Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification and details of all three parties to the agreement
2. Background: Context of the relationship between the three parties and purpose of sharing confidential information
3. Definitions: Detailed definitions including 'Confidential Information', 'Permitted Purpose', 'Representatives', and other key terms
4. Disclosure and Use of Confidential Information: Rules governing how confidential information can be shared among the three parties and permitted uses
5. Obligations of Confidentiality: Core confidentiality obligations of each party, including specific duties in the three-way relationship
6. Security Measures: Required security measures for protecting confidential information
7. Return or Destruction of Confidential Information: Procedures for handling confidential information upon termination or request
8. Duration and Survival: Term of the agreement and surviving obligations
9. Breach and Remedies: Consequences of breach and available remedies
10. General Provisions: Standard clauses including governing law, jurisdiction, entire agreement, and variation
1. Permitted Disclosures: Additional specified circumstances where disclosure is permitted, used when parties need specific exceptions
2. Data Protection Compliance: Specific provisions for NDPR compliance, required when confidential information includes personal data
3. Non-Circumvention: Prevents parties from bypassing each other, important in business opportunity contexts
4. Competitive Activities: Restrictions on competitive activities, relevant when parties are potential competitors
5. Internal Information Barriers: Requirements for information barriers within organizations, useful for large organizations
6. Export Control: Provisions for international data transfer compliance, needed for cross-border information sharing
1. Schedule 1 - Specified Confidential Information: Detailed list or categories of information deemed confidential
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols to be followed
4. Schedule 4 - Information Flow Chart: Diagram showing permitted information flow between the three parties
5. Schedule 5 - Destruction Certificate: Template certificate for confirming destruction of confidential information
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
