Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identifies the employer company and the IT employee who will be bound by the NDA
2. Background: Establishes the context of the employment relationship and the need for confidentiality
3. Definitions: Defines key terms including 'Confidential Information', 'Trade Secrets', 'Intellectual Property', and 'Technical Data'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the IT context
5. Employee Obligations: Core confidentiality obligations, including data handling, security protocols, and prohibited activities
6. Data Protection Compliance: Specific obligations relating to compliance with the Data Privacy Act and other relevant legislation
7. Term and Survival: Duration of the NDA and which obligations survive employment termination
8. Return of Confidential Information: Procedures for returning or destroying confidential information upon employment termination
9. Breach and Remedies: Consequences of breach and available legal remedies
10. General Provisions: Standard clauses including governing law, jurisdiction, and amendment procedures
1. Third Party Information: Additional provisions for handling confidential information belonging to clients or business partners
2. International Data Transfers: Include if employee may handle data that crosses borders or if company has international operations
3. Open Source Software: Special provisions for companies working with open source software to clarify what is/isn't confidential
4. Personal Side Projects: Clarifications regarding employee's personal programming projects and intellectual property
5. Remote Work Provisions: Special confidentiality measures for employees working remotely
6. Security Incident Reporting: Detailed procedures for reporting potential data breaches or security incidents
1. Schedule A - Specific Confidential Information: Detailed list of types of confidential information specific to the company
2. Schedule B - Security Protocols: Specific security measures and protocols the employee must follow
3. Schedule C - Authorized Third Parties: List of third parties with whom confidential information may be shared
4. Appendix 1 - Employee Acknowledgment Form: Form for employee to acknowledge receipt and understanding of the NDA
5. Appendix 2 - Exit Certification: Form to be signed upon employment termination confirming compliance with return/destruction of confidential information
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
