Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Enterprise Software License
"I need an Enterprise Software License Agreement for a cloud-based ERP system that will be deployed across our manufacturing facilities in New Zealand, with specific provisions for data security and integration with our existing systems, planned to go live by March 2025."
1. Parties: Identification of the licensor and licensee, including full legal names and registered addresses
2. Background: Context of the agreement, brief description of the software, and the parties' intention to enter into a licensing arrangement
3. Definitions: Detailed definitions of key terms used throughout the agreement
4. License Grant: Scope of the license, including usage rights, restrictions, and territory limitations
5. License Fees and Payment: Payment terms, fee structure, and payment schedules
6. Term and Termination: Duration of the license, renewal terms, and circumstances for termination
7. Intellectual Property Rights: Protection of IP rights, ownership declarations, and restrictions on use
8. Confidentiality: Protection of confidential information and trade secrets
9. Warranties and Representations: Software performance guarantees, compliance warranties, and disclaimer of warranties
10. Limitation of Liability: Caps on liability and exclusions of certain types of damages
11. Support and Maintenance: Basic support terms and maintenance obligations
12. Audit Rights: Right to audit licensee's use of the software for compliance
13. General Provisions: Standard boilerplate clauses including governing law, notices, and assignment
1. Professional Services: Include when implementation, configuration, or training services are part of the agreement
2. Service Level Agreement: Include for cloud-based software or when specific performance metrics are guaranteed
3. Data Protection: Include when the software processes personal data or when compliance with privacy laws is critical
4. Disaster Recovery: Include when business continuity and recovery procedures are crucial
5. Source Code Escrow: Include when source code access might be needed under specific circumstances
6. Export Control: Include when software is subject to international trade restrictions
7. Third-Party Software: Include when the solution incorporates third-party components
8. Hardware Requirements: Include when specific hardware is required for software operation
9. Development Services: Include when custom development or modifications are part of the agreement
1. Schedule 1 - Software Description: Detailed description of the licensed software, including modules and features
2. Schedule 2 - License Fees: Detailed breakdown of license fees, payment structure, and pricing terms
3. Schedule 3 - Technical Requirements: Hardware and software requirements for running the software
4. Schedule 4 - Support Services: Detailed support and maintenance terms, including SLAs if applicable
5. Schedule 5 - Authorized Users: Definition and number of authorized users or usage metrics
6. Appendix A - Acceptable Use Policy: Guidelines for acceptable use of the software
7. Appendix B - Security Requirements: Security standards and requirements for software operation
8. Appendix C - Data Processing Terms: Terms governing the processing of data, if applicable
Authors
Information Technology
Financial Services
Healthcare
Manufacturing
Retail
Professional Services
Education
Government
Telecommunications
Insurance
Energy and Utilities
Transportation and Logistics
Construction
Mining and Resources
Media and Entertainment
Legal
Information Technology
Procurement
Finance
Information Security
Risk Management
Operations
Digital Transformation
Vendor Management
Enterprise Architecture
Software Asset Management
Contract Management
Chief Information Officer
Chief Technology Officer
IT Director
Procurement Manager
Legal Counsel
Software Licensing Manager
IT Project Manager
Information Security Manager
Chief Financial Officer
Technology Procurement Specialist
Vendor Management Director
Enterprise Architect
Solutions Architect
Commercial Contract Manager
IT Operations Manager
Chief Digital Officer
Software Asset Manager
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.