Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Confidentiality Agreement
"I need an Australian Confidentiality Agreement for a potential merger discussion between our technology company and a target company, with specific provisions for due diligence review starting March 2025 and including data room access provisions."
1. Parties: Identifies and provides details of all parties to the agreement
2. Background: Sets out the context and purpose of the agreement, including the relationship between the parties
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information'
4. Scope of Confidential Information: Clearly describes what information is covered by the agreement
5. Obligations of Confidentiality: Details the core obligations to maintain confidentiality and permitted uses of the information
6. Security Measures: Specifies the required measures to protect confidential information
7. Term and Survival: Specifies how long the agreement lasts and which obligations survive termination
8. Return or Destruction of Information: Requirements for handling confidential information after the agreement ends
9. Breach and Remedies: Consequences of breaching the agreement and available remedies
10. General Provisions: Standard contract clauses including governing law, entire agreement, and amendments
1. Intellectual Property Rights: Clarifies ownership and rights regarding any intellectual property involved
2. Permitted Disclosures: Specifies circumstances where disclosure is allowed (e.g., to professional advisors or by court order)
3. Non-Solicitation: Prevents poaching of employees or clients, used when parties have access to sensitive relationship information
4. Representatives and Agents: Additional provisions when confidential information needs to be shared with employees or agents
5. Export Control: Required when dealing with international transfers of sensitive information
6. Data Privacy Compliance: Special provisions for compliance with privacy laws when personal information is involved
7. Competing Projects: Addresses whether the receiving party can work on similar projects
8. Marking Requirements: Specifies how confidential information should be marked or identified
1. Schedule 1 - Specified Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Detailed security measures and procedures for handling confidential information
4. Appendix A - Notification Procedures: Procedures for reporting unauthorized disclosures or security breaches
5. Appendix B - Return/Destruction Certificate: Template certificate confirming return or destruction of confidential information
Authors
Technology
Healthcare
Financial Services
Manufacturing
Professional Services
Research & Development
Entertainment & Media
Retail
Education
Biotechnology
Mining & Resources
Real Estate
Construction
Telecommunications
Legal Services
Legal
Human Resources
Executive Leadership
Research & Development
Information Technology
Business Development
Finance
Operations
Procurement
Sales & Marketing
Risk & Compliance
Corporate Development
Innovation
Product Development
Chief Executive Officer
Chief Financial Officer
Legal Counsel
Business Development Manager
Human Resources Manager
Project Manager
Research Scientist
IT Director
Procurement Manager
Sales Director
Investment Analyst
Consultant
Software Developer
Product Manager
Operations Manager
Corporate Secretary
Risk Manager
Compliance Officer
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.