Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the parties entering into the agreement, including the employer/company and the employee/contractor
2. Background: Context of the agreement, including the nature of the employment/business relationship and reason for the restrictions
3. Definitions: Key terms used throughout the agreement, including 'Confidential Information', 'Competing Business', 'Territory', and 'Restricted Period'
4. Non-Competition Obligations: Detailed provisions regarding restrictions on competing activities, including scope, duration, and geographical limitations
5. Non-Solicitation of Customers: Restrictions on approaching or dealing with customers or potential customers of the company
6. Non-Solicitation of Employees: Restrictions on recruiting or attempting to recruit company employees
7. Duration and Territory: Specific timeframe and geographical scope of the restrictions
8. Consideration: The compensation or benefit provided in exchange for these restrictions
9. Acknowledgments: Employee's acknowledgment of the reasonableness of restrictions and receipt of consideration
10. Remedies: Available remedies in case of breach, including injunctive relief and damages
11. General Provisions: Standard clauses including governing law, severability, and entire agreement
1. Confidentiality Obligations: Additional provisions regarding the protection of confidential information, used when not covered by a separate NDA
2. Garden Leave: Provisions for paid leave during notice period, used for senior employees or when immediate competition risk exists
3. Post-Termination Notifications: Requirements to notify new employers of restrictions, used for senior positions
4. Independent Legal Advice: Confirmation of receiving independent legal advice, recommended for senior employees or complex restrictions
5. Monitoring and Compliance: Procedures for monitoring compliance with restrictions, used for high-risk situations
6. Training and Trade Secrets: Special provisions regarding company-provided training and trade secrets, used when significant company investment is involved
1. Schedule 1 - Restricted Territory: Detailed map or list of geographical areas where restrictions apply
2. Schedule 2 - Competing Businesses: List of specific competitors or types of competing businesses
3. Schedule 3 - Protected Customers: List of specific customers or customer categories covered by non-solicitation provisions
4. Schedule 4 - Consideration Details: Detailed breakdown of any financial compensation or benefits provided as consideration
5. Appendix A - Acknowledgment Form: Form for periodic acknowledgment of ongoing compliance with restrictions
Find the document you need
Non Compete Form
An Indonesian law-governed Non-Compete Agreement restricting an employee's competitive activities to protect employer's business interests.
Non Compete Non Solicitation Agreement
An Indonesian law-governed agreement restricting employee competition and solicitation of company stakeholders, designed to protect legitimate business interests while complying with local employment regulations.
Non Compete Agreement Business To Business
An Indonesian law-governed agreement establishing competitive restrictions between businesses, ensuring compliance with national competition regulations while protecting legitimate business interests.
Non Solicitation Agreement
An Indonesian law-governed agreement preventing the solicitation of employees, customers, and business partners, with specific restrictions and enforcement provisions.
Non Compete Contract
An Indonesian law-compliant agreement restricting an employee's post-employment competitive activities, designed to protect legitimate business interests while maintaining reasonable restrictions.
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
