Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing and receiving parties, including full legal names, addresses, and company registration details as required under Indonesian law
2. Background: Context of the agreement, including the purpose of sharing confidential information and the nature of the business relationship
3. Definitions: Key terms including 'Confidential Information', 'Representatives', 'Permitted Purpose', and other relevant definitions
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Confidentiality: Core confidentiality obligations, including use restrictions and security measures
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to representatives and as required by law
7. Term and Survival: Duration of the agreement and survival of obligations after termination
8. Return or Destruction of Confidential Information: Procedures for handling confidential information upon termination or request
9. Breach and Remedies: Consequences of breach and available remedies under Indonesian law
10. Governing Law and Jurisdiction: Specification of Indonesian law as governing law and jurisdiction for disputes
1. Non-Solicitation: Prevents poaching of employees or clients, recommended when sharing sensitive business information
2. Data Protection: Additional provisions for personal data protection, necessary when confidential information includes personal data
3. Electronic Information Security: Specific provisions for digital information security, recommended when information is shared electronically
4. Export Control: Required when confidential information may be subject to export control regulations
5. Intellectual Property Rights: Additional provisions clarifying IP ownership and rights, important when sharing technical or creative information
6. Force Majeure: Provisions for unforeseen circumstances, recommended for long-term NDAs
1. Schedule 1 - Specified Confidential Information: Detailed list of specific confidential information covered by the agreement
2. Schedule 2 - Authorized Representatives: List of authorized personnel who may access the confidential information
3. Schedule 3 - Security Procedures: Specific security measures and protocols for handling confidential information
4. Appendix A - Form of Representative Undertaking: Template for additional confidentiality undertakings by representatives
5. Appendix B - Data Destruction Certificate: Template certificate confirming destruction of confidential information
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
