Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Business NDA Agreement
1. Parties: Identification of all contracting parties, including full legal names, registration numbers, and addresses
2. Background: Context of the agreement, purpose of sharing confidential information, and nature of the business relationship
3. Definitions: Clear definitions of key terms, especially 'Confidential Information', 'Trade Secrets', 'Permitted Purpose', and 'Representatives'
4. Scope of Confidentiality: Detailed description of what constitutes confidential information and how it should be marked or identified
5. Confidentiality Obligations: Core obligations regarding the protection, use, and non-disclosure of confidential information
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees, advisors, or as required by law
7. Security Measures: Required security measures for protecting confidential information, including digital and physical safeguards
8. Return or Destruction: Obligations regarding the return or destruction of confidential information upon request or termination
9. Term and Survival: Duration of the agreement and which obligations survive termination
10. Breach and Remedies: Consequences of breach, including remedies and enforcement rights
11. General Provisions: Standard clauses including governing law, jurisdiction, entire agreement, and amendments
1. Data Protection Compliance: Required when confidential information includes personal data, addressing GDPR compliance
2. International Transfer: Needed when confidential information will be transferred outside Denmark/EU
3. Intellectual Property Rights: Include when confidential information involves IP rights or when development of new IP is anticipated
4. Non-Competition: Optional restrictions on competitive activities, subject to Danish competition law limitations
5. Non-Solicitation: Restrictions on soliciting employees or customers, if relevant to the business relationship
6. Specific Industry Requirements: Additional provisions required for regulated industries (e.g., financial services, healthcare)
7. Residual Knowledge: Addressing use of general knowledge and experience gained, if acceptable to parties
1. Schedule 1 - Detailed Description of Confidential Information: Specific categories and types of confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Detailed security measures and protocols for handling confidential information
4. Appendix A - Form of Confidentiality Undertaking: Template for confidentiality undertakings to be signed by representatives
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.