Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing and receiving parties, including their legal names, addresses, and company registration details
2. Background: Context of the agreement, including the purpose of sharing confidential information and the relationship between the parties
3. Definitions: Clear definitions of key terms, especially 'Confidential Information', 'Authorized Purpose', and other relevant terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Obligations of Receiving Party: Core confidentiality obligations, including use restrictions, security measures, and standard of care
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed, including to employees, advisors, or as required by law
7. Term and Survival: Duration of the agreement and which obligations survive termination
8. Return or Destruction of Confidential Information: Requirements for handling confidential information upon termination or request
9. Remedies: Available remedies in case of breach, including injunctive relief and damages
10. General Provisions: Standard contractual provisions including governing law, jurisdiction, and entire agreement
1. Non-Solicitation: Prohibits solicitation of employees or customers, used when parties have access to sensitive relationship information
2. Data Privacy Compliance: Specific provisions for compliance with the Data Privacy Act, required when personal data is involved
3. Information Security Requirements: Detailed security protocols, necessary for agreements involving sensitive digital information
4. Export Control: Compliance with export control laws, needed for international transfers of technical information
5. Competing Projects: Provisions regarding work on similar projects, useful in competitive industries
6. Representatives and Warranties: Additional assurances from either party, useful in high-value or high-risk situations
1. Schedule A - Specified Confidential Information: Detailed list of specific documents, data, or information covered by the agreement
2. Schedule B - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule C - Security Protocols: Specific security measures and procedures for handling confidential information
4. Schedule D - Approved Purpose Description: Detailed description of the authorized use of confidential information
5. Appendix 1 - Data Processing Requirements: Specific requirements for processing personal data under Philippine law
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
