Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Technology Assignment Agreement
1. Parties: Identification of the assignor and assignee, including full legal names, registration numbers, and addresses
2. Background: Context of the agreement, relationship between parties, and purpose of the technology assignment
3. Definitions: Detailed definitions of key terms used throughout the agreement, including specific technical terminology
4. Subject Matter of Assignment: Clear identification and description of the technology being assigned
5. Scope of Assignment: Extent of rights being transferred, including territorial scope and field of use
6. Assignment and Transfer: Legal provisions effecting the transfer of ownership and associated rights
7. Consideration: Payment terms, including amount, payment schedule, and any adjustments
8. Representations and Warranties: Assignor's warranties regarding ownership, right to assign, non-infringement, and functionality of the technology
9. Delivery and Implementation: Process and timeline for transferring the technology, including any technical documentation
10. Confidentiality: Obligations regarding confidential information disclosed during the transfer process
11. Further Assurance: Obligations to execute additional documents and provide assistance for effectuating the transfer
12. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for disputes
13. General Provisions: Standard clauses including notices, entire agreement, amendments, and severability
1. Employee Inventions: Required when the technology was developed by employees, addressing requirements under Danish Act on Inventions by Employees
2. Tax Provisions: Specific tax considerations and allocations, needed for high-value transfers or international assignments
3. Training and Support: Include when the assignor will provide ongoing technical support or training
4. Third Party Rights: Required when the technology incorporates or depends on third-party intellectual property
5. Source Code Escrow: Include for software assignments where source code protection is needed
6. Data Protection: Required when the technology involves personal data processing under GDPR
7. Competition Restrictions: Include when imposing non-compete or territorial restrictions on the assignor
8. Maintenance Period: Include when the assignor will provide maintenance services post-assignment
1. Schedule 1 - Technical Description: Detailed technical specifications and documentation of the assigned technology
2. Schedule 2 - Intellectual Property Rights: List of all IP rights being transferred, including patent numbers, registrations
3. Schedule 3 - Third Party Licenses: Details of any third-party licenses associated with the technology
4. Schedule 4 - Delivery Schedule: Timeline and milestones for technology transfer and implementation
5. Schedule 5 - Payment Schedule: Detailed payment terms, including any milestone-based payments
6. Schedule 6 - Technical Documentation: User manuals, technical specifications, and other supporting documentation
7. Schedule 7 - Known Issues and Limitations: Disclosure of known technical issues or limitations of the technology
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.