Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
NDA For Data Security
"I need an NDA for Data Security to protect sensitive customer data when sharing it with our new cloud service provider, with specific provisions for HIPAA compliance and mandatory breach notification within 24 hours of discovery."
1. Parties: Identification of all parties entering into the NDA, including legal names and addresses
2. Background: Context for the agreement and purpose of sharing confidential information
3. Definitions: Key terms including 'Confidential Information', 'Data Security Requirements', 'Authorized Personnel'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information, particularly regarding data security
5. Data Security Obligations: Specific requirements for protecting confidential data, including technical and organizational measures
6. Term and Termination: Duration of the agreement and conditions for termination
7. Return or Destruction of Information: Requirements for handling confidential information after agreement termination
1. International Data Transfer: Additional provisions for cross-border data transfers and compliance with international data protection laws
2. Industry-Specific Compliance: Additional requirements for compliance with sector-specific regulations (HIPAA, GLBA, etc.)
3. Breach Notification Procedures: Detailed procedures for reporting and handling data security breaches
4. Audit Rights: Provisions for auditing compliance with data security measures and access to audit records
1. Schedule 1 - Data Security Requirements: Detailed technical and organizational security measures required for data protection
2. Schedule 2 - Authorized Personnel List: List of individuals authorized to access confidential information
3. Schedule 3 - Data Processing Locations: List of approved locations where data may be processed or stored
4. Schedule 4 - Incident Response Plan: Detailed procedures for responding to security incidents and data breaches
Authors
Data Security Requirements
Personal Data
Security Incident
Authorized Personnel
Data Processing
Security Measures
Disclosing Party
Receiving Party
Protected Systems
Technical Safeguards
Organizational Safeguards
Breach Notification
Access Controls
Permitted Purpose
Trade Secrets
Proprietary Information
Data Protection Laws
Compliance Requirements
Security Standards
Data Storage
Data Transfer
Third Party Recipients
Incident Response Plan
Termination Date
Data Security Requirements
Access Control
Use Restrictions
Information Protection
Security Breach Notification
Return or Destruction of Data
Audit Rights
Term and Termination
Compliance with Laws
Technical Safeguards
Data Transfer
Incident Response
Personnel Requirements
Representations and Warranties
Liability and Indemnification
Remedies
Severability
Survival
Governing Law
Dispute Resolution
Assignment
Force Majeure
Notices
Entire Agreement
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.