Your data doesn't train 黑料网's AI
You keep IP ownership聽of your docs
1. Parties: Identifies and provides full legal details of all parties to the agreement
2. Background: Sets out the context and purpose of the agreement, including the nature of the business relationship
3. Definitions: Defines key terms used throughout the agreement, particularly 'Confidential Information'
4. Scope of Confidential Information: Clearly identifies what information is covered by the agreement
5. Obligations of Confidentiality: Details the core obligations to maintain confidentiality and permitted uses of the information
6. Security Measures: Specifies required measures to protect confidential information
7. Term and Survival: Specifies duration of the agreement and which obligations survive termination
8. Return or Destruction of Information: Requirements for handling confidential information after the agreement ends
9. Breach and Remedies: Consequences of breach and available remedies
10. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Permitted Disclosures: Specific circumstances where disclosure is allowed, used when there are known third parties who will need access
2. Non-Solicitation: Prevents poaching of employees/clients, included when parties will have access to sensitive relationship information
3. Intellectual Property Rights: Clarifies ownership of IP, used when confidential information includes or may lead to IP creation
4. Data Protection Compliance: Specific obligations regarding personal data, required when confidential information includes personal information
5. Export Control: Compliance with export control laws, needed for international trade or technology transfer
6. Competitive Restrictions: Additional restrictions on competitive activities, used in highly competitive industries
7. Insurance Requirements: Obligations to maintain specific insurance coverage, used for high-value or high-risk information
1. Schedule 1 - Description of Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3 - Security Protocols: Specific security measures and protocols to be followed
4. Appendix A - Notification Requirements: Contact details and procedures for required notices
5. Appendix B - Acknowledgment Form: Form for additional parties or representatives to acknowledge confidentiality obligations
Find the document you need
骋别苍颈别鈥檚 Security Promise
黑料网 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 黑料网 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
