Your data doesn't train Ҵý's AI
You keep IP ownership of your docs
1. Parties: Identification of all parties to the agreement, including their legal names, ABNs/ACNs, and registered addresses
2. Background: Context of the agreement, purpose of sharing confidential information, and nature of the business relationship
3. Definitions: Detailed definitions of key terms, especially 'Confidential Information', 'Permitted Purpose', 'Representatives', and 'Digital Materials'
4. Confidentiality Obligations: Core obligations regarding non-disclosure, protection, and use of confidential information
5. Digital Security Requirements: Specific measures required for protecting digital information, including encryption, access controls, and secure storage
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to representatives and legal requirements
7. Return or Destruction of Information: Obligations regarding the return or destruction of confidential information, including digital copies and backups
8. Term and Survival: Duration of the agreement and which obligations survive termination
9. Breach and Remedies: Consequences of breach and available remedies, including injunctive relief
10. General Provisions: Standard provisions including governing law, jurisdiction, entire agreement, and variation
1. Electronic Execution: Specific provisions for electronic signature and execution, particularly relevant for fully digital agreements
2. Data Privacy Compliance: Additional provisions when confidential information includes personal data subject to privacy laws
3. Third Party Access: Provisions governing access by third-party service providers or cloud storage providers
4. International Transfer: Provisions for cross-border transfer of digital information, if parties are in different jurisdictions
5. Competitive Activities: Non-compete or non-solicitation provisions, if relevant to the business relationship
6. Source Code Protection: Special provisions for protecting software source code, if applicable
7. Security Breach Notification: Procedures for notifying of and handling data security breaches
8. Audit Rights: Rights to audit compliance with security and confidentiality obligations
1. Schedule 1 - Confidential Information: Detailed description of the confidential information covered by the agreement
2. Schedule 2 - Security Standards: Specific technical and organizational security measures required for digital information
3. Schedule 3 - Authorized Representatives: List of authorized representatives who may access the confidential information
4. Appendix A - Data Handling Procedures: Specific procedures for handling, storing, and transmitting digital confidential information
5. Appendix B - Destruction Certificate: Template certificate confirming destruction of confidential information
Find the document you need
ұԾ’s Security Promise
Ҵý is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Ҵý is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
