Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Source Code Escrow Agreement
"I need a Source Code Escrow Agreement for my financial software company based in Sydney, with multiple beneficiaries and quarterly verification testing requirements, to be implemented by March 2025."
1. Parties: Identifies and defines the three main parties: the depositor (software owner), the beneficiary (licensee), and the escrow agent
2. Background: Explains the context of the agreement, including reference to the main software license agreement
3. Definitions: Defines key terms used throughout the agreement, including 'Deposit Materials', 'Release Events', and 'Verification Tests'
4. Deposit Obligations: Details what materials must be deposited, format requirements, and update obligations
5. Verification and Testing: Outlines procedures for verifying completeness and usability of deposited materials
6. Escrow Agent Obligations: Specifies the duties of the escrow agent in maintaining and protecting the deposited materials
7. Release Conditions: Defines the events that trigger release of the source code to the beneficiary
8. Release Procedures: Details the process for requesting and executing a release of materials
9. Confidentiality: Establishes confidentiality obligations for all parties regarding the escrowed materials
10. Fees and Expenses: Specifies escrow fees, payment terms, and responsibility for costs
11. Warranties and Indemnities: Sets out warranties regarding deposited materials and related indemnifications
12. Term and Termination: Specifies duration of the agreement and termination rights
13. General Provisions: Standard boilerplate clauses including governing law, notices, and dispute resolution
1. Multiple Beneficiary Provisions: Required when multiple licensees are beneficiaries under the same escrow arrangement
2. International Provisions: Required when parties are in different jurisdictions, addressing cross-border issues
3. Compliance Requirements: Required when specific regulatory or industry compliance standards must be met
4. Technical Verification Procedures: Required when specific technical testing or verification procedures are necessary
5. Source Code Modification Rights: Required when beneficiary needs rights to modify the source code post-release
6. Disaster Recovery: Required when specific backup and recovery procedures need to be detailed
7. Step-In Rights: Required when beneficiary needs rights to take over development under specific circumstances
1. Schedule 1 - Deposit Materials: Detailed list of all materials to be deposited, including source code, documentation, and build instructions
2. Schedule 2 - Verification Test Procedures: Specific procedures and criteria for testing deposited materials
3. Schedule 3 - Release Events: Detailed description of events triggering release of materials
4. Schedule 4 - Fees Schedule: Detailed breakdown of all fees and payment terms
5. Schedule 5 - Technical Requirements: Technical specifications for deposit format and media
6. Appendix A - Form of Release Request: Template for beneficiary to request release of materials
7. Appendix B - Verification Report Template: Standard format for reporting results of verification tests
Authors
Information Technology
Software Development
Financial Services
Healthcare
Government and Public Sector
Telecommunications
Manufacturing
Energy and Utilities
Defense and Security
E-commerce
Education
Professional Services
Legal
Information Technology
Software Development
Procurement
Risk Management
Information Security
Operations
Vendor Management
Compliance
Business Development
Chief Technology Officer
Chief Information Officer
Legal Counsel
Software Development Manager
IT Director
Procurement Manager
Contract Manager
Information Security Officer
Risk Manager
Software Architect
Business Development Manager
Intellectual Property Lawyer
Technology Licensing Manager
Operations Director
Find the exact document you need
Cloud Escrow Agreement
An Australian-law governed agreement establishing escrow arrangements for cloud service components, ensuring business continuity through secured access to critical materials.
Technology Escrow Agreement
An Australian-law governed agreement for the secure third-party holding of critical technology assets, ensuring business continuity while protecting intellectual property rights.
Voluntary Escrow Agreement
An Australian law-governed agreement establishing terms for voluntary escrow arrangements, including deposit, management, and release conditions.
Data Escrow Agreement
An Australian law-governed agreement establishing arrangements for secure third-party data storage and conditional release between a depositor, escrow agent, and beneficiary.
Escrow Agreement It Software
An Australian-law governed agreement for the secure third-party storage and conditional release of software source code and related materials.
Source Code Escrow Agreement
An Australian-law governed agreement where a third-party escrow agent holds software source code and related materials to protect both developer and licensee interests.
Escrow Account Agreement
An Australian law-governed agreement establishing the terms and conditions for holding and releasing funds or assets in escrow, defining the rights and obligations of all involved parties.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.