A Hong Kong law-governed agreement establishing terms for temporary transfer of securities between parties, including collateral arrangements and regulatory compliance requirements.
IT Risk Assessment Report
A detailed assessment of organization's IT risks and recommended controls, compliant with Hong Kong regulations and international standards.
Physical Power Purchase Agreement
Hong Kong-governed agreement for physical electricity sale and purchase between generator and offtaker, addressing technical, operational, and commercial terms.
Secret Agreement
A Hong Kong law-governed agreement establishing confidentiality obligations and protecting sensitive information shared between parties.
Law Firm Partnership Agreement
A Hong Kong law-governed agreement establishing the partnership structure and operational framework for a law firm, detailing partner rights, obligations, and management arrangements.
Client Contract
Hong Kong law-governed client contract template establishing terms between service provider and client, with comprehensive commercial and legal provisions.
Security Assignment Agreement
A Hong Kong law-governed agreement creating security over assets through assignment, detailing terms of the security arrangement and enforcement rights.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.