Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Software Sublicense Agreement
"I need a Software Sublicense Agreement for sublicensing our enterprise resource planning software to three manufacturing companies in India, with specific provisions for data localization and a requirement that the sublicensees cannot modify the source code."
1. Parties: Identification of the Sublicensor and Sublicensee, including registered addresses and company details
2. Background: Context of the agreement, including confirmation of Sublicensor's authority to sublicense under the main license
3. Definitions: Key terms used throughout the agreement, including Software, Original License, Territory, etc.
4. Grant of Sublicense: Scope of the sublicense, including usage rights, restrictions, and territory limitations
5. License Fees and Payment Terms: Financial terms, payment schedule, taxes, and late payment consequences
6. Technical Requirements: Minimum system requirements, installation procedures, and technical specifications
7. Term and Termination: Duration of the sublicense, renewal terms, and termination circumstances
8. Intellectual Property Rights: Ownership rights, IP protection measures, and infringement procedures
9. Warranties and Representations: Sublicensor's authority to grant license and software performance warranties
10. Limitation of Liability: Caps on liability and exclusions under Indian law
11. Confidentiality: Protection of confidential information and trade secrets
12. Compliance with Laws: Obligations to comply with Indian IT laws and regulations
13. Dispute Resolution: Jurisdiction, governing law, and dispute resolution procedures
14. General Provisions: Standard boilerplate clauses including notices, assignment, and severability
1. Data Protection and Privacy: Required if the software processes personal data or sensitive information
2. Service Level Agreement: Include if technical support or maintenance services are part of the sublicense
3. Export Control: Necessary if the software is subject to export control regulations
4. Source Code Escrow: Optional protection mechanism for access to source code under specific conditions
5. Training and Implementation: Include if the sublicense includes training or implementation services
6. Audit Rights: Optional section for monitoring compliance with license terms
7. Insurance: Required if specific insurance coverage is needed for high-risk applications
1. Schedule 1 - Software Description: Detailed description of the licensed software, including versions and components
2. Schedule 2 - Technical Specifications: Detailed technical requirements and compatibility specifications
3. Schedule 3 - License Fees: Detailed breakdown of license fees, payment terms, and calculations
4. Schedule 4 - Support Services: Details of any technical support or maintenance services included
5. Schedule 5 - Original License Terms: Relevant terms from the original license agreement that affect the sublicense
6. Appendix A - Acceptable Use Policy: Guidelines and restrictions for software usage
7. Appendix B - Security Requirements: Security protocols and requirements for software implementation
Authors
Information Technology
Software Development
Financial Services
Healthcare
Education
Manufacturing
Retail
Telecommunications
Professional Services
E-commerce
Business Process Outsourcing
Government and Public Sector
Legal
Information Technology
Procurement
Compliance
Software Asset Management
Sales
Business Development
Risk Management
Vendor Management
Operations
Legal Counsel
IT Director
Software Licensing Manager
Chief Technology Officer
Procurement Manager
Contract Manager
Compliance Officer
Software Asset Manager
Business Development Manager
Sales Director
Risk Manager
Chief Information Officer
Legal Operations Manager
Vendor Management Lead
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.