Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Enterprise Software License
"I need an Enterprise Software License Agreement for a cloud-based ERP system that will be deployed across our manufacturing facilities in New Zealand, with specific provisions for data security and integration with our existing systems, planned to go live by March 2025."
1. Parties: Identification of the licensor and licensee, including full legal names and registered addresses
2. Background: Context of the agreement, brief description of the software, and the parties' intention to enter into a licensing arrangement
3. Definitions: Detailed definitions of key terms used throughout the agreement
4. License Grant: Scope of the license, including usage rights, restrictions, and territory limitations
5. License Fees and Payment: Payment terms, fee structure, and payment schedules
6. Term and Termination: Duration of the license, renewal terms, and circumstances for termination
7. Intellectual Property Rights: Protection of IP rights, ownership declarations, and restrictions on use
8. Confidentiality: Protection of confidential information and trade secrets
9. Warranties and Representations: Software performance guarantees, compliance warranties, and disclaimer of warranties
10. Limitation of Liability: Caps on liability and exclusions of certain types of damages
11. Support and Maintenance: Basic support terms and maintenance obligations
12. Audit Rights: Right to audit licensee's use of the software for compliance
13. General Provisions: Standard boilerplate clauses including governing law, notices, and assignment
1. Professional Services: Include when implementation, configuration, or training services are part of the agreement
2. Service Level Agreement: Include for cloud-based software or when specific performance metrics are guaranteed
3. Data Protection: Include when the software processes personal data or when compliance with privacy laws is critical
4. Disaster Recovery: Include when business continuity and recovery procedures are crucial
5. Source Code Escrow: Include when source code access might be needed under specific circumstances
6. Export Control: Include when software is subject to international trade restrictions
7. Third-Party Software: Include when the solution incorporates third-party components
8. Hardware Requirements: Include when specific hardware is required for software operation
9. Development Services: Include when custom development or modifications are part of the agreement
1. Schedule 1 - Software Description: Detailed description of the licensed software, including modules and features
2. Schedule 2 - License Fees: Detailed breakdown of license fees, payment structure, and pricing terms
3. Schedule 3 - Technical Requirements: Hardware and software requirements for running the software
4. Schedule 4 - Support Services: Detailed support and maintenance terms, including SLAs if applicable
5. Schedule 5 - Authorized Users: Definition and number of authorized users or usage metrics
6. Appendix A - Acceptable Use Policy: Guidelines for acceptable use of the software
7. Appendix B - Security Requirements: Security standards and requirements for software operation
8. Appendix C - Data Processing Terms: Terms governing the processing of data, if applicable
Authors
Affiliate
Authorized Users
Business Day
Confidential Information
Configuration
Customization
Documentation
Effective Date
Enterprise Software
Fees
Force Majeure Event
Initial Term
Intellectual Property Rights
License
Licensed Software
Maintenance Services
Modifications
Normal Business Hours
Personal Data
Professional Services
Renewal Term
Security Requirements
Service Levels
Software Updates
Source Code
Specifications
Support Services
System Requirements
Term
Territory
Third-Party Software
Usage Data
User Acceptance Testing
User Interface
Version
Warranty Period
Work Product
Payment
Intellectual Property
Confidentiality
Data Protection
Warranties
Limitation of Liability
Indemnification
Term and Termination
Force Majeure
Assignment
Audit Rights
Support and Maintenance
Service Levels
Security
Acceptance Testing
Implementation
Change Control
Dispute Resolution
Insurance
Compliance with Laws
Notice
Governing Law
Entire Agreement
Severability
Non-Solicitation
Escrow
Export Control
Third Party Rights
Subcontracting
Information Technology
Financial Services
Healthcare
Manufacturing
Retail
Professional Services
Education
Government
Telecommunications
Insurance
Energy and Utilities
Transportation and Logistics
Construction
Mining and Resources
Media and Entertainment
Legal
Information Technology
Procurement
Finance
Information Security
Risk Management
Operations
Digital Transformation
Vendor Management
Enterprise Architecture
Software Asset Management
Contract Management
Chief Information Officer
Chief Technology Officer
IT Director
Procurement Manager
Legal Counsel
Software Licensing Manager
IT Project Manager
Information Security Manager
Chief Financial Officer
Technology Procurement Specialist
Vendor Management Director
Enterprise Architect
Solutions Architect
Commercial Contract Manager
IT Operations Manager
Chief Digital Officer
Software Asset Manager
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.