Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Secret Agreement
"I need a Secret Agreement for a Hong Kong software company sharing proprietary AI algorithms with a potential development partner in Singapore, with the agreement to start from March 1, 2025, and include strict technical data protection requirements."
1. Parties: Identification of all parties to the agreement, including full legal names and registered addresses
2. Background: Context of the agreement and relationship between the parties
3. Definitions: Detailed definitions of terms used, particularly 'Confidential Information', 'Permitted Purpose', and 'Authorized Representatives'
4. Scope of Confidential Information: Detailed description of what constitutes confidential information under the agreement
5. Confidentiality Obligations: Core obligations regarding handling and protection of confidential information
6. Permitted Disclosures: Circumstances under which confidential information may be disclosed and to whom
7. Security Measures: Specific security measures required for protecting confidential information
8. Return or Destruction of Information: Obligations regarding the return or destruction of confidential information
9. Term and Survival: Duration of the agreement and which provisions survive termination
10. Breach and Remedies: Consequences of breach and available remedies including injunctive relief
11. General Provisions: Standard boilerplate clauses including governing law, jurisdiction, and entire agreement
1. Non-Competition: Restrictions on competitive activities, used when confidential information could provide competitive advantage
2. Non-Solicitation: Restrictions on soliciting employees or customers, included when business relationships need protection
3. Intellectual Property Rights: IP ownership and licensing provisions, used when confidential information includes IP
4. Data Protection: Specific data protection obligations, required when personal data is involved
5. Assignment and Subcontracting: Rights to transfer obligations, included for complex commercial relationships
6. Insurance Requirements: Insurance obligations, included for high-value or high-risk information
7. Audit Rights: Rights to audit compliance, used for critical or highly sensitive information
1. Schedule 1 - Specified Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Authorized Representatives: List of individuals authorized to access confidential information
3. Schedule 3 - Security Protocols: Detailed security measures and protocols to be followed
4. Schedule 4 - Permitted Purpose: Detailed description of permitted uses of confidential information
5. Appendix A - Form of Confidentiality Undertaking: Template undertaking for authorized representatives to sign
6. Appendix B - Data Handling Procedures: Specific procedures for handling, storing, and disposing of confidential information
Authors
Technology
Financial Services
Healthcare
Manufacturing
Research & Development
Professional Services
Biotechnology
Telecommunications
Energy
Defense
Media & Entertainment
Real Estate
Retail & Consumer Goods
Education
Legal
Compliance
Executive Leadership
Information Security
Research & Development
Corporate Development
Risk Management
Information Technology
Finance
Human Resources
Operations
Business Development
Intellectual Property
Strategy
Chief Executive Officer
Chief Legal Officer
General Counsel
Legal Director
Compliance Officer
Chief Technology Officer
Chief Financial Officer
Business Development Director
Research Director
Head of Innovation
Chief Operating Officer
Senior Legal Counsel
Corporate Secretary
Risk Manager
Information Security Officer
Project Manager
Investment Director
Mergers & Acquisitions Director
Find the exact document you need
Irrevocable Unconfirmed Letter Of Credit
A Hong Kong law-governed banking instrument providing an issuing bank's irrevocable commitment to pay the beneficiary upon presentation of compliant documents.
Infosec Audit Policy
A Hong Kong-compliant policy document establishing requirements and procedures for information security audits, aligned with PDPO and local regulations.
Confidentiality Non Disclosure Agreement
A Hong Kong law-governed confidentiality agreement protecting sensitive information shared between parties during business relationships and negotiations.
Online Sales Contract
Hong Kong-governed agreement establishing terms and conditions for online sales, including e-commerce operations and consumer protection provisions.
Personal Release And Consent Form
A Hong Kong law-governed document obtaining explicit consent and release for specific activities or data processing, compliant with PDPO and local regulations.
Client Risk Assessment Form
A regulatory-compliant risk assessment form for evaluating client profiles in Hong Kong's financial services sector, meeting HKMA and SFC requirements.
Synthetic Letter Of Credit
A Hong Kong law-governed document establishing the terms and conditions for a Synthetic Letter of Credit, combining traditional LC mechanics with synthetic elements.
Security Incident Management Audit Program
A Hong Kong-compliant framework for auditing security incident management processes, aligned with PDPO and HKMA requirements.
Information Security Agreement
A Hong Kong law-governed agreement establishing information security and data protection requirements between contracting parties, ensuring compliance with PDPO and related regulations.
Ceiling Leakage Complaint Letter
A formal complaint letter under Hong Kong law addressing ceiling leakage issues and requesting remedial action from responsible parties.
Multi Employer Agreement
A Hong Kong law-governed agreement establishing the framework for multiple employers to coordinate their employment practices and shared workforce arrangements.
Security Contract Termination Letter
A Hong Kong law-governed letter formally terminating a security services contract, addressing notice periods, settlements, and transition arrangements.
Security Agreement Form
A Hong Kong law-governed agreement creating security interests over assets, establishing terms for security creation, maintenance, and enforcement.
Information Security Audit Policy
A policy document outlining information security audit requirements and procedures for organizations in Hong Kong, aligned with PDPO and local regulations.
Data Room Confidentiality Agreement
A Hong Kong law-governed agreement regulating access to and confidentiality of information shared through a data room facility during corporate transactions or due diligence processes.
Pharmaceutical License Agreement
A Hong Kong-governed agreement for licensing pharmaceutical products or technology, establishing terms for intellectual property rights, regulatory compliance, and commercial arrangements.
Security Loan Agreement
A Hong Kong law-governed agreement establishing terms for temporary transfer of securities between parties, including collateral arrangements and regulatory compliance requirements.
IT Risk Assessment Report
A detailed assessment of organization's IT risks and recommended controls, compliant with Hong Kong regulations and international standards.
Physical Power Purchase Agreement
Hong Kong-governed agreement for physical electricity sale and purchase between generator and offtaker, addressing technical, operational, and commercial terms.
Secret Agreement
A Hong Kong law-governed agreement establishing confidentiality obligations and protecting sensitive information shared between parties.
Law Firm Partnership Agreement
A Hong Kong law-governed agreement establishing the partnership structure and operational framework for a law firm, detailing partner rights, obligations, and management arrangements.
Client Contract
Hong Kong law-governed client contract template establishing terms between service provider and client, with comprehensive commercial and legal provisions.
Security Assignment Agreement
A Hong Kong law-governed agreement creating security over assets through assignment, detailing terms of the security arrangement and enforcement rights.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.