Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Confidentiality Agreement For Visitors
"I need a Confidentiality Agreement for Visitors for our new pharmaceutical research facility in Auckland, with specific provisions for laboratory access and prohibition of photography, as we'll be hosting international research partners from March 2025."
Your data doesn't train Genie's AI
You keep IP ownership of your information
1. Parties: Identifies the organization (host) and the visitor, including their legal names and addresses
2. Background: Brief context explaining why the visitor is entering into the agreement and the purpose of their visit
3. Definitions: Defines key terms including 'Confidential Information', 'Premises', 'Visit Period', and other relevant terms
4. Scope of Confidentiality: Clearly outlines what information is considered confidential and protected under the agreement
5. Visitor Obligations: Details the specific obligations of the visitor regarding confidential information, including non-disclosure and security measures
6. Permitted Uses: Specifies any permitted uses of the confidential information, if any
7. Duration of Obligations: Specifies how long the confidentiality obligations remain in effect
8. Return of Information: Requirements for returning or destroying any confidential information the visitor may have accessed
9. Breach and Remedies: Outlines consequences of breaching the agreement and available remedies
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Photography and Recording: Used when there's a need to specifically prohibit or regulate photography, video, or audio recording on premises
2. Electronic Devices: Include when there are specific rules about bringing or using electronic devices in certain areas
3. Intellectual Property: Added when the visitor may be exposed to patents, trademarks, or other IP that needs specific protection
4. Security Procedures: Include when visitors need to follow specific security protocols or procedures
5. Group Visits: Used when the agreement needs to cover multiple visitors from the same organization
6. Emergency Procedures: Include when visitors need to be aware of specific emergency protocols
7. Non-Solicitation: Added when there's a need to prevent visitor from soliciting employees or customers
1. Schedule 1 - Restricted Areas: List of specific areas within the premises that the visitor may or may not access
2. Schedule 2 - Types of Confidential Information: Detailed categorization of confidential information that may be encountered during the visit
3. Schedule 3 - Visit Details: Specific details about the visit including date, time, purpose, and authorized company representatives
4. Appendix A - Security Protocols: Detailed security procedures and protocols that must be followed during the visit