Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Cyber Security Assessment
1. Parties: Identification of the assessment provider and the client organization
2. Background: Context of the engagement and brief description of the client's needs for cybersecurity assessment
3. Definitions: Key terms used throughout the agreement, including technical cybersecurity terminology
4. Scope of Services: Detailed description of the cybersecurity assessment services to be provided
5. Assessment Methodology: Overview of the approach, tools, and techniques to be used in the assessment
6. Client Obligations: Client's responsibilities including access provision, information sharing, and cooperation requirements
7. Provider Obligations: Provider's commitments, including qualification requirements and service standards
8. Timeline and Milestones: Schedule of the assessment, including key dates and deliverables
9. Fees and Payment Terms: Pricing structure, payment schedule, and related terms
10. Confidentiality: Provisions for handling sensitive information discovered during the assessment
11. Data Protection: GDPR compliance and data handling requirements
12. Intellectual Property: Ownership of assessment results, reports, and methodologies
13. Liability and Indemnification: Limitation of liability and indemnification provisions
14. Term and Termination: Duration of the agreement and termination conditions
15. General Provisions: Standard legal clauses including governing law, jurisdiction, and notices
1. Insurance Requirements: Specific insurance coverage requirements - include when working with larger organizations or high-risk assessments
2. Emergency Response: Procedures for handling critical vulnerabilities discovered during assessment - include for high-risk environments
3. Sub-contractors: Terms governing the use of sub-contractors - include when external specialists may be needed
4. Non-Competition: Restrictions on working with competitors - include when dealing with sensitive industries
5. Knowledge Transfer: Requirements for training or knowledge sharing - include when client requires capability building
6. Compliance with Industry Standards: Specific industry standard compliance requirements - include for regulated industries
1. Schedule A - Assessment Scope Detail: Detailed technical scope of systems, applications, and processes to be assessed
2. Schedule B - Technical Requirements: Specific technical requirements and standards to be tested against
3. Schedule C - Testing Methodology: Detailed assessment methodology and testing procedures
4. Schedule D - Deliverables Format: Template and format requirements for assessment reports and documentation
5. Schedule E - Service Level Agreement: Specific performance metrics and service levels
6. Schedule F - Fee Schedule: Detailed breakdown of fees and payment milestones
7. Appendix 1 - Contact Details: Key contacts and escalation procedures
8. Appendix 2 - Data Processing Agreement: GDPR-compliant data processing terms and conditions
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.