¶¶Òõ¶ÌÊÓÆµ

Enterprise License Agreement Template for New Zealand

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Enterprise License Agreement

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Enterprise License Agreement

"I need an Enterprise License Agreement for a cloud-based healthcare software solution that will be deployed across multiple hospitals in New Zealand, with specific provisions for patient data protection and system uptime guarantees."

Document background
The Enterprise License Agreement is a sophisticated commercial contract designed for organizations requiring enterprise-wide software deployment under New Zealand law. It is typically used when a business needs to license software for use across multiple departments, locations, or subsidiaries, providing comprehensive terms for software usage, maintenance, and support. This agreement type is essential for large-scale software implementations where standard commercial licenses are insufficient. The document addresses key areas including intellectual property rights, service levels, compliance requirements, and risk allocation, while incorporating specific provisions required under New Zealand's legal framework. It's particularly suitable for complex software deployments requiring detailed terms around usage rights, support obligations, and performance guarantees.
Suggested Sections

1. Parties: Identification of the licensor and licensee, including full legal names and registered addresses

2. Background: Context of the agreement, brief description of the software/product, and purpose of the licensing relationship

3. Definitions: Detailed definitions of key terms used throughout the agreement

4. License Grant: Scope of the license, usage rights, restrictions, and territory limitations

5. Term and Termination: Duration of the agreement, renewal terms, and termination rights

6. Fees and Payment: License fees, payment terms, invoicing, and late payment consequences

7. Intellectual Property Rights: Ownership of IP, protection measures, and infringement procedures

8. Confidentiality: Protection of confidential information, obligations, and exclusions

9. Warranties and Disclaimers: Software performance warranties, disclaimer of implied warranties

10. Support and Maintenance: Basic support obligations, maintenance services, and response times

11. Limitation of Liability: Caps on liability, exclusions, and indemnification provisions

12. General Provisions: Standard boilerplate clauses including governing law, notices, and assignment

Optional Sections

1. Professional Services: Include when implementation, configuration, or training services are part of the deal

2. Hardware Requirements: Include when specific hardware is required for software operation

3. Data Protection: Include when personal data processing is involved, addressing Privacy Act 2020 requirements

4. Disaster Recovery: Include for critical enterprise systems requiring specific recovery procedures

5. Source Code Escrow: Include when source code escrow arrangements are required for risk mitigation

6. Audit Rights: Include when usage monitoring and audit provisions are necessary

7. Export Controls: Include when software is subject to export control regulations

8. Third Party Components: Include when third-party software components are part of the licensed solution

Suggested Schedules

1. Schedule 1 - Licensed Software: Detailed description of licensed software components and modules

2. Schedule 2 - Technical Specifications: Technical requirements, performance specifications, and compatibility details

3. Schedule 3 - Service Level Agreement: Detailed service levels, support tiers, and performance metrics

4. Schedule 4 - Pricing and Payment Terms: Detailed fee structure, payment schedules, and pricing models

5. Schedule 5 - Support and Maintenance Services: Detailed support procedures, maintenance windows, and escalation processes

6. Schedule 6 - Implementation Plan: Timeline and milestones for software implementation if applicable

7. Schedule 7 - Authorized Users: Definition and categories of authorized users and access rights

8. Appendix A - Security Requirements: Security standards, protocols, and compliance requirements

Authors

Alex Denne

Head of Growth (Open Source Law) @ ¶¶Òõ¶ÌÊÓÆµ | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Relevant legal definitions



















































Clauses













































Relevant Industries

Information Technology

Financial Services

Healthcare

Manufacturing

Retail

Telecommunications

Professional Services

Government

Education

Energy

Transportation

Insurance

Relevant Teams

Legal

Information Technology

Procurement

Finance

Risk and Compliance

Information Security

Enterprise Architecture

Vendor Management

Digital Transformation

Operations

Strategy

Relevant Roles

Chief Information Officer

IT Director

Chief Technology Officer

Procurement Manager

Legal Counsel

Software Asset Manager

IT Security Manager

Enterprise Architect

Contracts Manager

Chief Financial Officer

Risk and Compliance Manager

Vendor Management Officer

Chief Digital Officer

IT Operations Manager

Industries








Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

No items found.

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

³Ò±ð²Ô¾±±ð’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.