Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Outsourcing Contract Agreement
"I need an Outsourcing Contract Agreement for engaging a Singapore-based IT service provider to manage our cloud infrastructure and cybersecurity operations, with strict data protection requirements and service level commitments starting from March 2025."
1. Parties: Identification and details of the service provider and recipient
2. Background: Context of the agreement and brief description of the business relationship
3. Definitions: Key terms used throughout the agreement
4. Scope of Services: Detailed description of services to be provided
5. Term and Termination: Duration of agreement and termination conditions
6. Payment Terms: Pricing, payment schedule, and invoicing details
7. Service Levels: Performance standards and metrics
8. Data Protection and Security: PDPA compliance and data security measures
9. Confidentiality: Protection of confidential information
10. Governing Law: Singapore law provisions and jurisdiction
1. Employee Transfer: Terms for transfer of employees when outsourcing involves staff transfers
2. Technology Transfer: Terms for technology licensing and transfer when IT systems or software are involved
3. Business Continuity: Disaster recovery and business continuity provisions for critical business functions
4. Change Control: Process for managing changes to services in complex or long-term arrangements
5. Regulatory Compliance: Industry-specific regulatory requirements for regulated industries like financial services
1. Service Description Schedule: Detailed specifications of services
2. Service Level Agreement: Detailed performance metrics and KPIs
3. Pricing Schedule: Detailed pricing structure and calculations
4. Data Processing Agreement: Detailed data protection obligations under PDPA
5. Business Continuity Plan: Detailed disaster recovery procedures
6. Key Personnel: List of key staff and their roles
7. Exit Plan: Transition arrangements upon termination
Authors
Applicable Laws
Business Day
Charges
Commencement Date
Confidential Information
Contract Year
Data Protection Laws
Deliverables
Effective Date
Force Majeure Event
Good Industry Practice
Intellectual Property Rights
Key Personnel
Material Breach
PDPA
Personal Data
Service Credits
Service Levels
Services
Service Provider
Client
Subcontractor
Term
Termination Date
Third Party
Working Hours
Change Request
Business Continuity Plan
Disaster Recovery Plan
Exit Plan
Performance Indicators
Service Level Agreement
Transition Period
Transition Services
Service Levels
Charges and Payment
Term and Termination
Intellectual Property Rights
Confidentiality
Data Protection
Security Requirements
Liability and Indemnification
Force Majeure
Assignment and Subcontracting
Change Control
Audit Rights
Performance Monitoring
Business Continuity
Disaster Recovery
Exit Management
Personnel and Key Staff
Non-Solicitation
Warranties and Representations
Insurance
Dispute Resolution
Notices
Governing Law and Jurisdiction
Regulatory Compliance
Service Provider Obligations
Client Obligations
Reporting Requirements
Quality Assurance
Risk Management
Anti-Bribery and Corruption
Transition Services
Knowledge Transfer
Asset Transfer
Step-in Rights
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.