Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Cyber Threat Assessment
1. Parties: Identification of the service provider and the client organization
2. Background: Context of the engagement and purpose of the cyber threat assessment
3. Definitions: Key terms used throughout the agreement, including technical cybersecurity terminology
4. Scope of Services: Detailed description of the threat assessment services to be provided
5. Assessment Methodology: Overview of the approach, tools, and techniques to be used in the assessment
6. Service Provider Obligations: Key responsibilities and commitments of the security assessment provider
7. Client Obligations: Requirements for client cooperation, access provision, and information sharing
8. Data Protection and GDPR Compliance: Provisions ensuring compliance with GDPR and Danish data protection laws
9. Confidentiality: Protection of sensitive information discovered during the assessment
10. Intellectual Property: Ownership and usage rights of assessment results and methodologies
11. Delivery and Acceptance: Process for delivering and accepting the assessment results
12. Fees and Payment: Pricing structure, payment terms, and related conditions
13. Liability and Indemnification: Limitations of liability and indemnification provisions
14. Term and Termination: Duration of the agreement and termination provisions
15. General Provisions: Standard legal provisions including governing law, dispute resolution, and notices
1. Emergency Response Procedures: Procedures for handling critical vulnerabilities discovered during assessment - include when client requires immediate notification of critical findings
2. Industry-Specific Compliance: Additional provisions for specific industry regulations (e.g., financial services, healthcare) - include when client operates in regulated industry
3. Cross-Border Data Transfers: Provisions for handling international data transfers - include when assessment involves multiple jurisdictions
4. Subcontractor Requirements: Terms governing the use of subcontractors - include when service provider plans to use third-party specialists
5. Insurance Requirements: Specific insurance coverage requirements - include when client requires particular insurance levels
6. Post-Assessment Support: Terms for additional support after assessment completion - include when ongoing support is needed
7. Training and Knowledge Transfer: Provisions for training client staff on findings - include when knowledge transfer is part of scope
1. Schedule A - Assessment Scope and Methodology: Detailed technical scope, systems covered, and assessment methodology
2. Schedule B - Service Level Agreement: Specific performance metrics, timelines, and service levels
3. Schedule C - Fee Schedule: Detailed pricing, payment structure, and any variable costs
4. Schedule D - Security and Confidentiality Requirements: Specific security measures and confidentiality protocols
5. Schedule E - Data Processing Agreement: GDPR-compliant data processing terms and conditions
6. Schedule F - Contact Matrix: Key contacts and escalation procedures for both parties
7. Appendix 1 - Technical Requirements: Technical specifications and requirements for the assessment
8. Appendix 2 - Report Templates: Standard formats for assessment reports and findings
9. Appendix 3 - Incident Response Protocol: Procedures for handling security incidents during assessment
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.