Your data doesn't train Ҵý's AI
You keep IP ownership of your docs
1. Parties: Identifies and provides full details of all parties entering into the agreement
2. Background: Explains the context and purpose of the agreement, including the relationship between the parties
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information'
4. Scope of Confidential Information: Clearly outlines what information is covered by the agreement
5. Confidentiality Obligations: Details the core obligations to maintain confidentiality and permitted uses of the information
6. Exclusions: Specifies information that is not considered confidential (e.g., public domain, independently developed)
7. Security Measures: Outlines required measures to protect confidential information
8. Term and Termination: Specifies the duration of the agreement and termination provisions
9. Return or Destruction of Confidential Information: Requirements for handling confidential information after the agreement ends
10. Breach and Remedies: Consequences of breaching the agreement and available remedies
11. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
12. Execution: Signature blocks and execution details
1. Permitted Disclosures: Used when certain disclosures to third parties (like professional advisors) need to be explicitly permitted
2. Representatives and Employees: Include when confidential information will be shared with employees or representatives of the receiving party
3. Intellectual Property Rights: Added when confidential information includes IP that needs specific protection
4. Non-Solicitation: Include when there's a need to prevent poaching of employees or clients
5. Public Announcements: Used when there's a need to control public statements about the relationship
6. Data Protection: Include when personal data is part of the confidential information
7. Export Control: Added when confidential information may be subject to export control laws
8. Competing Projects: Used when parties need to address work on similar or competing projects
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of information covered by the agreement
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures required
4. Appendix A - Approved Third Party Recipients: Pre-approved third parties who may receive the confidential information
5. Appendix B - Form of Third Party Confidentiality Agreement: Template agreement for third parties who need access to confidential information
Find the document you need
ұԾ’s Security Promise
Ҵý is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Ҵý is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
