Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing and receiving parties, including their registered addresses and company registration details
2. Background: Context of the software development project and purpose of sharing confidential information
3. Definitions: Detailed definitions including 'Confidential Information', 'Software', 'Source Code', 'Intellectual Property', and other relevant terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the software development context
5. Obligations of Confidentiality: Core confidentiality obligations, including storage, handling, and protection of confidential information
6. Permitted Use and Disclosure: Specific permitted uses of confidential information and conditions for disclosure to employees/contractors
7. Security Measures: Required technical and organizational security measures for protecting confidential information
8. Duration and Survival: Term of the agreement and survival of confidentiality obligations
9. Return or Destruction of Confidential Information: Procedures for returning or destroying confidential information upon termination
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Personal Information Protection: Additional provisions for POPIA compliance when personal information is involved in the software development
2. Third Party Access: Provisions governing access by third-party contractors or service providers
3. Source Code Protection: Specific provisions for protecting source code and related technical documentation
4. Export Control: Provisions dealing with international transfer of technology or technical data
5. Non-Solicitation: Restrictions on soliciting or hiring each other's employees
6. Residual Knowledge: Provisions addressing use of general knowledge and skills acquired during the project
7. Competition Restrictions: Additional provisions regarding competitive activities, if necessary
1. Schedule 1 - Description of Project: Detailed description of the software development project
2. Schedule 2 - Authorized Representatives: List of authorized representatives who may access confidential information
3. Schedule 3 - Security Protocols: Detailed security measures and protocols for handling confidential information
4. Appendix A - Categories of Confidential Information: Detailed list of types of confidential information covered
5. Appendix B - Approved Subcontractors: List of approved subcontractors who may access confidential information
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
