Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Personal NDA Agreement
"I need a Personal NDA Agreement under Singapore law to protect confidential information I'll be sharing with a potential business partner about my new tech startup, with specific provisions for protecting software code and trade secrets."
1. Parties: Identifies all parties to the agreement with full legal names and addresses
2. Background/Recitals: Sets out the context and purpose of the NDA
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information'
4. Scope of Confidentiality: Detailed description of what constitutes confidential information and permitted uses
5. Obligations of Receiving Party: Core confidentiality obligations and standard of care required
6. Term and Survival: Duration of the agreement and which provisions survive termination
7. Return of Confidential Information: Obligations regarding return or destruction of confidential information
8. Governing Law: Specifies Singapore law as governing law and jurisdiction
1. Permitted Disclosures: Optional section detailing specific exceptions to confidentiality obligations and circumstances under which disclosure is allowed
2. Non-Competition: Optional section containing restrictions on competitive activities, typically included when protecting against specific competitive threats
3. Non-Solicitation: Optional section restricting solicitation of employees or customers, included when protecting against poaching of staff or clients
4. Data Protection: Optional section covering specific provisions relating to personal data handling under Singapore's PDPA
5. Intellectual Property: Optional section addressing IP rights in confidential information when relevant
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of confidential information covered by the agreement
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific security measures required for handling confidential information
4. Schedule 4 - Permitted Purpose: Detailed description of the permitted use of confidential information
Authors
Confidential Information
Disclosing Party
Receiving Party
Permitted Purpose
Authorized Representatives
Affiliate
Business Day
Effective Date
Term
Personal Data
Representatives
Trade Secrets
Intellectual Property Rights
Proprietary Information
Confidentiality Period
Permitted Disclosures
Security Breach
Privileged Information
Material Non-Public Information
Permitted Use
Non-Disclosure
Return of Information
Data Protection
Security Measures
Term and Termination
Breach and Remedies
Indemnification
Notice Requirements
Non-Circumvention
Exceptions to Confidentiality
Assignment
Survival
Entire Agreement
Severability
Governing Law
Jurisdiction
Force Majeure
Amendments
Third Party Rights
Waiver
Counterparts
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.