Your data doesn't train Ҵý's AI
You keep IP ownership of your docs
1. Parties: Identification of all parties to the agreement, including full legal names, registered addresses, and company details
2. Background: Context of the agreement, relationship between parties, and purpose of entering into the NDA
3. Definitions: Detailed definitions of key terms used throughout the agreement, particularly 'Confidential Information', 'Permitted Purpose', and 'Representatives'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations, including handling, protection, and non-disclosure requirements
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to representatives and as required by law
7. Security Measures: Required security measures for protecting confidential information
8. Return or Destruction of Confidential Information: Obligations regarding the return or destruction of confidential information upon request or termination
9. Term and Survival: Duration of the agreement and which obligations survive termination
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Data Protection Compliance: Additional provisions for compliance with international data protection laws - include when personal data may be shared
2. Intellectual Property Rights: Specific provisions regarding IP ownership and protection - include when confidential information includes IP
3. Export Control: Provisions regarding compliance with export control laws - include when technical data may be shared
4. Non-Solicitation: Restrictions on soliciting employees or customers - include when parties have access to employee/customer information
5. Competitive Activity: Restrictions on competitive activities - include when parties are in similar industries
6. Third Party Rights: Rights of third parties under the agreement - include when third party information may be shared
1. Schedule 1 - Specified Purpose: Detailed description of the permitted purpose for which confidential information may be used
2. Schedule 2 - Security Requirements: Specific security protocols and requirements for handling confidential information
3. Schedule 3 - Authorized Representatives: List of authorized representatives who may access confidential information
4. Appendix A - Form of Confidentiality Undertaking: Template confidentiality undertaking for representatives to sign
Find the document you need
ұԾ’s Security Promise
Ҵý is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Ҵý is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
