Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Employee Non Disclosure And Confidentiality Agreement
"I need an Employee Non Disclosure And Confidentiality Agreement for our Mumbai-based software development company, with specific provisions for protecting source code, client data, and development methodologies, suitable for senior developers who will be working remotely."
1. Parties: Identification of the employer and employee with full legal names and addresses
2. Background: Context of the agreement, employment relationship, and need for confidentiality
3. Definitions: Detailed definitions of key terms including 'Confidential Information', 'Trade Secrets', 'Intellectual Property', and other relevant terms
4. Scope of Confidential Information: Comprehensive description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Employee's specific duties regarding maintaining confidentiality and prohibited actions
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including legal requirements and authorized disclosures
7. Security Measures: Specific measures the employee must take to protect confidential information
8. Return of Confidential Information: Requirements for returning or destroying confidential information upon employment termination
9. Duration of Obligations: Time period for which confidentiality obligations remain in effect
10. Breach and Remedies: Consequences of breaching the agreement and available legal remedies
11. Governing Law and Jurisdiction: Specification of Indian law as governing law and jurisdiction for disputes
12. General Provisions: Standard clauses including severability, entire agreement, and amendments
1. Intellectual Property Rights: Detailed section on IP ownership and rights when the employee's role involves creation of IP
2. Non-Solicitation: Restrictions on soliciting other employees or customers, included when there's significant customer contact
3. Information Security Protocols: Specific IT security requirements, needed for roles with access to sensitive digital assets
4. Third Party Information: Obligations regarding confidential information belonging to company's clients or partners
5. International Data Transfer: Required for multinational companies or when data might be accessed across borders
6. Industry-Specific Compliance: Additional requirements for regulated industries like healthcare or financial services
7. Post-Employment Obligations: Specific post-termination confidentiality requirements, used for senior positions
8. Whistleblower Protection: Clarification of rights to report illegal activities to authorities
1. Schedule A - Categories of Confidential Information: Detailed listing of types of confidential information specific to the company
2. Schedule B - Security Procedures: Specific procedures and protocols for handling confidential information
3. Schedule C - Authorized Contacts: List of persons to whom confidential information can be disclosed or who can authorize disclosure
4. Appendix 1 - Acknowledgment Form: Form for employee to acknowledge receipt and understanding of confidential information
5. Appendix 2 - Exit Certification: Form to be signed upon employment termination confirming return of confidential information
Authors
Company
Employee
Trade Secrets
Intellectual Property
Proprietary Information
Agreement
Effective Date
Term
Permitted Purpose
Unauthorized Disclosure
Third Party
Affiliate
Business Information
Technical Information
Personal Data
Customer Information
Financial Information
Marketing Information
Research and Development
Work Product
Confidential Materials
Security Protocols
Authorized Recipients
Business Day
Competitive Business
Digital Assets
Source Code
Business Plans
Strategic Information
Company Network
Information Systems
Confidentiality Breach
Invention
Commercial Information
Documentation
Proprietary Rights
Termination Date
Restricted Period
Governing Law
Interpretation
Confidentiality Obligations
Non-Disclosure
Permitted Use
Security Measures
Return of Confidential Information
Intellectual Property Rights
Duration and Survival
Non-Solicitation
Data Protection
Breach and Remedies
Injunctive Relief
Indemnification
Assignment
Severability
Modification
Waiver
Notice
Force Majeure
Governing Law
Jurisdiction
Entire Agreement
Third Party Rights
Counterparts
Acknowledgment
Information Technology
Healthcare
Financial Services
Manufacturing
Research and Development
Professional Services
Pharmaceuticals
Telecommunications
E-commerce
Defense and Aerospace
Biotechnology
Consulting
Media and Entertainment
Education
Human Resources
Legal
Information Technology
Research and Development
Finance
Executive Leadership
Product Development
Operations
Marketing
Sales
Customer Service
Quality Assurance
Business Intelligence
Strategic Planning
Project Management
Chief Executive Officer
Chief Technology Officer
Software Engineer
Research Scientist
Product Manager
Human Resources Manager
Financial Analyst
Business Development Manager
Project Manager
Data Scientist
Systems Administrator
Legal Counsel
Marketing Manager
Operations Manager
Account Manager
Quality Assurance Engineer
Technical Lead
Sales Executive
Research Associate
Executive Assistant
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.