Your data doesn't train 黑料网's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the disclosing party, receiving party, and their registered addresses
2. Background: Context of the potential transaction and purpose of sharing confidential information
3. Definitions: Definitions of key terms including 'Confidential Information', 'Representatives', 'Purpose', and 'Transaction'
4. Disclosure and Use of Confidential Information: Terms governing how confidential information can be used and shared
5. Obligations of the Receiving Party: Specific duties regarding protection, storage, and handling of confidential information
6. Security Measures: Required security protocols for protecting confidential information
7. Return or Destruction of Confidential Information: Procedures for handling confidential information after termination or upon request
8. Duration and Survival: Term of the agreement and surviving obligations
9. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
10. General Provisions: Standard clauses including governing law, jurisdiction, and entire agreement
1. Non-Solicitation: Prevents poaching of employees or clients, typically included when HR or customer information is shared
2. Standstill Provisions: Restricts share dealings, typically included for listed company targets
3. Anti-Trust Compliance: Special provisions when parties are competitors or where competition law concerns exist
4. Data Protection Compliance: Detailed POPIA compliance provisions when personal information is involved
5. Public Announcements: Controls over public statements about the potential transaction, especially important for listed companies
6. Insider Trading Provisions: Additional provisions for listed companies regarding handling of price-sensitive information
7. Clean Team Arrangements: Special provisions for handling commercially sensitive information between competitors
1. Schedule 1: Defined Confidential Information: Detailed description of information considered confidential under the agreement
2. Schedule 2: Authorized Representatives: List of individuals authorized to receive and handle confidential information
3. Schedule 3: Security Protocols: Specific security measures and procedures to be followed
4. Schedule 4: Data Room Rules: Rules and procedures for accessing and using virtual or physical data rooms
5. Appendix A: Form of Confidentiality Undertaking: Template undertaking to be signed by representatives accessing confidential information
Find the document you need
骋别苍颈别鈥檚 Security Promise
黑料网 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 黑料网 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
