Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Consulting Agreement Between Two Companies
1. Parties: Identification of the consulting company and the client company, including business registration numbers (CVR numbers) and registered addresses
2. Background: Context of the agreement and brief description of the parties' business relationship
3. Definitions: Key terms used throughout the agreement
4. Scope of Services: Detailed description of the consulting services to be provided
5. Term and Termination: Duration of the agreement and conditions for termination
6. Fees and Payment Terms: Consulting fees, payment schedule, expenses, and invoicing procedures
7. Obligations of the Consultant: Responsibilities and commitments of the consulting company
8. Obligations of the Client: Responsibilities and commitments of the client company
9. Intellectual Property Rights: Ownership and usage rights of work products and pre-existing IP
10. Confidentiality: Protection of confidential information and trade secrets
11. Data Protection: GDPR compliance and data handling procedures
12. Liability and Indemnification: Limitation of liability and indemnification obligations
13. Force Majeure: Provisions for unforeseen circumstances and their handling
14. Governing Law and Jurisdiction: Specification of Danish law and jurisdiction for dispute resolution
15. Entire Agreement: Integration clause and relationship to other agreements
1. Non-Competition: Restrictions on competitive activities, used when the consultant may have access to sensitive market information
2. Non-Solicitation: Restrictions on hiring each other's employees, used when there is significant interaction with staff
3. Insurance: Insurance requirements, used for high-risk or regulated services
4. Service Levels: Specific performance metrics and standards, used for ongoing or technical services
5. Compliance with Laws: Specific regulatory compliance obligations, used in regulated industries
6. Subcontracting: Terms for engaging subcontractors, used when subcontracting is anticipated
7. Assignment: Rights to transfer the agreement, used when future corporate changes are anticipated
8. Audit Rights: Client's right to audit consultant's work, used for regulated services or complex projects
1. Schedule A - Service Description: Detailed specification of consulting services, methodologies, and deliverables
2. Schedule B - Fee Schedule: Detailed breakdown of fees, rates, and payment milestones
3. Schedule C - Key Personnel: List of key consultants and their roles/qualifications
4. Schedule D - Service Levels: Detailed performance metrics and measurement criteria
5. Schedule E - Data Processing Agreement: GDPR-compliant data processing terms and procedures
6. Appendix 1 - Contact Information: Key contacts and escalation procedures for both parties
7. Appendix 2 - Project Timeline: Detailed project schedule and milestones
8. Appendix 3 - Compliance Requirements: Specific regulatory or industry compliance requirements
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.