Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Aup Agreement
"I need an AUP Agreement for my new cloud storage service launching in Malaysia by March 2025, with specific focus on data protection and bandwidth usage limitations for enterprise clients."
1. Parties: Identification of the service provider and the user/customer entering into the agreement
2. Background: Context of the agreement, including the nature of services provided and purpose of the AUP
3. Definitions: Key terms used throughout the agreement, including technical terminology and specific services
4. Scope of Services: Overview of the services covered by the AUP
5. Acceptable Use Terms: Detailed guidelines for permitted use of the services
6. Prohibited Activities: Specific actions and behaviors that are explicitly forbidden
7. Security Requirements: User obligations regarding account security and access credentials
8. Data Protection and Privacy: Terms relating to data handling and privacy compliance
9. Monitoring and Enforcement: Provider's rights to monitor usage and enforce policy terms
10. Consequences of Violation: Actions that may be taken in response to policy violations
11. Limitation of Liability: Limits on the provider's liability for service issues or user actions
12. Termination: Conditions and procedures for agreement termination
13. Governing Law: Specification of Malaysian law as governing law and jurisdiction
1. Service Level Commitments: Include when specific service levels are guaranteed
2. Content Guidelines: Include when users can create or upload content
3. Bandwidth and Resource Usage: Include when there are specific resource limitations or quotas
4. Third-Party Services: Include when the service integrates with third-party platforms
5. Geographic Restrictions: Include when service access is limited to specific regions
6. Emergency Services: Include when the service could be used for emergency communications
7. Intellectual Property Rights: Include when users may create or share intellectual property
8. Payment Terms: Include when the service involves fees or payments
1. Schedule 1: Technical Requirements: Detailed technical specifications and requirements for service use
2. Schedule 2: Usage Quotas: Specific limitations on bandwidth, storage, or other resources
3. Schedule 3: Security Standards: Detailed security requirements and protocols
4. Appendix A: Prohibited Content Categories: Detailed list of prohibited content types
5. Appendix B: Fee Schedule: Detailed breakdown of any applicable fees or charges
6. Appendix C: Incident Response Procedures: Procedures for handling security incidents and violations
Authors
Account
Agreement
Authorized User
Bandwidth
Content
Credentials
Data
Electronic Communication
Equipment
Governing Law
Harmful Code
Identity Card
Intellectual Property Rights
Internet Services
Login Details
Malicious Software
Network
Network Security
Password
Personal Data
Platform
Privacy Policy
Prohibited Content
Security Breach
Service Provider
Services
System
System Resources
Terms of Service
Third Party Content
Unauthorized Access
User
User Account
User Content
Username
Virus
Website
Recitals
Definitions
Scope of Services
Acceptable Use
Prohibited Activities
User Obligations
Security Requirements
Data Protection
Privacy
Access Rights
Account Management
Network Usage
Content Standards
Monitoring Rights
System Resources
Service Availability
Technical Requirements
Security Breach
Intellectual Property
Third Party Content
Compliance
Enforcement
Suspension Rights
Termination
Liability
Indemnification
Force Majeure
Dispute Resolution
Governing Law
Jurisdiction
Notices
Amendment Rights
Severability
Entire Agreement
Information Technology
Telecommunications
Education
Financial Services
Healthcare
E-commerce
Cloud Services
Media and Entertainment
Professional Services
Government Services
Manufacturing
Retail
Legal
Information Technology
Information Security
Compliance
Risk Management
Operations
Technical Support
Customer Service
Infrastructure
Policy and Governance
Digital Operations
System Administration
Chief Information Security Officer
Legal Counsel
Compliance Officer
IT Director
Network Administrator
Security Manager
Risk Manager
Operations Manager
System Administrator
Policy Manager
Digital Services Manager
Technical Support Manager
Cloud Services Administrator
Information Security Analyst
Data Protection Officer
Find the exact document you need
Email And Internet Usage Policy
A Malaysian-compliant policy document governing organizational email and internet usage, establishing guidelines for secure and appropriate electronic communications.
Aup Agreement
A Malaysian law-governed agreement defining acceptable use terms and conditions for digital services, including user obligations and compliance requirements.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.