Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Confidentiality And Nondisclosure Agreement Form
1. Parties: Identification of the disclosing and receiving parties, including full legal names, registration numbers, and addresses
2. Background: Context of the agreement, relationship between parties, and purpose of sharing confidential information
3. Definitions: Clear definitions of key terms, especially 'Confidential Information', 'Trade Secrets', 'Permitted Purpose', and 'Authorized Recipients'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations, including handling, storage, and protection of confidential information
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to authorized personnel and legal requirements
7. Data Protection Compliance: Obligations regarding personal data handling in compliance with GDPR and Danish Data Protection Act
8. Security Measures: Required security measures for protecting confidential information
9. Return or Destruction of Confidential Information: Obligations regarding the return or destruction of confidential information upon agreement termination
10. Term and Termination: Duration of the agreement and termination provisions
11. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
12. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for disputes
1. Non-Solicitation: Restrictions on soliciting employees or customers, typically included in business-to-business agreements
2. Non-Competition: Restrictions on competitive activities, used when sharing highly sensitive business information
3. Intellectual Property Rights: Provisions regarding IP rights in cases where confidential information includes IP
4. Export Control: Compliance with export control laws, needed when information may be subject to international transfer restrictions
5. Audit Rights: Right to audit compliance with confidentiality obligations, useful for high-security requirements
6. Insurance Requirements: Obligations to maintain specific insurance coverage, relevant for high-value confidential information
7. Publicity and Announcements: Restrictions on public announcements about the relationship, important for business-sensitive relationships
8. Force Majeure: Provisions for extraordinary circumstances affecting confidentiality obligations
1. Schedule 1: Description of Confidential Information: Detailed listing and categorization of confidential information covered
2. Schedule 2: Authorized Recipients: List of individuals or roles authorized to access the confidential information
3. Schedule 3: Security Protocols: Specific security measures and protocols required for handling confidential information
4. Appendix A: Data Processing Terms: Detailed terms for personal data processing if required under GDPR
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.