Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Limited Disclosure Agreement
"I need a Limited Disclosure Agreement to protect confidential technical information that will be shared with a Singapore-based software development vendor starting March 2025, with specific provisions for source code protection and remote access security protocols."
1. Parties: Identifies and defines all parties to the agreement, including their legal names, registration numbers, and addresses
2. Background: Sets out the context and purpose of the agreement, including the nature of the confidential information to be shared
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information'
4. Scope of Confidentiality: Describes what constitutes confidential information and the permitted uses
5. Obligations of Receiving Party: Details the responsibilities for handling and protecting confidential information
6. Term and Termination: Specifies duration of the agreement and conditions for termination
7. Return of Confidential Information: Procedures for returning or destroying confidential information
8. Governing Law: Specifies Singapore law as governing law and jurisdiction
1. Data Protection: Additional provisions for PDPA compliance when personal data is involved
2. Representatives: Names designated representatives for each party, used for complex agreements involving multiple departments or teams
3. Security Measures: Specific security protocols for handling information, required for highly sensitive information or regulated industries
4. Intellectual Property: IP rights and ownership provisions when IP-sensitive information is involved
5. Export Control: Compliance provisions for international transfers of technical data
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures
4. Schedule 4 - Permitted Purpose: Detailed description of how confidential information may be used
Authors
Authorized Purpose
Authorized Representatives
Business Day
Confidential Information
Disclosing Party
Effective Date
Excluded Information
Group
Intellectual Property Rights
Party/Parties
Personal Data
Permitted Recipients
Receiving Party
Representatives
Security Requirements
Subsidiary
Term
Third Party
Permitted Use
Protection of Information
Non-Disclosure
Return or Destruction of Information
Term and Termination
Data Protection
Security Measures
Intellectual Property
Breach and Remedies
Injunctive Relief
Notice Requirements
Assignment
Severability
Entire Agreement
Third Party Rights
Force Majeure
Governing Law
Dispute Resolution
Variations and Amendments
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.