Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
NDA For Subcontractors
"I need an NDA for Subcontractors for my software development company based in Sydney, specifically to protect our source code and client data when working with offshore development contractors in India and Philippines starting March 2025."
1. Parties: Identifies the disclosing party (typically the main contractor or principal), and the receiving party (the subcontractor)
2. Background: Explains the context of the subcontractor relationship and the need for confidentiality
3. Definitions: Defines key terms including 'Confidential Information', 'Permitted Purpose', 'Permitted Recipients', and 'Trade Secrets'
4. Scope of Confidential Information: Clearly identifies what information is considered confidential under the agreement
5. Confidentiality Obligations: Core obligations regarding use, disclosure, and protection of confidential information
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees and advisors
7. Security Measures: Required measures to protect confidential information from unauthorized access or disclosure
8. Return or Destruction of Information: Obligations regarding the return or destruction of confidential information upon request or termination
9. Duration and Survival: Term of the agreement and which obligations survive termination
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Include when the subcontractor may create or modify IP while accessing confidential information
2. Data Protection and Privacy: Include when personal or sensitive data will be handled, especially if subject to Privacy Act requirements
3. International Transfers: Include when confidential information may be transferred outside Australia
4. Industry-Specific Compliance: Include when specific industry regulations govern information handling (e.g., healthcare, financial services)
5. Non-Competition: Include when there's a need to restrict the subcontractor from competing activities
6. Non-Solicitation: Include when there's a need to prevent poaching of employees or clients
7. Insurance Requirements: Include when specific insurance coverage is required for handling sensitive information
8. Audit Rights: Include when the disclosing party needs rights to audit compliance with security measures
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of confidential information covered by the agreement
2. Schedule 2 - Approved Security Protocols: Specific security measures and protocols required for protecting confidential information
3. Schedule 3 - Permitted Recipients: List of individuals or roles authorized to access confidential information
4. Schedule 4 - Project Scope: Description of the project or work for which confidential information is being disclosed
5. Appendix A - Form of Confidentiality Undertaking: Template undertaking to be signed by employees or representatives of the subcontractor
Authors
Construction
Information Technology
Professional Services
Mining
Engineering
Healthcare
Manufacturing
Telecommunications
Financial Services
Defense
Energy
Infrastructure
Consulting
Legal
Procurement
Operations
Information Technology
Risk and Compliance
Human Resources
Project Management Office
Supply Chain
Executive Leadership
Business Development
Information Security
Vendor Management
Project Manager
Legal Counsel
Procurement Manager
Contract Administrator
Operations Manager
Chief Information Officer
Risk Manager
Compliance Officer
Human Resources Manager
Business Development Manager
Chief Technology Officer
Program Director
Supply Chain Manager
General Counsel
Chief Executive Officer
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.