Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Multi User Software License
"I need a Multi User Software License Agreement for my enterprise-level accounting software that will be used by 500 users across our banking organization in Mumbai, with specific provisions for data security compliance and audit requirements under Indian banking regulations."
1. Parties: Identification of the licensor and licensee, including registered addresses and company details
2. Background: Context of the agreement, brief description of the software, and purpose of the license
3. Definitions: Detailed definitions of technical and legal terms used throughout the agreement
4. Grant of License: Scope of the license, permitted users, and usage rights
5. License Fees and Payment Terms: Details of licensing costs, payment schedule, and payment methods
6. User Limitations and Controls: Specifications of user numbers, access controls, and usage restrictions
7. Intellectual Property Rights: Statement of ownership rights, protection of IP, and restrictions on use
8. Licensee Obligations: Responsibilities of the licensee regarding software use, security, and access management
9. Technical Support and Maintenance: Terms of technical support, updates, and maintenance services
10. Confidentiality: Protection of confidential information and trade secrets
11. Data Protection and Privacy: Compliance with Indian data protection laws and privacy requirements
12. Term and Termination: Duration of the license, renewal terms, and termination conditions
13. Warranties and Disclaimers: Software performance warranties and limitation of liability
14. Governing Law and Jurisdiction: Specification of Indian law governance and jurisdiction for disputes
15. General Provisions: Standard boilerplate clauses including notices, assignment, and severability
1. Source Code Escrow: Terms for source code escrow arrangements, used when licensee requires additional security
2. Professional Services: Terms for additional implementation or customization services, if required
3. Export Controls: Compliance with export regulations, needed for international use
4. Disaster Recovery: Specific provisions for backup and recovery procedures, important for critical applications
5. Service Level Agreement: Detailed performance metrics and service levels, used for critical enterprise applications
6. Third-Party Software Components: Terms relating to incorporated third-party software, if applicable
7. Audit Rights: Provisions for usage auditing, typically included for high-value enterprise licenses
1. Schedule A - Software Description: Detailed technical specifications and functionality of the licensed software
2. Schedule B - License Fees: Detailed breakdown of license fees, payment terms, and calculation methods
3. Schedule C - Support Services: Specific support services, response times, and escalation procedures
4. Schedule D - Service Levels: Performance metrics, availability requirements, and remedy calculations
5. Schedule E - Authorized Users: Categories of authorized users and access levels
6. Schedule F - Technical Requirements: Hardware and software requirements for operating the licensed software
7. Appendix 1 - Security Requirements: Detailed security protocols and requirements for software usage
8. Appendix 2 - Data Processing Terms: Specific terms for handling personal and sensitive data under Indian law
Authors
Authorized Users
Business Day
Commencement Date
Confidential Information
Documentation
Effective Date
Intellectual Property Rights
License Fee
License Term
Licensed Software
Licensee
Licensor
Maintenance Services
Normal Business Hours
Notice
Personal Data
Security Requirements
Service Levels
Software Updates
Source Code
Specifications
Support Services
System Requirements
Technical Support
Term
Territory
Third Party Software
User Acceptance Testing
User Authentication
User Credentials
User Interface
User Limits
Version
Virus
Working Hours
Payment
Intellectual Property
Confidentiality
Data Protection
Warranties
Limitation of Liability
Indemnification
Term and Termination
Technical Support
Maintenance
User Management
Access Rights
Security
Compliance
Audit Rights
Assignment
Force Majeure
Dispute Resolution
Governing Law
Notice
Entire Agreement
Amendment
Severability
Waiver
Third Party Rights
Export Control
Anti-Corruption
Insurance
Survival
Information Technology
Banking and Financial Services
Healthcare
Education
Manufacturing
Retail
Professional Services
Telecommunications
Government and Public Sector
Media and Entertainment
Insurance
Pharmaceuticals
Logistics and Transportation
Legal
Information Technology
Procurement
Compliance
Information Security
Finance
Operations
Risk Management
Software Asset Management
Vendor Management
Chief Information Officer
IT Director
Legal Counsel
Procurement Manager
Software License Manager
Compliance Officer
Information Security Manager
IT Operations Manager
Enterprise Architect
Chief Technology Officer
Contract Manager
Risk Manager
Chief Financial Officer
IT Project Manager
System Administrator
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.