Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing and receiving parties, including registration details for companies or ID numbers for individuals
2. Background: Context of the disclosure, including the purpose related to the product and the nature of the confidential information to be shared
3. Definitions: Key terms including 'Confidential Information', 'Product', 'Authorized Purpose', 'Representatives', and other relevant definitions
4. Scope of Confidential Information: Detailed description of what constitutes confidential information specifically relating to the product, including technical specifications, designs, processes, and related intellectual property
5. Obligations of Confidentiality: Core confidentiality obligations, including storage, handling, and protection of the confidential information
6. Permitted Disclosures: Circumstances under which the receiving party may disclose information to employees, advisors, or as required by law
7. Security Measures: Specific measures required to protect the confidential information, including physical and digital security requirements
8. Return or Destruction of Information: Obligations regarding the return or destruction of confidential information upon termination or request
9. Duration and Termination: Term of the agreement and survival of obligations after termination
10. Breach and Remedies: Consequences of breach and available remedies, including injunctive relief
11. General Provisions: Standard clauses including governing law, jurisdiction, entire agreement, and variation
1. Non-Compete Provisions: Additional restrictions on competition, used when the product information is highly sensitive and could be used to compete
2. Third Party Rights: Provisions dealing with third party intellectual property rights, used when the product involves licensed technology
3. Export Control: Provisions regarding export restrictions, used when the product may be subject to international trade regulations
4. Data Protection Compliance: Specific POPIA compliance provisions, used when personal information may be involved
5. Reverse Engineering Prohibition: Specific prohibition on reverse engineering the product, used for software or technical products
6. Representatives and Subsidiaries: Extended provisions for group companies and representatives, used for complex corporate structures
1. Schedule 1: Product Description: Detailed description of the product(s) covered by the NDA
2. Schedule 2: Authorized Representatives: List of authorized representatives who may access the confidential information
3. Schedule 3: Security Protocols: Specific security measures and protocols to be followed
4. Schedule 4: Marking Requirements: Requirements for marking and identifying confidential information
5. Appendix A: Acknowledgment Form: Form to be signed by representatives who will have access to the confidential information
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
