Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Consulting Subcontractor Agreement
1. Parties: Identification of the main contractor and subcontractor, including full legal names, registration numbers, and addresses
2. Background: Context of the agreement, relationship between parties, and general purpose of the subcontracting arrangement
3. Definitions: Definitions of key terms used throughout the agreement
4. Scope of Services: Detailed description of consulting services to be provided, including any specific requirements or standards
5. Term and Termination: Duration of the agreement, renewal terms, and conditions for termination
6. Fees and Payment Terms: Compensation structure, payment schedule, expenses, invoicing requirements, and payment methods
7. Performance Standards: Quality standards, deliverables, and performance metrics
8. Obligations of the Subcontractor: Key responsibilities, reporting requirements, and compliance obligations
9. Obligations of the Main Contractor: Support, information, and resources to be provided by the main contractor
10. Intellectual Property Rights: Ownership and usage rights of work products, pre-existing IP, and developed materials
11. Confidentiality: Protection of confidential information and trade secrets
12. Data Protection: GDPR compliance and data processing obligations
13. Liability and Indemnification: Limitation of liability, indemnification obligations, and insurance requirements
14. Force Majeure: Circumstances excusing performance and related procedures
15. General Provisions: Standard legal provisions including governing law, jurisdiction, entire agreement, and amendments
1. Non-Competition: Restrictions on competitive activities, used when subcontractor may have access to sensitive market information or client relationships
2. Non-Solicitation: Restrictions on hiring or soliciting employees/clients, used when protecting business relationships is crucial
3. Warranties: Specific guarantees about services or capabilities, used for specialized consulting services
4. Service Levels: Detailed performance metrics and remedies, used for technical or mission-critical services
5. Change Control: Process for managing changes to services or terms, used in long-term or complex engagements
6. Compliance with Client Requirements: Flow-down provisions from end-client agreements, used when services are provided to end-clients
7. Insurance: Detailed insurance requirements, used for high-risk or regulated services
8. Business Continuity: Disaster recovery and business continuity requirements, used for critical services
9. Exit Assistance: Transition services upon termination, used for complex or integrated services
1. Schedule A - Services Description: Detailed specification of consulting services, methodologies, and deliverables
2. Schedule B - Fee Schedule: Detailed breakdown of fees, rates, expenses, and payment terms
3. Schedule C - Service Levels: Performance metrics, measurement methods, and remedies for non-performance
4. Schedule D - Data Processing Agreement: GDPR-compliant data processing terms and requirements
5. Schedule E - Key Personnel: Identification of key team members and their roles
6. Schedule F - Approved Subcontractors: List of pre-approved further subcontractors if applicable
7. Schedule G - Security Requirements: IT, physical, and data security requirements
8. Schedule H - Required Insurance: Detailed insurance requirements and minimum coverage levels
9. Appendix 1 - Form of Change Order: Template for documenting changes to services or terms
10. Appendix 2 - Acceptance Test Procedures: Procedures for accepting deliverables or milestones
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.