Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Software Outsourcing Agreement
"I need a Software Outsourcing Agreement for our UK-based fintech startup to engage an Indian development company for building our mobile payment application, with specific focus on data protection compliance and source code ownership."
1. Parties: Identification and details of contracting parties
2. Background: Context and purpose of the agreement
3. Definitions: Key terms used throughout the agreement
4. Scope of Services: Detailed description of software development services to be provided
5. Project Timeline: Delivery schedules and milestones
6. Payment Terms: Pricing, payment schedule, and invoicing details
7. Intellectual Property Rights: Ownership and licensing of developed software and materials
8. Confidentiality: Protection of confidential information and trade secrets
9. Data Protection: Compliance with GDPR and data protection laws
10. Term and Termination: Duration and termination provisions
1. Change Control: Process for managing changes to scope or requirements - recommended for complex projects with likely scope changes
2. Staff Transfer: TUPE provisions and staff management - required when staff transfer is involved
3. Source Code Escrow: Source code protection arrangements - recommended when source code access is critical
4. Disaster Recovery: Business continuity provisions - essential for critical systems development
1. Schedule 1 - Service Level Agreement: Detailed performance metrics and service levels
2. Schedule 2 - Technical Specifications: Detailed technical requirements and specifications
3. Schedule 3 - Price Schedule: Detailed pricing breakdown and rate cards
4. Schedule 4 - Project Plan: Detailed project timeline and deliverables
5. Schedule 5 - Data Processing Agreement: Detailed data protection obligations and procedures
6. Schedule 6 - Security Requirements: Information security standards and requirements
7. Schedule 7 - Key Personnel: Details of key team members and roles
8. Schedule 8 - Exit Plan: Transition arrangements upon termination
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.