Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Information Security Agreement
"Need an Information Security Agreement for a Singapore-based fintech startup engaging a cloud service provider to handle customer financial data, with strict requirements around data encryption and breach notification within 24 hours."
1. Parties: Identification of all parties to the agreement, including their registered addresses and company details
2. Background: Context of the agreement and the purpose for which it is being entered into
3. Definitions: Key terms used throughout the agreement, including technical and security-related terminology
4. Scope of Information Protection: Definition of confidential information and protected data covered by the agreement
5. Security Requirements: Specific security measures and controls required to protect the information
6. Data Protection Obligations: Obligations under PDPA and other applicable laws regarding data handling
7. Breach Notification: Procedures for reporting and handling security incidents
8. Term and Termination: Duration of the agreement and conditions for termination
1. Cross-Border Data Transfers: Requirements for international data transfers when data will be transferred outside Singapore
2. Industry-Specific Requirements: Additional security requirements for specific sectors when dealing with regulated industries (finance, healthcare, etc.)
3. Audit Rights: Rights to audit security measures and compliance when regular security assessments are required
4. Subcontractor Requirements: Security obligations for third-party processors when subcontractors will handle protected information
1. Security Controls Schedule: Detailed technical and organizational security measures required
2. Data Processing Schedule: Specific details about data types, processing activities, and purposes
3. Incident Response Plan: Detailed procedures for handling security incidents
4. Compliance Checklist: List of specific security requirements and compliance measures
5. Contact Details Schedule: Key contacts for security incidents and operational matters
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.