Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Supplier NDA
"I need a Supplier NDA for a technology manufacturing company based in Hong Kong, to be used with overseas component suppliers who will have access to our proprietary designs and manufacturing processes starting March 2025."
1. Parties: Identification of the disclosing party (typically the company) and receiving party (the supplier)
2. Background: Context of the relationship and purpose of sharing confidential information
3. Definitions: Key terms including 'Confidential Information', 'Permitted Purpose', 'Representatives', and 'Affiliate'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information
5. Confidentiality Obligations: Core obligations regarding non-disclosure, non-use, and protection of confidential information
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed to employees, representatives, or as required by law
7. Security Measures: Required standards for protecting and storing confidential information
8. Return or Destruction: Obligations regarding the return or destruction of confidential information upon request or termination
9. Duration and Survival: Term of the agreement and surviving obligations
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard clauses including governing law, jurisdiction, entire agreement, and variation
1. Intellectual Property Rights: Specific provisions clarifying ownership and protection of IP rights in confidential information - include when IP is a significant component
2. Data Privacy Compliance: Specific obligations regarding personal data handling - include when personal data will be shared
3. Subcontractor Obligations: Requirements for subcontractors handling confidential information - include when supplier likely to use subcontractors
4. Export Control: Provisions regarding international transfer of technical data - include for technical or regulated information
5. Force Majeure: Provisions for handling confidential information during extraordinary events - include for long-term or critical supplier relationships
6. Insurance Requirements: Specific insurance coverage requirements for information security - include for high-value or sensitive information
1. Schedule 1 - Specified Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Authorized Representatives: List of authorized personnel who may access confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols required
4. Schedule 4 - Approved Subcontractors: Pre-approved subcontractors and their permitted access levels
5. Appendix A - Form of Acknowledgment: Template for representatives to acknowledge confidentiality obligations
6. Appendix B - Information Return/Destruction Certificate: Template certificate confirming return or destruction of confidential information
Authors
Authorized Representatives
Business Day
Company
Confidential Information
Disclosing Party
Effective Date
Group
Information Security Requirements
Intellectual Property Rights
Notice
Permitted Purpose
Personal Data
Pre-existing Information
Receiving Party
Related Persons
Representatives
Security Breach
Services
Subcontractor
Supplier
Term
Third Party
Trade Secrets
Definitions
Confidentiality Obligations
Permitted Use
Information Security
Data Protection
Return of Information
Destruction of Information
Non-Disclosure
Permitted Disclosure
Third Party Disclosure
Employee Obligations
Subcontractor Obligations
Duration
Survival
Intellectual Property
Remedies
Injunctive Relief
Indemnification
Assignment
Notices
Severability
Entire Agreement
Variation
Waiver
Force Majeure
Governing Law
Jurisdiction
Counterparts
Manufacturing
Technology
Financial Services
Professional Services
Healthcare
Retail
Telecommunications
Construction
Logistics
Energy
Education
Pharmaceuticals
Real Estate
Consumer Goods
Media and Entertainment
Legal
Procurement
Supply Chain
Finance
Operations
Risk Management
Compliance
Information Security
Vendor Management
Commercial
Business Development
Information Technology
Research and Development
Procurement Manager
Legal Counsel
Supply Chain Director
Vendor Management Specialist
Chief Financial Officer
Operations Manager
Commercial Director
Risk Management Officer
Compliance Officer
Project Manager
Business Development Manager
Chief Technology Officer
Information Security Officer
Contract Administrator
General Counsel
Find the exact document you need
Contract Assignment Letter
A Hong Kong law-governed document that formally transfers contractual rights and obligations from one party to another.
Supplier Risk Assessment
A Hong Kong-compliant framework for conducting comprehensive risk assessments of suppliers, covering financial, operational, and compliance aspects.
Vendor Termination Letter
A formal notice under Hong Kong law to terminate a vendor relationship, including termination terms and next steps.
Confidentiality Agreement For Students
A Hong Kong law-governed agreement establishing confidentiality obligations for students accessing sensitive information during their educational or training activities.
Multi Party Settlement Agreement
A Hong Kong law-governed agreement that resolves complex disputes between multiple parties, setting out settlement terms and mutual obligations.
Supplier NDA
A Hong Kong law-governed non-disclosure agreement for protecting confidential information shared with suppliers.
Vendor Purchase Agreement
A Hong Kong law-governed agreement setting out terms and conditions for the supply of goods or products from a vendor to a purchasing company.
Supplier Contract
A Hong Kong law-governed agreement establishing terms and conditions between a customer and supplier for the provision of goods or services.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.