Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of all parties including the existing parties to the main agreement and the joining party
2. Background: Context of the original agreement, reason for joinder, and purpose of the confidentiality obligations
3. Definitions: Key terms including 'Confidential Information', 'Main Agreement', 'Effective Date', and other relevant defined terms
4. Joinder: Express provisions regarding the joining party becoming bound by the main agreement
5. Confidentiality Obligations: Core confidentiality provisions including use restrictions, protection standards, and permitted disclosures
6. Term and Survival: Duration of confidentiality obligations and provisions that survive termination
7. Return or Destruction of Confidential Information: Obligations regarding handling of confidential information upon termination or request
8. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
9. Governing Law and Jurisdiction: Specification of Nigerian law as governing law and jurisdiction for disputes
10. Execution: Signature blocks and execution formalities
1. Data Protection Compliance: Required if confidential information includes personal data subject to NDPR
2. Electronic Information Security: Include when confidential information will be shared or stored electronically
3. Group Company Rights: Add when the joining party's affiliates need rights to access confidential information
4. Specific Industry Compliance: Include for regulated industries with specific confidentiality requirements
5. Assignment and Succession: Include when transfer rights need to be specifically addressed
6. Non-Solicitation: Add when protection against poaching employees or clients is required
7. Prior Agreements: Include when there are existing NDAs that need to be addressed or superseded
1. Schedule 1 - Main Agreement: Copy or summary of the main agreement being joined
2. Schedule 2 - Specific Confidential Information: Detailed description of the types of confidential information covered
3. Schedule 3 - Authorized Representatives: List of individuals authorized to receive confidential information
4. Schedule 4 - Security Protocols: Specific procedures for handling and protecting confidential information
5. Appendix A - Form of Acknowledgment: Template for acknowledgment by recipient's employees or contractors
6. Appendix B - Data Processing Terms: Specific terms for handling personal data if applicable
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
