Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Due Diligence NDA
1. Parties: Identification of the disclosing party, receiving party, and any relevant affiliated entities
2. Background: Context of the due diligence process and purpose of the NDA
3. Definitions: Key terms including 'Confidential Information', 'Permitted Purpose', 'Representatives', 'Affiliate'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the due diligence context
5. Obligations of Confidentiality: Core confidentiality obligations and permitted uses of confidential information
6. Permitted Disclosures: Circumstances under which confidential information may be shared with representatives and advisors
7. Data Protection and Security: Compliance with Danish Data Protection Act and security measures for handling confidential information
8. Return or Destruction of Confidential Information: Procedures for handling confidential information after the due diligence process
9. Duration and Survival: Term of the agreement and surviving obligations
10. Breach and Remedies: Consequences of breach and available remedies under Danish law
11. Governing Law and Jurisdiction: Specification of Danish law and jurisdiction
1. Clean Team Arrangements: Special provisions for handling particularly sensitive commercial information, used when dealing with competitors
2. Insider Trading Prevention: Required for due diligence involving publicly traded companies
3. Anti-trust Compliance: Additional provisions when the due diligence involves competitors or market-sensitive information
4. Digital Security Protocols: Specific requirements for digital data rooms and electronic information sharing
5. Non-Solicitation: Optional restrictions on approaching employees or customers, if relevant to the transaction
6. Standstill Provisions: For public companies, restrictions on acquiring shares during the due diligence process
1. Schedule 1 - Authorized Representatives: List of individuals authorized to access confidential information
2. Schedule 2 - Security Protocols: Detailed security measures and procedures for handling confidential information
3. Schedule 3 - Data Room Rules: Specific rules and procedures for accessing and using the data room
4. Appendix A - Form of Confidentiality Undertaking: Template for individual confidentiality undertakings by representatives
5. Appendix B - Information Classification Guide: Guidelines for classification levels of different types of confidential information
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.