Your data doesn't train Ҵý's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full legal details of all parties to the agreement
2. Background: Explains the context and purpose of the NDA, including the nature of the business relationship
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information', 'Permitted Purpose', and 'Representatives'
4. Confidentiality Obligations: Core section detailing the obligations to maintain confidentiality and restrictions on use of confidential information
5. Permitted Disclosures: Specifies circumstances under which confidential information may be disclosed and to whom
6. Security Measures: Outlines required security measures for protecting confidential information
7. Return or Destruction of Confidential Information: Procedures for handling confidential information upon termination or request
8. Term and Termination: Duration of the agreement and circumstances for termination
9. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Intellectual Property Rights: Additional provisions regarding IP ownership and rights, particularly relevant when sharing technical information or trade secrets
2. Data Protection: Specific obligations regarding personal data handling, required when confidential information includes personal information
3. Competing Products: Restrictions on developing competing products using confidential information, relevant for manufacturing or technology suppliers
4. Subcontractors: Provisions governing disclosure to and obligations of subcontractors, needed when supplier may need to involve third parties
5. Export Control: Compliance with export control laws, necessary when dealing with international suppliers or controlled technologies
6. Insurance Requirements: Specific insurance obligations for protecting against confidentiality breaches, relevant for high-risk or high-value information
7. Auditing Rights: Right to audit supplier's compliance with confidentiality obligations, useful for highly sensitive information
1. Schedule 1 - Confidential Information: Detailed description of the specific confidential information covered by the agreement
2. Schedule 2 - Authorized Representatives: List of authorized representatives who may access confidential information
3. Schedule 3 - Security Protocols: Detailed security measures and protocols for handling confidential information
4. Appendix A - Acknowledgment Form: Form for representatives to acknowledge their confidentiality obligations
5. Appendix B - Return/Destruction Certificate: Template certificate confirming return or destruction of confidential information
Find the document you need
ұԾ’s Security Promise
Ҵý is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Ҵý is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
