NDA Personal Information Template for United States

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your NDA Personal Information

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

NDA Personal Information

"I need a Personal Information NDA for my healthcare software company to share patient data with our new cloud storage provider, ensuring HIPAA compliance and including specific provisions for data encryption and breach notification procedures, starting March 2025."

Document background
The Personal Information Non-Disclosure Agreement (NDA) is essential when sharing sensitive personal data in the United States business environment. This document is particularly crucial given the complex landscape of federal and state privacy regulations, including HIPAA, GLBA, and state-specific laws like CCPA. The agreement should be used whenever personal information needs to be shared with third parties, contractors, or service providers, ensuring appropriate protection and compliance with applicable privacy laws. The NDA Personal Information agreement includes specific provisions for data handling, security measures, breach notification, and return or destruction of information.
Suggested Sections

1. Parties: Identification of the disclosing and receiving parties

2. Background: Context and purpose of the NDA

3. Definitions: Key terms including 'Confidential Information' and 'Personal Information'

4. Scope of Confidential Information: Specific types of personal information covered

5. Obligations of Receiving Party: Duties to protect and maintain confidentiality

6. Term and Termination: Duration and ending conditions

7. Return of Information: Procedures for returning or destroying confidential information

Optional Sections

1. Data Protection Measures: Specific security requirements when handling sensitive personal data

2. International Transfer Provisions: Rules for cross-border data transfers when information may be transferred internationally

3. Breach Notification: Procedures for reporting data breaches when required by applicable privacy laws

Suggested Schedules

1. Types of Personal Information: Detailed list of personal information categories covered

2. Security Requirements: Specific technical and organizational measures required

3. Authorized Representatives: List of individuals authorized to handle the information

Authors

Alex Denne

Head of Growth (Open Source Law) @ Genie AI | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Industries

Privacy Act of 1974: Federal law that establishes a code of fair information practices governing the collection, maintenance, use, and dissemination of personal information maintained by federal agencies

Gramm-Leach-Bliley Act (GLBA): Federal law requiring financial institutions to explain their information-sharing practices and protect sensitive financial personal information

Health Insurance Portability and Accountability Act (HIPAA): Federal law that protects sensitive patient health information from being disclosed without patient consent or knowledge

Fair Credit Reporting Act (FCRA): Federal law regulating the collection, dissemination, and use of consumer credit information

Children's Online Privacy Protection Act (COPPA): Federal law imposing specific requirements on operators of websites or online services directed to children under 13 years of age

California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA): State laws providing California residents with enhanced privacy rights and consumer protection for their personal information

Virginia Consumer Data Protection Act (VCDPA): State law establishing framework for controlling and processing personal data in Virginia

Colorado Privacy Act (CPA): State law providing Colorado residents with privacy rights and imposing obligations on businesses handling their personal data

Uniform Trade Secrets Act: Model law adopted by states that provides legal framework for protecting trade secrets and confidential business information

Defend Trade Secrets Act: Federal law providing uniform standards for trade secret protection and allowing trade secret owners to sue in federal court

Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

No items found.

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: https://www.genieai.co/our-research
Oops! Something went wrong while submitting the form.

Genie’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; Genie’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our Trust Centre for more details and real-time security updates.