Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Cyber Security Agreement
"I need a Cyber Security Agreement governed by Hong Kong law for a fintech company engaging a third-party security provider to manage cloud security and handle incident response, with special attention to financial regulatory compliance and cross-border data transfers to mainland China."
1. Parties: Identification of the contracting parties, including registered addresses and company details
2. Background: Context of the agreement, relationship between parties, and purpose of the security arrangements
3. Definitions: Detailed definitions of technical and legal terms used throughout the agreement
4. Scope of Services: Detailed description of cyber security services, protection measures, and coverage
5. Security Requirements: Specific security controls, standards, and protocols to be implemented
6. Incident Response: Procedures for detecting, reporting, and responding to security incidents
7. Data Protection and Privacy: Compliance with PDPO and data protection measures
8. Confidentiality: Protection of confidential information exchanged between parties
9. Audit and Compliance: Rights to audit, compliance requirements, and reporting obligations
10. Service Levels: Performance metrics, response times, and service level commitments
11. Term and Termination: Duration of agreement and termination provisions
12. Liability and Indemnification: Allocation of risk, limitation of liability, and indemnification terms
13. General Provisions: Standard legal provisions including governing law, notices, and amendments
1. Cross-Border Data Transfers: Required when data will be transferred outside Hong Kong, including compliance with international data protection laws
2. Business Continuity: Include when critical systems or operations are involved, detailing disaster recovery and business continuity requirements
3. Third-Party Security: Necessary when third-party vendors or subcontractors are involved in providing security services
4. Cloud Security: Required for agreements involving cloud services or cloud-based security solutions
5. Industry-Specific Compliance: Include for regulated industries like banking or healthcare, addressing specific regulatory requirements
6. Personnel Security: Important when provider's staff will have access to sensitive systems or data
7. Insurance Requirements: Include when specific cyber insurance coverage is required
1. Schedule 1 - Security Controls and Standards: Detailed technical specifications of security controls and compliance standards
2. Schedule 2 - Service Level Agreement: Detailed metrics, response times, and performance requirements
3. Schedule 3 - Incident Response Plan: Detailed procedures and protocols for security incident handling
4. Schedule 4 - Fee Schedule: Pricing details and payment terms for security services
5. Schedule 5 - Data Processing Requirements: Specific requirements for handling personal and sensitive data
6. Appendix A - Contact Information: Key contacts for security incidents, escalations, and notices
7. Appendix B - Technical Infrastructure: Description of systems, networks, and infrastructure covered by the agreement
Authors
Financial Services
Banking
Insurance
Healthcare
Technology
E-commerce
Telecommunications
Professional Services
Manufacturing
Retail
Education
Government and Public Sector
Transportation and Logistics
Information Security
IT Operations
Legal
Compliance
Risk Management
Data Protection
Infrastructure
Digital Operations
Procurement
Vendor Management
Security Operations Center
Internal Audit
Business Continuity
Chief Information Security Officer (CISO)
Chief Technology Officer (CTO)
IT Director
Security Operations Manager
Compliance Officer
Risk Manager
Data Protection Officer
IT Security Manager
Information Security Analyst
Legal Counsel
Privacy Officer
Security Architect
IT Procurement Manager
Chief Risk Officer
Digital Operations Director
Find the exact document you need
Cruise Consent Form For Minors
A Hong Kong law-governed consent form authorizing minor passengers to travel on cruise ships with associated permissions and protections.
Business Continuity Assessment
A Hong Kong law-governed assessment document evaluating an organization's business continuity capabilities and providing recommendations for operational resilience enhancement.
Remote Work Offer Letter
Hong Kong-compliant remote work offer letter template outlining employment terms and virtual working arrangements.
Mobile App License Agreement
A Hong Kong law-governed agreement setting out terms and conditions for mobile application licensing to users or businesses.
Zero Balance Account Agreement
A Hong Kong law-governed agreement establishing a zero balance account arrangement between a bank and corporate client, including automated sweeping mechanisms and operational procedures.
Safe Deposit Box Lease Agreement
A Hong Kong law-governed agreement setting out terms for leasing a bank safe deposit box, including access rights, security measures, and liability provisions.
Cleaning Service Agreement Contract
A Hong Kong law-governed agreement establishing terms and conditions for professional cleaning services.
Cyber Security Agreement
A Hong Kong law-governed agreement establishing terms for cybersecurity services, protection measures, and incident response protocols, ensuring compliance with local data protection and security regulations.
Information Technology Non Disclosure Agreement
Hong Kong-law governed NDA for protecting IT-related confidential information and technical data.
Data Center Service Level Agreement
A Hong Kong law-governed agreement establishing service levels and operational requirements for data center services, including performance metrics and compliance requirements.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.