Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Non Use Agreement
1. Parties: Identification and details of the contracting parties
2. Background: Context of the agreement, including the nature of the information or assets subject to non-use restrictions
3. Definitions: Key terms used in the agreement, including 'Confidential Information', 'Restricted Information', 'Non-Use Period', etc.
4. Scope of Non-Use: Detailed description of what information/assets cannot be used and the extent of restrictions
5. Duration: Time period for which the non-use obligations remain in effect
6. Acknowledgments: Parties' acknowledgments regarding ownership and rights to the restricted information/assets
7. Security Measures: Required measures to ensure compliance with non-use obligations
8. Breach and Remedies: Consequences of breach and available remedies
9. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for disputes
10. Signatures: Execution block for parties' signatures
1. Group Companies: Section defining obligations for affiliated companies, relevant when parties are part of larger corporate groups
2. Return/Destruction of Materials: Procedures for handling physical or electronic materials, relevant when tangible items are involved
3. Audit Rights: Rights to audit compliance, relevant for high-value or high-risk situations
4. Insurance Requirements: Specific insurance obligations, relevant for high-risk situations
5. Data Protection: GDPR compliance provisions, required when personal data is involved
6. Permitted Uses: Specific exceptions to non-use obligations, relevant when limited use is allowed
7. Assignment: Terms for transferring rights/obligations, relevant for long-term agreements
1. Schedule 1 - Restricted Information: Detailed list or description of information/assets subject to non-use restrictions
2. Schedule 2 - Authorized Personnel: List of individuals authorized to handle the restricted information, if applicable
3. Schedule 3 - Security Protocols: Detailed security measures and compliance procedures
4. Schedule 4 - Permitted Uses: Detailed description of any permitted uses or exceptions, if applicable
5. Appendix A - Contact Details: Contact information for key personnel and notices
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.