Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Supplier NDA
"I need a Supplier NDA for my manufacturing company to protect our product designs and technical specifications when sharing them with potential suppliers in Asia, with specific provisions for protecting our patents and manufacturing processes."
1. Parties: Identification of the disclosing and receiving parties, including full legal names and addresses
2. Background: Context of the relationship and purpose of sharing confidential information between supplier and company
3. Definitions: Key terms including Confidential Information, Trade Secrets, Representatives, Permitted Purpose
4. Confidentiality Obligations: Core obligations regarding use, protection, and non-disclosure of confidential information
5. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to representatives and legal requirements
6. Protection Measures: Security measures required to protect confidential information
7. Term and Termination: Duration of the agreement and circumstances for termination
8. Return or Destruction: Requirements for returning or destroying confidential information upon termination
9. Remedies: Legal remedies available in case of breach, including injunctive relief
10. General Provisions: Standard legal provisions including governing law, jurisdiction, and entire agreement
1. Non-Solicitation: Restrictions on hiring or soliciting employees or customers, used when protecting against poaching is a concern
2. Data Privacy Compliance: Specific obligations regarding personal data protection, required when personal data will be shared
3. Export Control: Compliance with export control regulations, needed when technical data subject to export controls may be shared
4. Intellectual Property Rights: Provisions clarifying ownership and rights in any IP that may be disclosed, used when IP is likely to be shared
5. Residual Knowledge: Provisions addressing use of general knowledge retained in memory, used in technology sector agreements
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of confidential information covered by the agreement
2. Schedule 2 - Authorized Representatives: List of individuals or roles authorized to receive and handle confidential information
3. Schedule 3 - Security Requirements: Specific security protocols and standards for handling confidential information
4. Schedule 4 - Approved Subcontractors: List of pre-approved subcontractors who may receive confidential information if applicable
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.