Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Software Development Outsourcing Contract
1. Parties: Identification of the contracting parties - client and software development company
2. Background: Context of the agreement, including business objectives and high-level project description
3. Definitions: Defined terms used throughout the agreement
4. Scope of Services: Detailed description of development services, methodologies, and deliverables
5. Project Management: Governance structure, reporting lines, meeting cadence, and escalation procedures
6. Development Process: Software development lifecycle, approval processes, and acceptance criteria
7. Timeline and Milestones: Project schedule, key deadlines, and delivery dates
8. Charges and Payment: Fee structure, payment terms, expenses, and invoicing procedures
9. Client Obligations: Responsibilities and commitments of the client, including provision of information and resources
10. Contractor Obligations: Key commitments, warranties, and service standards of the development company
11. Intellectual Property Rights: Ownership and licensing of pre-existing and newly created IP
12. Data Protection and Security: GDPR compliance, data handling requirements, and security standards
13. Confidentiality: Protection of confidential information and trade secrets
14. Liability and Indemnities: Risk allocation, limitations of liability, and indemnification provisions
15. Term and Termination: Contract duration, renewal terms, and termination rights
16. General Provisions: Standard boilerplate clauses including governing law, notices, and entire agreement
1. Agile Development Methodology: Specific provisions for agile development including sprint planning, backlog management, and iterative delivery - used when following agile methodology
2. Acceptance Testing: Detailed testing procedures and acceptance criteria - used for complex implementations requiring formal testing
3. Third Party Software: Provisions regarding integration with or use of third-party software - needed when solution incorporates third-party components
4. Source Code Escrow: Arrangements for source code deposit and release - used when client requires additional security
5. Maintenance and Support: Post-development support and maintenance terms - included if ongoing support is part of the arrangement
6. Staff Transfer: Provisions regarding transfer or deployment of staff - needed if personnel will be transferred or embedded
7. Change Control: Procedures for managing changes to scope or specifications - important for complex or long-term projects
8. Service Levels: Performance metrics and service levels - used when specific performance standards are required
9. Business Continuity: Disaster recovery and business continuity requirements - needed for business-critical applications
10. Exit Management: Detailed provisions for transition at contract end - important for complex or critical systems
1. Technical Specifications: Detailed technical requirements, functionality, and performance specifications
2. Project Plan: Detailed timeline, resource allocation, and delivery schedule
3. Charges and Payment Schedule: Detailed breakdown of fees, payment milestones, and rate cards
4. Service Levels and KPIs: Detailed performance metrics, measurement methods, and remedies
5. Security Requirements: Detailed security standards, protocols, and compliance requirements
6. Testing Procedures: Detailed testing methodology, test cases, and acceptance criteria
7. Personnel: Key personnel, roles, qualifications, and replacement procedures
8. Form of Change Order: Template for documenting and approving changes to scope or specifications
9. Data Processing Agreement: Detailed terms for personal data processing in compliance with GDPR
10. Exit Plan: Detailed procedures for handover and transition at contract end
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.