Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing and receiving parties, including registration details and addresses
2. Background: Context of the potential M&A transaction and purpose of information sharing
3. Definitions: Key terms including Confidential Information, Representatives, Transaction, Evaluation Purpose
4. Confidentiality Obligations: Core obligations regarding use and protection of confidential information
5. Permitted Disclosures: Circumstances under which confidential information may be shared with representatives and advisors
6. Information Security Measures: Required security measures for protecting confidential information (POPIA compliance)
7. Return or Destruction of Information: Obligations regarding confidential information upon termination or request
8. Duration and Survival: Term of the agreement and surviving obligations
9. No Rights or Licenses: Clarification that no intellectual property rights are transferred
10. No Commitment: Statement that the NDA does not obligate parties to proceed with the transaction
11. Breach and Remedies: Consequences of breach and available remedies
12. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Non-Solicitation: Prevents poaching of employees/customers, typically included for competitive situations
2. Standstill Provisions: For listed companies, restricting share dealings during negotiations
3. Competition Law Compliance: Special provisions when parties are competitors
4. Data Protection Compliance: Detailed POPIA compliance provisions when personal information is involved
5. Public Announcements: Controls on public statements about the potential transaction
6. Exclusive Negotiations: Optional exclusivity period for negotiations
7. Clean Team Arrangements: For handling competitively sensitive information
8. Cost Sharing: Allocation of costs related to information protection measures
1. Schedule 1 - Defined Confidential Information: Detailed description or categories of confidential information covered
2. Schedule 2 - Authorized Representatives: List of authorized personnel who may access confidential information
3. Schedule 3 - Security Protocols: Specific security measures and procedures for information handling
4. Schedule 4 - Excluded Information: Information explicitly excluded from confidentiality obligations
5. Schedule 5 - Required Disclosures: Pre-approved or mandatory disclosure scenarios
6. Appendix A - Form of Confidentiality Undertaking: Template for additional parties to sign confidentiality undertakings
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
